You are on page 1of 8

Cyber Security in Virtualized Communication

Networks: Open Challenges for NATO


2021 International Conference on Military Communication and Information Systems (ICMCIS) | 978-1-6654-4586-3/21/$31.00 ©2021 IEEE | DOI: 10.1109/ICMCIS52405.2021.9486421

Roberto Rigolin F. Lopes Caroline Bildsten Konrad Wrona


Communication Systems (KOM) Division of C4ISR NATO Cyber Security Centre /
Fraunhofer FKIE Swedish Defense Research Agency Military University of Technology
Bonn, Germany Linköping, Sweden The Hague, Netherlands / Warsaw, Poland
roberto.lopes@fkie.fraunhofer.de caroline.bildsten@foi.se konrad.wrona@[ncia.nato.int,wat.edu.pl]

Simo Huopio Daniel Eidenskog Olwen L. Worthington


Information Technology Division Division of C4ISR Defence Science and Technology Laboratory (Dstl)
Finnish Defense Research Agency Swedish Defense Research Agency UK Ministry of Defence
Riihimäki, Finland Linköping, Sweden London, United Kingdom
simo.huopio@mil.fi daniel.eidenskog@foi.se olworthington@mail.dstl.gov.uk

Abstract—Modern multi-nation military communication and national systems, would be support for an automated validation
information systems demand rapid deployment and reconfigu- and deployment of security policies leading to more agile and
ration to enable secure information exchange between domains rapid response to cyber threats as well as to improve security
belonging to different nations. In order to support such a multi-
nation mission scenarios NATO has been developing the concept posture by increasing automation and thus reducing human
of a federated mission network (FMN). These networks are errors in low-level technical configuration tasks.
leveraging the advantages of software-defined networking (SDN) This article compiles the results of an investigation per-
and network function virtualization (NFV) to adapt to a wide formed by the exploratory team on cyber security in virtu-
range of security requirements using network security functions alized networks under the umbrella of NATO Science and
(NSF). The investigation reported in this paper discusses two
use cases, namely how to automate security policy evaluation, Technology Organization (STO) (IST-ET-114) [6]. The goal
and how to deploy a security guard (Information Exchange is to assess how the recent developments in commercial
Function) between network segments with different classification. technologies, particularly SDN, NFV and NSF, can facilitate
Both cases use network scenarios from protected core network the deployment of multi-nation military networks. The military
(PCN) because the goal is to compile open challenges to automate has several specific requirements that are different from the
the deployment and management of secure coalition networks.
Index Terms—Military Communication Networks, Software- civilian communication systems [7]–[9].
Defined Networking, Network Security Function, Network Func- Current surveys and literature reviews, e.g., [10], usually
tion Virtualization do not address those particular requirements from military
communication networks such as rapid cross-layer reconfig-
I. I NTRODUCTION uration and co-existence of multiple security domains. Thus,
Future military communication networks will increasingly the present study complements the state-of-the-art by listing
rely on Software Defined Networking (SDN) and Network directions for possible solutions and identifying open research
Function Virtualization (NFV) to support complex and con- questions that are pertinent for modern military communica-
tinuously evolving multi-nation operations [1]–[4]. In such tion networks.
a softwarized environment, the services are hosted within Our investigation focuses on how SDN, NFV and NSF can
containers and virtual machines connected together by a hybrid be leveraged to enhance cyber security in mission federate
network, with physical and virtual components, managed by networks. We are particularly interested in dynamically plac-
software. The network will be programmable and will support ing NSF in multi-nation networks and in automating tests
virtualization of many network services, including some of to verify security policies. We have defined two network
Network Security Function (NSF). scenarios to guide the investigation inspired by NATO’s recent
This increasing softwarization of Communication and Infor- specifications on Protected Core Network (PCN) [11] and
mation Systems (CIS) would support the Federated Mission Tactical Edge [12]. The scenarios include core services like e-
Networks (FMN) concept [5] in providing a comprehensive mail, chat, intelligence sharing, Friendly Force Tracking (FFT)
support to future agile missions and thus demands a rapid and Video Tele-Conference (VTC).
reconfiguration and a decentralized control. Another benefit, The goal of this paper is to compile open challenges to
applicable to FMN as well as to the NATO Enterprise and automate the deployment and management of secure multi-
nation networks. The present study is part of a longer re-
NATO STO IST-ET-114: Cyber Security in Virtualized Networks search project that aims to (1) assess which cyber security

Authorized licensed use limited to: Center for Science Technology and Information (CESTI). Downloaded on December 21,2023 at 10:01:41 UTC from IEEE Xplore. Restrictions apply.
Availability

Risk-aware routing Protecting data Confidentiality


1 Integrity
Software Defined Networking (SDN) Traffic-flow confidentiality

Automated security policy evaluation Regulatory compliance

Security guard
2 Information Exchange
Military Communication Networks Network Function Virtualization (NFV) Function (IEF)
Data-sanitization
Strategic

Deployed
Manual
Tactical Data protection
Prevent Guided
IAM Access
management Autonomous
3
Network Security Function (NSF)
Detect Real Time Detection
Defend
Recover Restore

Manage risk
Assess
Audit
Service Function Chaining
Sustain Implement

Microsegmentation
Inform Collect

Fig. 1. Three technologies supporting the implementation, configuration and management of military networks

functions that can be effectively virtualized; (2) evaluate the Parts of the network can rely on stable and reliable
benefits and risks of dynamic placement of cyber security communication technologies and computational power;
functions and service function chaining; and (3) investigate • Deployed: have mobile infrastructure (e.g. mobile com-
advantages and pitfalls of global view and global control of mand posts) deployed in the battlefield with network
the network. These overall goals of the main project will be capabilities to connect to both strategic and tactical
evaluated through network scenarios derived from Protected domains;
Core Network (PCN) and Tactical Edge, while taking the cyber • Tactical: be deployed in the battlefield, or in a contested
security effects of emerging approaches, such as Experiential region, using constraint radio links to connect mobile
Networked Intelligence (ENI) and Secure Access Service Edge nodes, such as vehicles, soldiers and sensors. The tactical
(SASE), into account. edge has more stringent requirements than the civilian
The remainder of this paper is organized as follows. Section edge networks in respect to security and reliability, and
II discusses the fundamental concepts related to the present needs to be adaptable to ever-changing communication
investigation. Section III lists the network scenarios and use scenarios [13]–[18].
cases used to guide this study. Section IV describes open In this paper, we investigate how SDN, NFV and NSF can
challenges for coalition networks that can be addressed with support the deployment and validation of security policies in
support of new technologies. Finally, Section V concludes the multi-nation military networks. The concepts and how they
paper and lists future work. are interrelated is shown in Fig. 1. The goal is to discuss
how these technologies can improve the way we implement
II. BACKGROUND
cyber security in coalition networks by providing the means to
This section defines the fundamental concepts and tech- automate the detection, reaction, protection and recovery from
nologies supporting the present investigation. We have also cyber attacks. We discuss definitions and related investigations
reviewed recent literature proposing solutions to improve cyber in the following sections.
security in military coalition networks using SDN, NFV and
NSF. B. Software Defined Networking (SDN)
SDN is an approach for network programmability, in which
A. Military Communication Networks
the data forwarding plane is separated from the control plane
Modern military communications leverage recent technolo- through standardized interfaces [19]. The programmability is
gies, such as SDN, NFV and NSF, to create heterogeneous given by creating network policies, in which the SDN switches
networks connecting the strategic, deployed and tactical do- can be made to act like a router, switch, load balancer or a
mains. These domains need the following capabilities: firewall [10], [20]. Fig. 2 shows the Northbound, Southbound
• Strategic: have the infrastructure to access and utilise and East/West SDN controller interfaces in a multi-nation
information systems from any security classification. configuration, using a guard in the data plane.

Authorized licensed use limited to: Center for Science Technology and Information (CESTI). Downloaded on December 21,2023 at 10:01:41 UTC from IEEE Xplore. Restrictions apply.
Nation A Nation B overview for decisions (e.g. sFlow) [24].
Application 1, …, n
Application 1, …, n 2 3) Related Works: The investigation reported in [26] dis-
Northbound Interface
Northbound Interface cuss the benefits of using SDN in coalition networks like
Controller
East/ East/ Controller PCN. Also discussing the benefits, challenges and risks of
1 West West
using unreliable wireless links in tactical networks to create
Southbound Interface
Control Plane
Southbound Interface the control plane. The authors argue that the use of radio links
Data Plane in the control plane creates a new vector for cyber attacks.
In [27], the authors leverage SDN to support distributed
SDN switch
3 clouds at the tactical edge for Command, Control, Commu-
Guard SDN‐capable devices and radios nications, Computers, Intelligence, Surveillance and Recon-
naissance (C4ISR). The goal is to improve network resource
Node UHF VHF SatCom allocation to reduce the end-to-end delay over radio links.
The solution creates a hierarchy of controllers collaborating
Fig. 2. Two controllers from different nations to manage the radios, the clouds at the tactical edge and
also relying on a centralized controller. The distributed clouds
share a trust anchor using the public key infrastructure through
There are two different approaches to SDN, one based digital certificates from a common certification authority.
on an imperative model and one on a declarative model. Recent literature has been introducing a hierarchical control
An imperative-based SDN, such as OpenFlow, means that plane for realizing 5G and beyond [28]. The goal is to study
the control unit describes in detail how each package is to interaction among the controllers while executing network
be handled by the data plane, which in practice means that slicing mechanisms and end-to-end paths at the edge of
decisions on packet forwarding are not taken in the data the network. They performed experiments and measured the
plane. In the declarative model, such as OpFlex, a certain latency overhead in the control plane.
degree of decision-making is left to the network components Software-Defined Perimeter (SDP) is a security framework,
in the data plane, which makes the decision-making distributed aimed to protect infrastructure against network threats by hid-
to a certain extent [21]. In parallel of these two models, ing the application infrastructure and enforcing need-to-know
there is also concept called intent-based networking which connectivity [29], [30]. SDN and NFV can be combined with
can be viewed as an extension to SDN; While software- Software-Defined Perimeter (SDP) to mitigate some network
defined networks are about coordination and automation of threats [31].
policies and configurations, intent-based networks supports an
increased autonomy of network administration. In addition, C. Network Security Function (NSF)
intent-based networking automate translation from intent to Military activities are sensitive therefore demanding strict
policy and evaluates network behavior [22]. cyber security measures in coalition networks. Network secu-
1) Security challenges: Care must be taken to protect a rity devices like gateways and firewalls usually had its own
SDN against the attack vectors caused by the centralisation dedicated hardware to be deployed in the network. With the
of control [23]. Since the controller is centralised in SDN, it increasing adoption of virtual networks, these devices have
is a single-point of failure and therefore a target for attack. been implemented in virtual machines or containers to be
An attacker gaining control over the controller will have easily deployed in network as Network Security Function
control over the network traffic, which can result in for (NSF). NSF is a software developed to enforce integrity,
example denial of service or manipulated traffic. Overtaken confidentiality and availability of user data flows in computer
SDN switches in the data plane may also result in manipulated networks. To do so, the security functions must prevent, detect,
traffic. Applications used for controlling the network in the block or mitigate cyber attacks [32].
application plane needs to be vetted to ensure they are not In this investigation, we are particularly interested in secu-
malicious [23]. For the central programmability and control rity functions that can be virtualized and dynamically placed
to work, a global topology mapping over network entities is in a coalition network. Fig. 1 depicts some of possible network
maintained [24]. A manipulated topology mapping may lead to security functions based on CIS security capability breakdown
traffic being misdirected or affect availability of the network, it introduced in [33]. In particular, these functions can be orches-
is therefore fundamental to protect it from manipulation [25]. trated (or chained) in order to support the use cases discussed
2) Global view: The built-in topology mapping has a in Section III. Therefore, in this section we review recent
positive side effect that it also can be used to learn about the investigations using SDN and NFV to support the development
network and monitor it for malicious changes [24]. A global and execution of network security functions.
topology mapping can also be obtained in traditional networks, There are investigations using the SDN infrastructure for
but in the case of SDN it is already provided by the controller. detection and mitigation of cyber attacks. In [34], the authors
Additional protocols can be used to monitor the data flow, both use SDN infrastructure to compile an accurate view of the
for traditional and SDN. There are protocols developed for network so to identify cyber attacks. As a result, the authors
SDN that integrate with the controller and gives an additional extended the controller functionalities adding a framework to

Authorized licensed use limited to: Center for Science Technology and Information (CESTI). Downloaded on December 21,2023 at 10:01:41 UTC from IEEE Xplore. Restrictions apply.
detect and classify anomalies in user data flows. In [35], the [44] introduced a framework to support the deployment of
authors introduced a performance aware mechanism for the anomaly detection mechanisms. The goal is to keep SFC
detection and mitigation of Denial of Service (DoS) attacks. protected against well-known attacks and be rapidly patched
The solution is part of an agile security frameworks that is for zero-day attacks. There are also investigations compiling
re-configurable to address a particular attack. the challenges and use cases to protect NFV Infrastructure
There are also investigations leveraging SDN to simulate (NFVI) against cyber attacks [45].
attacks and countermeasures in tactical networks [36], [37].
The goal is to automate security check for decision making III. U SE C ASES
and training addressing the particular challenges from tacti- We defined three use cases, depicted in Fig. 1, to illus-
cal operations. In [37], the authors introduce a platform to trate the potential benefits of NFV and SDN technologies
develop and test Machine Learning (ML) models to detect to improve cyber security measures in coalition networks.
cyber attacks using NFV and SDN. The authors leverage the The risk-aware routing in PCN has been already introduced
monitoring capabilities of software-defined networks to gather and analyzed in previous works [46]–[48]. The other two
features to build and test supervised ML models to detect use cases are introduced below. The first use case discusses
network anomalies related to cyber attacks. the automation of verification of the correct enforcement
The authors in [38], introduced a guard architecture to allow of security policies in the network. The second use case
e-mail exchange among nations in a coalition network. Their describes the deployment of an information exchange guard
solution is an e-mail guard with policies to allow the exchange fully implemented as a network function.
of emails with attachment among networks with different
A. Automated security policy evaluation
security classifications. In section III-B we discuss a use case
to deploy a guard in a virtualized coalition network. The goal is to investigate the new possibilities for automat-
The investigation in [39] is using SDN control and monitor- ing network policy verification and deployment, increasing
ing features to develop security applications. The authors argue operational agility and mitigating human errors. Ultimately,
that SDN centralized management and control can support continuous softwarization and virtualization of network and
applications enforcing security policies in the network. There- security functions could lead to fully automated network
fore, they introduced an architecture to orchestrate security management of FMN and Core Services.
functions in a SDN-capable network. This use case assumes the existence of a network between
two or more nations, as illustrated in Fig. 3. Protected core
D. Network Function Virtualization (NFV) network consist of the protected core segments that provide
NFV is a network architecture to decouple network func- connectivity for the user segments or colored clouds. Each pro-
tions from dedicate hardware, therefore, virtualizing network tected core segment can be built upon SDN and communicate
functions into building blocks that connect or chain together with other protected core segments, to route traffic securely
to create network segments [40], [41]. There is an on going between colored clouds. SDN can also be used within the
symbiosis between SDN and NFV creating the platform for colored clouds and for example be leveraged for better control
dynamic deployment of network functions [42]. The goal is to in traffic flows towards provisioned services and therein protect
develop a flexible, secure and low-cost architecture for service user nodes from malicious flows.
providers. The main driver for this technology is the telecom Since federated network partners each manage their own
industry with the advent and development of 5G network and network infrastructure, security policy verification is needed
its successors. to ensure that the connected national infrastructures meet the
The availability of virtual machines, hypervisors and cloud common security requirements.
platforms triggered the development of virtualized network In an SDN-enabled PCN (SD-PCN), a pre-configured set
devices, such as switches, routers, firewalls, Intrusion Detec- of information is gathered automatically from a target network
tion Systems (IDS) and Network Address Translation (NAT). segment. The gathered information is used to validate whether
Recent investigations are deploying network services as soft- the common security policies are met.
ware and proposing solutions to optimize resource allocation A basic management flow for an SD-PCN would consist of:
in virtualized networks [43]. NFV allows the fulfillment of • Setting up network route to the target network segment;
particular application requirements by dynamic deployment • Enumeration of all network resources;
of network services and new security policies. It also enable • Enumeration of services provided by each found network
management and control of network functions from a central resource;
controller, say using machine learning models. Control appli- • Interrogation of software versions providing each found
cations can isolate compromised network devices, slice the service;
network to create security zones and reroute traffic to mitigate • Executing functional test cases needed to validate that
cyber attacks. the core services are available and up with the basic
Complementing, recent investigations are developing mech- functionality and interoperability;
anisms to keep the integrity of Service Function Chaining • Verification if the gathered data is within the bounds of
(SFC) orchestrating NFV services [44]. The investigation in the security policy set to the target network in question.

Authorized licensed use limited to: Center for Science Technology and Information (CESTI). Downloaded on December 21,2023 at 10:01:41 UTC from IEEE Xplore. Restrictions apply.
Controller B

P Provider B
PCN‐2

Core B
Controller A PCN‐1 E E PCN‐1
E Controller C
E

Provider A P PCN‐2 E Core A Protected Core Core C E PCN‐2 P Provider C


Network
E PCN‐1 E

Fig. 3. Data and Control plane for PCN

An outcome of an automated security policy evaluation SDN and SFC would enable a more dynamic and timely re-
could consist of: configuration of the guard capabilities in order to support
• Indication whether the target network has the core ser- evolving mission information exchange requirements. The
vices available; solution must be modular with open API-based interfaces
• Indication whether the target network adheres with the and employing open standard mechanisms for mediating and
security policy set to the network; securing the information flow.
• Base set of raw data gathered from the target network Feasibility analysis for an IEF requires several distinctive
to be used as a basis for further interactive analysis or steps:
decision making. • Identification of security policies applicable to the inter-
This use case could be easily executed using resources that connected network segments;
are virtualized within the SDN network NFV infrastructure. • Setting up network route to the target network segment
Locating the validation resources within the core SDN network passing through the IEF;
infrastructure is feasible especially when sought verification • Enumeration of types of data to be exchanged between
is done against security policies which are common to all the network segments;
networks that the core network connects. • Use a model to generate random sequences of messages
The above use case demonstrates opportunities of develop- or data streams [15] and functional test cases for exchang-
ing a generic network security tool-set which is implemented ing the different types of data through the IEF;
and offered as part of core network infrastructure. The tools • Verification that the exchanged data is within the bounds
would be available for interactive and automated use already of the security policy set to the target network in question;
within the network without the need of connecting any addi- • Quantification of both communication and computation
tional tools and audit workstations. Implementation as a NFV overhead added by the IEF to the data flows in order to
could relatively straightforward: the tools can be packaged in obtain an indication if the guard can handle data flows
a virtual machine or a container, and data gathering, tool usage using the total link capacity;
and the needed network connections can be configured using • Verification whether the IEF is sufficiently resilient to
Management and Orchestration (MANO). failures.
The IEF use case can be thought as an prototype of the
B. Information Exchange Function (IEF) generic NSF, some of them located between different security
The interconnection of network segments belonging to domains and having access to all or part of the traffic flowing
different security domain demands an Information Exchange between in order to make autonomous decisions on the data
Function (IEF) (commonly called a guard) mediating the flow mediation based on information exchange policy.
exchange of information, as depicted in Fig. 4. We assume When thinking about implementing the IEF as a virtualized
that the IEF is implemented as an NSF. network function, it is essential to establish first where in
The IEF could be implemented in a distributed form by logical an physical terms the NFV infrastructure is located
enabling dynamic orchestration of services implemented, in as the guard will terminate the protocols there. In case of
virtualized or physical form, at various location of the network PCN architecture, terminating and inspecting the connections
by means of SFC. Such a modular architecture relying on of user nodes would make the NFV implementation as part

Authorized licensed use limited to: Center for Science Technology and Information (CESTI). Downloaded on December 21,2023 at 10:01:41 UTC from IEEE Xplore. Restrictions apply.
Fig. 4. Information Exchange Function between two security domains

of the user nodes itself. Depending on the security policy, this require human-in-the-loop that is inefficient, slow, expensive,
could force locating the NFV in the user node. In practice this error prone, and often results in complicated procedures.
would be the case also for other similar NSF, such as firewalls, Although implementation of at least partial network security
IDS/IPS, and other sensors gathering data to form a cyber functionality within military networks at the deployed and
situational awareness. There are already many commercial tactical domains constitutes and attractive solution, the control
examples of firewalls and other security controls which are plane in these systems must be implemented over unreliable
available in NFV format. links with both network topology and link quality changing.
One of important challenges is implementing IEF security In order to facilitate use of NFV concepts within NATO
controls that result in a residual risk that is acceptable for PCN and FMN, we need to define guidance and recom-
successful security accreditation of an operational IEF. A mendations regarding for using virtualization within military
sufficient level of assurance, required for accreditation of a networks without adversely affecting, but rather increasing,
solution supporting multiple security classification levels and security and performance of these systems. For example,
types of services, could be possibly achieved by implementing there is a need for the policy of terminating the through-
some of the security-critical functionality in secure enclaves, going connections on different physical and logical network
e.g. using Intel SGX or AMD SEV technologies [49]. Another locations. It is also important to identify some policy templates
potential accreditation issue is management of risk related to for access of security functionality by different participants.
dynamic reconfiguration of the security functions involved in On a technical level, we need a more detailed investigation
the IEF chain. Supporting accreditation of such agile systems of suitability of SDN and NFV for secure routing in and
is an open challenge that is critical for supporting increasingly between protected core segments. SDN and NSF could po-
software-intensive military systems and modern software de- tentially be used within a protected core segment, to securely
velopment and deployment paradigms, e.g., DevSecOps [50]. route traffic between user nodes depending on classification. In
An approach to applying a dynamic accreditation to military particular, using SDN, granular control on flows between user
CIS has been proposed in [51] and an example of working nodes can be achieved. The next subsections list the technical
implementation, applicable to DevSecOps and infrastructure challenges for creating a security control plane across different
as a code, has been presented in [52]. We believe that similar security domains in federated networks.
approach could be also applied in the context of NFV and
SFC. A. Cross-domain security controls
Within a multi-domain architecture, SDN controllers could
IV. O PEN CHALLENGES be used to implement cross-domain security boundary controls
Currently, there are still several challenges a wide de- within a coalition, providing integrated management control
ployment of the SDN, NFV and NSF can potentially ease of red and black security infrastructure, enabling full man-
the deployment and configuration of coalition networks. In agement from the high-side security domain. Provided that
particular, centralized management of the Alliance and mission the multi-domain architecture is under common organisational
networks is not yet possible. One of the reasons for this is control, so there is no need for negotiation across the security
existence of multiple network security domains in federated boundary, the red-side controller would be fully in charge.
networks where each of the partners manages their own The black side infrastructure is untrusted from an information
network devices. Moreover, coordination between different security perspective.
partner networks and security domains is hard. Different The SDN controller would still be considered logically
domains are separated by policy and management activities centralised, even though in some implementations it may be

Authorized licensed use limited to: Center for Science Technology and Information (CESTI). Downloaded on December 21,2023 at 10:01:41 UTC from IEEE Xplore. Restrictions apply.
physically distributed each side of the security boundary, and based on PCN. Our results suggest that a symbioses among
various architectural options would include: SDN, NFV and NSF is going to allow automated detection,
• Placing the boundary on the southbound interface (so protection, reaction and recovery for cyber security measures.
there are no controllers on the black side, only switches); We have defined two use cases that will guide our feasibility
• Placing the boundary on the northbound interface (so the analysis of applicability of NFV and SDN to facilitate the
controller is on the black side but applications are on the deployment, re-configuration of secure multi-nation military
red side of the network); networks.
• Using a hierarchical controller structure. As a future work, we plan to define a three years research
The main challenges would be as follows: task to investigate the design and deploy of cyber security
functions in coalition networks composed by physical and
• Protocol requirements for running controller interfaces
virtualized network segments. Our goal is to setup a PCN
through a guard (e.g. reliability and flow control); among three or more nations to realize the use cases described
• Message sanitisation requirements, avoiding information
in this paper. The exploratory team concludes that a hands on
leakage from high to low, and avoiding malicious traffic experience with these technologies is fundamental to develop
from low to high security domains; and test intelligent and secure solutions for coalition networks
• Options for integration with control of the domain border
within NATO Science and Technology Organization (STO).
crypto (e.g. how traffic flows should be marked so they
can be appropriately controlled on the black side without ACKNOWLEDGMENT
compromising traffic flow confidentiality). This investigation was part of the Exploratory Team on
B. East/West interfaces for SDN controller federation Cyber Security in Virtualized Networks (IST-ET-114). The
authors thank the Ministry of Defense from their respective
Using SDN in federated environments, (e.g. where there nations for supporting this investigation, namely Finland,
may be multiple coalition partners, or use of third party Germany, Poland, Sweden and United Kingdom.
infrastructure to provide transport), the SDN interfaces may
be crossing not just security boundaries, but also crossing R EFERENCES
administrative boundaries where it is no longer possible to [1] X. Gao, K. Li, and B. Chen, “Invulnerability measure of a military
assume logical centralisation. In this case the controller func- heterogeneous network based on network structure entropy,” IEEE
tions must be logically distributed, for example, different Access, vol. 6, pp. 6700–6708, 2018.
[2] K. Poularakis, G. Iosifidis, and L. Tassiulas, “SDN-enabled tactical
parts of the network may have different priorities about how ad hoc networks: Extending programmable control to the edge,” IEEE
application flows should be able to use their bandwidth, and Communications Magazine, vol. 56, no. 7, pp. 132–138, 2018.
flow installation must be the result of a negotiation rather than [3] I. Zacarias, L. P. Gaspary, A. Kohl, R. Q. Fernandes, J. M. Stocchero,
and E. P. de Freitas, “Combining software-defined and delay-tolerant ap-
a single decision. proaches in last-mile tactical edge networking,” IEEE Communications
The main challenges would be as follows: Magazine, vol. 55, no. 10, pp. 22–29, 2017.
[4] J. Nobre, D. Rosario, C. Both, E. Cerqueira, and M. Gerla, “Toward
• How many negotiation stages between SDN controllers
software-defined battlefield networking,” IEEE Communications Maga-
would be required: would the negotiation just be between zine, vol. 54, no. 10, pp. 152–157, 2016.
the flow source and sink, or can there be transit domains [5] M. R. Brannsten, F. T. Johnsen, T. H. Bloebaum, and K. Lund,
“Toward federated mission networking in the tactical domain,” IEEE
taking part in the negotiation? Communications Magazine, vol. 53, no. 10, pp. 52–58, 2015.
• Flow initiation architectures: does the application initiate [6] IST-ET-114 (COM). Cyber security in
the flow in each domain in parallel, or are flows set up virtualized networks. [Online]. Available:
https://www.sto.nato.int/Lists/test1/activitydetails.aspx?ID=16836
from source to destination? [7] M. S. Vassiliou, J. R. Agre, S. Shah, and T. MacDonald, “Crucial dif-
• Benefits in sharing communications Situational Aware- ferences between commercial and military communications technology
ness (SA) between domains, or should comms SA remain needs: Why the military still needs its own research,” in IEEE Military
Communications Conference (MILCOM), 2013, pp. 342–347.
strictly inter-domain? This relates to the requirements [8] G. Elmasry, “A comparative review of commercial vs. tactical wireless
question of how dynamically the inter-domain commu- networks,” IEEE Communications Magazine, vol. 48, no. 10, pp. 54–59,
nications need to be managed. October 2010.
[9] R. R. F. Lopes, A. Viidanoja, M. Lhotellier, A. Diefenbach, N. Jansen,
and T. Ginzler, “A queuing mechanism for delivering QoS-constrained
V. C ONCLUSIONS AND FUTURE WORK web services in tactical networks,” in International Conference on
This paper discussed how three key technologies, namely Military Communications and Information Systems (ICMCIS), May
2018, pp. 1–8.
SDN, NFV and NSF, can improve the deployment of secure [10] D. Kreutz, F. M. V. Ramos, P. E. Verı́ssimo, C. E. Rothenberg,
and robust virtualized coalition networks in a alliance like S. Azodolmolky, and S. Uhlig, “Software-defined networking: A com-
NATO. This is result of an initial investigation performed prehensive survey,” Proceedings of the IEEE, vol. 103, no. 1, pp. 14–76,
2015.
by the IST-ET-114 exploratory team on cyber security for [11] G. Hallingstad and S. Oudkerk, “Protected core networking: an ar-
virtualized networks. The main motivation for the exploratory chitectural approach to secure and flexible communications,” IEEE
team was to discuss the feasibility of dynamic deployment of Communications Magazine, vol. 46, no. 11, pp. 35–41, 2008.
[12] S. H. Cha, M. Shin, J. Ham, and M. Y. Chung, “Robust mobility
cyber security functions in military communication networks management scheme in tactical communication networks,” IEEE Access,
operated by a nation or as a multi-national federated CIS vol. 6, pp. 15 468–15 479, 2018.

Authorized licensed use limited to: Center for Science Technology and Information (CESTI). Downloaded on December 21,2023 at 10:01:41 UTC from IEEE Xplore. Restrictions apply.
[13] R. R. F. Lopes and S. D. Wolthusen, “Distributed security policies for [33] G. Hallingstad and L. Dandurand, “Communication and Information
service-oriented architectures over tactical networks,” in IEEE Military System Security Capability Breakdown - Revision 4,” NCI Agency, The
Communications Conference (MILCOM), 2015, pp. 1548–1553. Hague, The Netherlands, Tech. Rep., 2013.
[14] R. R. F. Lopes, P. H. Balaraju, P. H. Rettore, and P. Sevenich, “Queuing [34] A. Santos da Silva, J. A. Wickboldt, L. Z. Granville, and A. Schaeffer-
over ever-changing communication scenarios in tactical networks,” IEEE Filho, “ATLANTIC: A framework for anomaly traffic detection, classi-
Transactions on Mobile Computing, pp. 1–15, June 2020, (early access). fication, and mitigation in SDN,” in IEEE/IFIP Network Operations and
[15] R. R. F. Lopes, P. H. Balaraju, and P.Sevenich, “Creating ever-changing Management Symposium (NOMS), 2016, pp. 27–35.
QoS-constrained dataflows in tactical networks: An exploratory study,” [35] W. Navid and M. N. M. Bhutta, “Detection and mitigation of denial
in International Conference on Military Communications and Informa- of service (DoS) attacks using performance aware software defined
tion Systems (ICMCIS), Budva, Montenegro, May 2019, pp. 1–8. networking (SDN),” in International Conference on Information and
[16] R. R. F. Lopes, P. H. Balaraju, A. T. Silva, P. H. Rettore, and P. Sevenich, Communication Technologies (ICICT), 2017, pp. 47–57.
“Experiments with a queuing mechanism over ever-changing datarates [36] F. Battiati, G. Catania, L. Ganga, G. Morabito, A. Mursia, and A. Viola,
in a VHF network,” in IEEE Military Communications Conference “CSSS: Cyber security simulation service for software defined tacti-
(MILCOM), Norfolk VA, USA, November 2019, pp. 712–717. cal networks,” in International Conference on Information Networking
(ICOIN), 2018, pp. 531–533.
[17] R. R. F. Lopes, J. F. Loevenich, P. H. Rettore, S. M. Eswarappa, and
[37] A. Pastor, A. Mozo, D. R. Lopez, J. Folgueira, and A. Kapodistria,
P. Sevenich, “Quantizing radio link data rates to create ever-changing
“The mouseworld, a security traffic analysis lab based on NFV/SDN,”
network conditions in tactical networks,” IEEE Access, vol. 8, pp.
in Proceedings of the 13th International Conference on Availability,
188 015–188 035, September 2020.
Reliability and Security, ser. ARES 2018. New York, NY, USA:
[18] J. Loevenich, R. R. F. Lopes, P. H. Rettore, S. M. Eswarappa, Association for Computing Machinery, 2018. [Online]. Available:
and P. Sevenich, “Maximizing the probability of message deliv- https://doi.org/10.1145/3230833.3233283
ery over ever-changing communication scenarios in tactical net- [38] T. Gibson, “A guard architecture for improved coalition operations,” in
works,” IEEE Networking Letter, pp. 1–5, March 2021, early access, IEEE International Workshop on Information Assurance (IWIAS), 2003,
doi:10.1109/LNET.2021.3066536. pp. 89–94.
[19] E. Haleplidis, K. Pentikousis, S. Denazis, J. H. Salim, D. Meyer, and [39] A. Zaalouk, R. Khondoker, R. Marx, and K. Bayarou, “OrchSec: An
O. Koufopavlou, “Software-Defined Networking (SDN): Layers and orchestrator-based architecture for enhancing network-security using
Architecture Terminology,” RFC 7426, Jan. 2015. [Online]. Available: network monitoring and SDN control functions,” in IEEE Network
https://rfc-editor.org/rfc/rfc7426.txt Operations and Management Symposium (NOMS), 2014, pp. 1–9.
[20] D. F. Macedo, D. Guedes, L. F. M. Vieira, M. A. M. Vieira, and [40] B. Yi, X. Wang, K. Li, S. k. Das, and M. Huang, “A
M. Nogueira, “Programmable networks—from software-defined radio to comprehensive survey of network function virtualization,” Computer
software-defined networking,” IEEE Communications Surveys Tutorials, Networks, vol. 133, pp. 212–262, 2018. [Online]. Available:
vol. 17, no. 2, pp. 1102–1125, 2015. https://www.sciencedirect.com/science/article/pii/S1389128618300306
[21] Z. Latif, K.Sharif, F. Li, M. M. Karim, S. Biswas, and Y. Wang, [41] Y. Li and M. Chen, “Software-defined network function virtualization:
“A comprehensive survey of interface protocols for software defined A survey,” IEEE Access, vol. 3, pp. 2542–2553, 2015.
networks,” Journal of Network and Computer Applications, vol. 156, p. [42] T. Wood, K. K. Ramakrishnan, J. Hwang, G. Liu, and W. Zhang, “To-
102563, 2020. ward a software-based network: integrating software defined networking
[22] Cisco, “2020 Global Networking Trends Report,” 2019. and network function virtualization,” IEEE Network, vol. 29, no. 3, pp.
[Online]. Available: https://www.cisco.com/c/en/us/solutions/enterprise- 36–41, 2015.
networks/networking-technology-trends.html [43] I. J. Sanz, D. M. F. Mattos, and O. C. M. B. Duarte, “SFCPerf: An
[23] S. Y. Zhu, S. Scott-Hayward, L. Jacquin, and R. Hill, Guide to automatic performance evaluation framework for service function chain-
Security in SDN and NFV: Challenges, Opportunities, and Applications. ing,” in IEEE/IFIP Network Operations and Management Symposium
Springer, 01 2017. (NOMS), 2018, pp. 1–9.
[24] C. da Silva, S. Lima, and J. Silva, “Challenges and trends for sampling- [44] L. Bondan, T. Wauters, B. Volckaert, F. De Turck, and L. Z. Granville,
based monitoring in SDN,” in Smart Spaces, and Next Generation “Anomaly detection framework for SFC integrity in NFV environments,”
Networks and Systems: 17th International Conference, NEW2AN 2017, in IEEE Conference on Network Softwarization (NetSoft), 2017, pp. 1–5.
10th Conference, ruSMART 2017, Third Workshop NsCC 2017, 2017, [45] W. Yang and C. Fung, “A survey on security in network functions
pp. 109–120. virtualization,” in IEEE NetSoft Conference and Workshops (NetSoft),
2016, pp. 15–19.
[25] S. Hong, L. Xu, H. Wang, and G. Gu, “Poisoning network visibility
[46] K. Wrona, S. Oudkerk, S. Szwaczyk, and M. Amanowicz, “Content-
in software-defined networks: New attacks and countermeasures,” in
based security and protected core networking with software-defined
Network and Distributed System Security Symposium (NDSS), 2015.
networks,” IEEE Communications Magazine, vol. 54, no. 10, pp. 138–
[26] J. Spencer and T. Willink, “SDN in coalition tactical networks,” in IEEE 144, 2016.
Military Communications Conference (MILCOM), 2016, pp. 1053–1058. [47] K. Wrona, S. Szwaczyk, M. Amanowicz, and K. Gierłowski, “SDN
[27] D. A. Chekired and L. Khoukhi, “Distributed SDN-based C4ISR com- testbed for validation of cross-layer data-centric security policies,” in
munications: A delay-tolerant network for trusted tactical cloudlets,” Proc. of the International Conference on Military Communications and
in 2019 International Conference on Military Communications and Information Systems (ICMCIS), 2017.
Information Systems (ICMCIS), 2019, pp. 1–7. [48] S. Szwaczyk, M. Amanowicz, and K. Wrona, “Applicability of risk
[28] D. Giatsios, K. Choumas, P. Flegkas, T. Korakis, J. J. A. Cruelles, analysis methods to risk-aware routing in software-defined networks,”
and D. C. Mur, “Design and evaluation of a hierarchical SDN control in Proc. of the International Conference on Military Communications
plane for 5g transport networks,” in IEEE International Conference on and Information Systems (ICMCIS), 2018.
Communications (ICC), 2019, pp. 1–6. [49] V. Lefebvre, G. Santinelli, T. Müller, and J. Götzfried, “Universal trusted
[29] CloudSecurityAlliance, “Software Defined Perimeter,” 2013. execution environments for securing SDN/NFV operations,” in Proc.
[Online]. Available: https://downloads.cloudsecurityalliance.org/ini of the 13th International Conference on Availability, Reliability and
tiatives/sdp/SoftwareDefinedPerimeter.pdf Security (ARES), 2018.
[30] A. Sallam, A. Refaey, and A. Shami, “On the security of SDN: A [50] N. Chaillan, “DoD Enterprise DevSecOps Reference Design, V1.0,” US
completed secure and scalable framework using the software-defined Department of Defense, Tech. Rep., 2019.
perimeter,” IEEE Access, vol. 7, pp. 146 577–146 587, 2019. [51] R. Goode, G. Hallingstad, and K. Wrona, “Dynamic federated accredi-
[31] J. Singh, A. Refaey, and A. Shami, “Multilevel security framework for tation,” in Military CIS Conference, Prague, Czech Republic, 2009.
nfv based on software defined perimeter,” IEEE Network, vol. 34, no. 5, [52] K. Wrona, F. M. Scharf, and M. Jarosz, “Security accreditation and soft-
pp. 114–119, 2020. ware approval with smart contracts,” IEEE Communications Magazine,
[32] S. Hares, D. Lopez, M. Zarny, C. Jacquenet, R. Kumar, and J. P. vol. 59, no. 2, pp. 56–62, 2021.
Jeong, “Interface to Network Security Functions (I2NSF): Problem
Statement and Use Cases,” RFC 8192, Jul. 2017. [Online]. Available:
https://rfc-editor.org/rfc/rfc8192.txt

Authorized licensed use limited to: Center for Science Technology and Information (CESTI). Downloaded on December 21,2023 at 10:01:41 UTC from IEEE Xplore. Restrictions apply.

You might also like