2022
DOI: 10.1038/s41598-022-12858-2
|View full text |Cite
|
Sign up to set email alerts
|

A data plane security model of segmented routing based on SDP trust enhancement architecture

Abstract: Segment routing (SR) technology is a new network functional technology derived from MPLS technology and based on SDN. Combining SR with software-defined perimeter (SDP), a new network security technology, is expected to solve the traditional problems such as data monitoring, denial of service, and new threats such as loop attack and label detection faced by SR data plane. Focusing on the security management of access devices in the SR data plane, first, this paper proposes an SR security model SbSR (SDP-based … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 23 publications
(13 reference statements)
0
1
0
Order By: Relevance
“…SbSR (SDP based SR)30 ZbSR (ZTA based SR)Problem orientedThe terminal device of the SR network data planeThe switching device of the SR network data plane Modeling The migration model of the mature SDP model is carried out Based on the concept of ZTA, a new ZTA model is designed by adding security components and reassembling the original functional components Assessment Port scanning; Traffic monitoring; DoS attack; Topology detection based on label detection; Routing loop attack based on directional label; Performance overhead Control plane message tampering; Data plane loop attack; Identity deception; Back door utilization; DOS attack; Performance overhead Figure 2. ZbSR security model.…”
mentioning
confidence: 99%
“…SbSR (SDP based SR)30 ZbSR (ZTA based SR)Problem orientedThe terminal device of the SR network data planeThe switching device of the SR network data plane Modeling The migration model of the mature SDP model is carried out Based on the concept of ZTA, a new ZTA model is designed by adding security components and reassembling the original functional components Assessment Port scanning; Traffic monitoring; DoS attack; Topology detection based on label detection; Routing loop attack based on directional label; Performance overhead Control plane message tampering; Data plane loop attack; Identity deception; Back door utilization; DOS attack; Performance overhead Figure 2. ZbSR security model.…”
mentioning
confidence: 99%