Robustness-as-evolvability: building a dynamic control plane with Software-Defined Networking
Lead Research Organisation:
University of Edinburgh
Department Name: Sch of Informatics
Abstract
Abstracts are not currently available in GtR for all funded research. This is normally because the abstract was not required at the time of proposal submission, but may be because it included sensitive information such as personal details.
Organisations
Publications
Clausen H
(2021)
CBAM: A Contextual Model for Network Anomaly Detection
in Computers
Galpin V
(2018)
STATISTICAL ANALYSIS OF Carma MODELS: AN ADVANCED TUTORIAL
Galpin V
(2018)
Mesoscopic Modelling of Pedestrian Movement Using C arma and Its Tools
in ACM Transactions on Modeling and Computer Simulation
Tammana P
(2015)
CherryPick
Tammana P.
(2016)
Simplifying datacenter network debugging with PathDump
in Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016
Tammara P
(2016)
Simplifying Datacenter Network Debugging with PathDump
Wen Z
(2018)
ApproxIoT: Approximate Analytics for Edge Computing
Description | Our findings concerned several new techniques to analyse complex networks used in data centres, to ensure that they are performing securely and efficiently. First, we developed some new techniques for debugging or detecting security in datacenters based on analysing network activity between external devices ("edges"), without needing to employ increasingly complex methods necessary to inspect behaviour inside the network. These prevalent "in-network" methods are becoming complex and difficult to apply as the networking infrastructure itself becomes more complicated, they also impact performance. Our simpler model, demonstrated in a tool called PathDump, uses a sophisticated query language to provide much of the functionality of more complex in-network methods. Second, also with the aim to provide more efficient analysis of networks and their design, we introduced a technique combining several mathematical models of covert channels in data centre networks. We exemplified the techniques by examining an attack called "sneak peak" where an insider leaks data to an attacker outside an organisation (but to hosts inside the same cloud data centre), by using a shared network connection to covertly send information, without directly contacting the attacker. The importance of the method is that it allows to analyse trade-offs between performance and mitigations implemented to thwart the attack. (The situation is a bit like the famous "Meltdown" and "Spectre" CPU vulnerabilities, but inside a datacentre rather than a CPU). |
Exploitation Route | We are building on our techniques with more research. In the future, our methods may be adopted by network engineers, network security analysts and designers, to help design and inspect complex networking infrastructures. |
Sectors | Digital/Communication/Information Technologies (including Software) |
URL | http://groups.inf.ed.ac.uk/security/RasE/publications/ |
Description | Research Institute in Verified Trustworthy Software Systems (VeTSS) |
Amount | £654,850 (GBP) |
Funding ID | EP/P021921/1 |
Organisation | Engineering and Physical Sciences Research Council (EPSRC) |
Sector | Public |
Country | United Kingdom |
Start | 03/2017 |
End | 02/2023 |
Title | Software models of cloud computing data exfiltration attacks and defences |
Description | The software was developed for a paper published in the conference IFIP 2018. It is made available for other researchers building on our work. |
Type Of Technology | Software |
Year Produced | 2018 |
Open Source License? | Yes |
Impact | N/A |
URL | http://groups.inf.ed.ac.uk/security/RasE/ifipsec18/ |