Digital Forensic Readiness Approach for Potential Evidence Preservation in Software-Defined Networks

被引:0
作者
Munkhondya, Howard [1 ]
Ikuesan, Adeyemi [1 ]
Venter, Hein [1 ]
机构
[1] Univ Pretoria, Dept Comp Sci, Digital Forens Sci Res Grp, Pretoria, South Africa
来源
PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019) | 2019年
关键词
software defined networking; software defined networking vulnerabilities; software defined networking threat countermeasures; digital forensics; volatile data collection; digital forensic readiness;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A software-defined network (SDN), unlike the traditional networking environment, is an emerging network architecture that decouples the control plane from the data plane and creates an open interface between the two planes. SDN enables organizations to design and implement innovative networks in a much simpler and flexible way. These opportunities could, however, expose the network to potentially new security challenges such as scanning, spoofing, and denial-of-service attacks, as well as the single-point-of-failure vulnerability of the network. Digital forensics approach is one way of addressing these challenges. However, with the traditional digital forensics investigation approach, evidence can be lost as a result of digital artifacts contamination or deletion by an attacker if the control plane is compromised. Additionally, the volatility of a software-defined network architecture could result in overwritten event-logs prior to evidence identification and acquisition process. As an approach towards a reliable evidence preservation, this study developed a proactive mechanism for the identification, handling, collection, and preservation of digital artifacts in an SDN. The mechanism integrates digital forensics readiness approach to the acquisition and preservation of volatile potential evidence. Using a series of experimental observation, the mechanism developed in this study was evaluated and the result shows that reliable evidence can be proactively collected in a typical SDN in a forensically sound manner. Furthermore, the result augments the viability of performing forensic investigation in an SDN. The proposed mechanism could be used to effectively preserve and improve the security structure of the SDN without interfering with the SDN operational processes.
引用
收藏
页码:268 / 276
页数:9
相关论文
共 29 条
[1]  
Adeyemi I. R., 2017, Leveraging human thinking style for user attribution in digital forensic process, V7, P198, DOI [10.18517/ijaseit.7.1.1383, DOI 10.18517/IJASEIT.7.1.1383]
[2]   A Review of Current Research in Network Forensic Analysis [J].
Adeyemi, Ikuesan R. ;
Razak, Shukor Abd ;
Azhan, Nor Amira Nor .
INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2013, 5 (01) :1-26
[3]  
[Anonymous], 2013, P 2 ACM SIGCOMM WORK
[4]  
Ballard JereyR., 2010, P USENIX INTERNET NE, P8
[5]  
Benabbou J., 2015, SOFTWARE DEFINED NET, P79
[6]  
Caloyannides M.A., 2001, ARTECH H COMP SEC LI
[7]  
Chao TW, 2016, 2016 IEEE NETSOFT CONFERENCE AND WORKSHOPS (NETSOFT), P465, DOI 10.1109/NETSOFT.2016.7502486
[8]  
Cisar P., 2011, Proceedings of the 2011 IEEE 9th International Symposium on Intelligent Systems and Informatics (SISY 2011), P343, DOI 10.1109/SISY.2011.6034350
[9]   Packet Injection Attack and Its Defense in Software-Defined Networks [J].
Deng, Shuhua ;
Gao, Xing ;
Lu, Zebin ;
Gao, Xieping .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) :695-705
[10]   NOX: Towards an operating system for networks [J].
Gude, Natasha ;
Koponen, Teemu ;
Pettit, Justin ;
Pfaff, Ben ;
Casado, Martin ;
McKeown, Nick ;
Shenker, Scott .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2008, 38 (03) :105-110