Mitigating attacks in software defined networks

被引:17
|
作者
Karmakar, Kallol Krishna [1 ]
Varadharajan, Vijay [1 ,2 ]
Tupakula, Uday [3 ]
机构
[1] Univ Newcastle, Adv Cyber Secur Engn Res Ctr, Callaghan, NSW 2308, Australia
[2] Univ Newcastle, Adv Cyber Secur Engn Res Ctr, Cybersecur, Callaghan, NSW 2308, Australia
[3] Univ Newcastle, Sch Elect Engn & Comp, Callaghan, NSW 2308, Australia
关键词
Software defined networking (SDN) security; Threat model; Policy control;
D O I
10.1007/s10586-018-02900-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Future network innovation lies in software defined networking (SDN). This innovative technology has revolutionised the networking world for half a decade and contributes to transform legacy network architectures. This transformation blesses the networking world with improved performance and quality of service. However, security for SDN remains an afterthought. In this paper we present a detailed discussion of some of the attacks possible in SDN and techniques to deal with the attacks. The threat model will consider some significantly vulnerable areas in SDN which can lead to severe network security breaches. In particular, we describe different attacks such as attacks on the Controller, attacks on networking devices, attacks exploiting the communication links between the control plane and the data plane and different types of topology poisoning attacks. We then propose techniques to deal with some of the attacks in SDN. We make use of northbound security application on the Controller and OpenFlow agents in the networking devices for enforcing security policies in the data plane. The security application is used for specification and storage of the security policies and to make decisions on the enforcement of security policies to deal with different types of attacks. We will describe the prototype implementation of our approach using ONOS Controller and demonstrate its effectiveness against different types of attacks.
引用
收藏
页码:1143 / 1157
页数:15
相关论文
共 50 条
  • [21] Mitigation and Detection of DDoS Attacks in Software Defined Networks
    Murtuza, Shariq
    Asawa, Krishna
    2018 ELEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2018, : 389 - 391
  • [22] Mitigating DDoS Attacks Using OpenFlow-Based Software Defined Networking
    Jonker, Mattijs
    Sperotto, Anna
    INTELLIGENT MECHANISMS FOR NETWORK CONFIGURATION AND SECURITY, 2015, 9122 : 129 - 133
  • [23] Identifier Binding Attacks and Defenses in Software-Defined Networks
    Jero, Samuel
    Koch, William
    Skowyra, Richard
    Okhravi, Hamed
    Nita-Rotaru, Cristina
    Bigelow, David
    PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), 2017, : 415 - 432
  • [24] Time Inference Attacks on Software Defined Networks: Challenges and Countermeasures
    Khorsandroo, Sajad
    Tosun, Ali Saman
    PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2018, : 342 - 349
  • [25] Mitigation of DDoS attacks in Software Defined Networks at application level
    Sanjeetha, R.
    Benoor, Pallavi
    Kanavalli, Anita
    2019 PHD COLLOQUIUM ON ETHICALLY DRIVEN INNOVATION AND TECHNOLOGY FOR SOCIETY (PHD EDITS), 2019,
  • [26] Detecting Link Fabrication Attacks in Software-Defined Networks
    Smyth, Dylan
    McSweeney, Sean
    O'Shea, Donna
    Cionca, Victor
    2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017), 2017,
  • [27] A Study on Various Attacks and Detection Methodologies in Software Defined Networks
    Singh, Sukhvinder
    Jayakumar, S. K. V.
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (01) : 675 - 697
  • [28] Slow denial-of-service attacks on software defined networks
    Interdisciplinary Centre for Security, Reliability and Trust , University of Luxembourg, Luxembourg
    不详
    不详
    Comput. Networks, 2020,
  • [29] A Study on Various Attacks and Detection Methodologies in Software Defined Networks
    Sukhvinder Singh
    S. K. V. Jayakumar
    Wireless Personal Communications, 2020, 114 : 675 - 697
  • [30] Flow Table Overflow Attacks in Software Defined Networks: A Survey
    Zhao, Changqing
    Liao, Ling Xia
    Chao, Han-Chieh
    Lai, Roy Xiaorong
    Zhang, Miao
    JOURNAL OF INTERNET TECHNOLOGY, 2023, 24 (07): : 1391 - 1401