Towards adding digital forensics capabilities in software defined networking based moving target defense

被引:0
作者
Muhammad Faraz Hyder
Tasbiha Fatima
Saadia Arshad
机构
[1] NED University of Engineering and Technology,Department of Software Engineering
[2] NED University of Engineering and Technology,Department of Computer Science & Information Technology
来源
Cluster Computing | 2024年 / 27卷
关键词
Moving target defense; Software defined networking; SDN Forensics; MTD-based SDN forensics; Distributed denial of service attacks;
D O I
暂无
中图分类号
学科分类号
摘要
Moving Target Defense (MTD) is a security technique for Software Defined Networks (SDN) to change the attack surface constantly. Although MTD is an effective technique, it makes the digital forensics procedure challenging due to high transitions in the system state. There is an ever-increasing requirement for SDN forensics due to the increasing number of cyberattacks and the adoption of SDN by large-scale cloud service providers, telecommunication operators, and internet service providers. In this paper, we have proposed a digital forensics scheme for MTD-based SDN to record every movement of the MTD for collecting attack-related evidence, especially the attacker (attack source), to augment the forensics investigation. The proposed technique consists of a three-level logging mechanism. The first one is the native logging technique of ONOS. The second is a Java-based logging application called “Java ONOS Logs Collector (JOLC)”, developed to capture MTD-based SDN logs. Lastly, we utilized the Fluentd unified logging tool to dig out evidential data from MTD logs. The experimental testbed comprises an ONOS SDN controller, Mininet, and an event-based MTD application running over SDN using JSON FlowRule scripts on the ONOS controller while using sflow-rt to detect the level of attack/number of packets sent by the attacker. The native ONOS logging mechanism provides initial-level artifacts. The developed JOLC application creates separate files for ONOS and Mininet/host machine logs stored with the current timestamp. Fluentd generates a single file for the SDN controller, Mininet, and host machine logs, along with the flow rule entry into the SDN controller. Experimental results confirmed that our proposed multi-level forensics technique successfully collected all the relevant records.
引用
收藏
页码:893 / 912
页数:19
相关论文
共 105 条
[1]  
Iqbal M(2019)Security issues in software defined networking (SDN): risks, challenges and potential solutions Int. J. Adv. Comput. Sci. Appl. 10 298-303
[2]  
Iqbal F(2020)Solutions to vulnerabilities and threats in software defined networking (SDN) Procedia Comput. Sci. 171 2581-2589
[3]  
Mohsin F(2019)An SDN-based MTD model Concurr. Comput. 31 4897-1941
[4]  
Rizwan M(2020)A survey of moving target defenses for network security IEEE Commun. Surv. Tutor. 22 1909-745
[5]  
Ahmad F(2020)Toward proactive, adaptive defense: a survey on moving target defense IEEE Commun. Surv. Tutor. 22 709-108
[6]  
Pradhan A(2019)The application of software defined networking on securing computer networks: a survey J. Netw. Comput. Appl. 131 89-177
[7]  
Mathew R(2020)Software-defined networking approaches for link failure recovery: A survey Sustainability 12 4255-13
[8]  
Yang Y(2015)Assessing the effectiveness of moving target defenses using security models IEEE Trans. Dependable Secure Comput. 13 163-33
[9]  
Cheng L(2021)Future technology: software-defined network (SDN) forensic Symmetry 13 767-622
[10]  
Sengupta S(2020)Security in SDN: a comprehensive survey J. Netw. Comput. Appl. 159 102595-11