scholarly journals Link Discovery Attacks in Software-Defined Networks: Topology Poisoning and Impact Analysis

2020 ◽  
pp. 596-606
Author(s):  
Sonali Sen Baidya ◽  
◽  
Rattikorn Hewett

Software Defined Networking (SDN) has become a popular technology that offers advantages of programmable and flexible network management over the legacy practice. The centralized SDN controller is an important enabler of these benefits. One of the most crucial tasks of the SDN controller is link discovery as it provides topology of the network essential for the controller to direct or create rule forwarding and routing mechanisms. Much research on SDN security has been studied but only recently that security of OpenFlow link discovery protocols and topology poisoning have been addressed. Existing work includes link fabrication attacks via compromised hosts and defense systems with authentication. This paper discusses SDN link discovery process and its vulnerability to link discovery attacks including new attacks via compromised switches. We present a simple but effective defense mechanism using active ports that can detect both host-based and switch-based link discovery attacks. Finally, the paper presents an analytical and empirical analysis of the impacts of topology attacks on routing. The paper discusses attack details, proposed methods and results of these analyses.

2021 ◽  
Author(s):  
Pragati Shrivastava ◽  
Kotaro Kataoka

<p>The hybrid software-defined networks (SDN) architectures are beneficial for a smooth transition and less costly SDN deployment. However, legacy switches and SDN switches coexistence brings new challenges of deployment inconsistency management and security. Security is not well studied for hybrid SDN architecture. In this paper, we study the topology poisoning attacks in hybrid SDN for the first time. We propose new attack vectors for link fabrication in hybrid SDN. The new attack is named “multi-hop link fabrication”, in which an adversary successfully injects a fake multi-hop link (MHL) by exploiting the link discovery protocols. We presented the Hybrid-Shield, a link verification framework for hybrid SDN link discovery. Hybrid-Shield introduces a novel verification technique that includes: i) monitoring legacy switch and host generated traffic at MHL and ii) validating the existence of legacy switches contained in an MHL. This paper presents the prototype implementation of Hybrid-Shield over a real SDN controller. The experimental evaluation is performed with the mininet virtual network emulation. Our evaluation shows that Hybrid-Shield is capable of detecting MHL fabrication attacks in real-time with high accuracy. Hybrid-Shield’s performance evaluation shows that it is lightweight at the controller as it causes less overhead and requires no additional functionalities at the SDN controller for deployment.</p>


2021 ◽  
Author(s):  
Pragati Shrivastava ◽  
Kotaro Kataoka

<p>The hybrid software-defined networks (SDN) architectures are beneficial for a smooth transition and less costly SDN deployment. However, legacy switches and SDN switches coexistence brings new challenges of deployment inconsistency management and security. Security is not well studied for hybrid SDN architecture. In this paper, we study the topology poisoning attacks in hybrid SDN for the first time. We propose new attack vectors for link fabrication in hybrid SDN. The new attack is named “multi-hop link fabrication”, in which an adversary successfully injects a fake multi-hop link (MHL) by exploiting the link discovery protocols. We presented the Hybrid-Shield, a link verification framework for hybrid SDN link discovery. Hybrid-Shield introduces a novel verification technique that includes: i) monitoring legacy switch and host generated traffic at MHL and ii) validating the existence of legacy switches contained in an MHL. This paper presents the prototype implementation of Hybrid-Shield over a real SDN controller. The experimental evaluation is performed with the mininet virtual network emulation. Our evaluation shows that Hybrid-Shield is capable of detecting MHL fabrication attacks in real-time with high accuracy. Hybrid-Shield’s performance evaluation shows that it is lightweight at the controller as it causes less overhead and requires no additional functionalities at the SDN controller for deployment.</p>


2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Shang-Chiuan Su ◽  
Yi-Ren Chen ◽  
Shi-Chun Tsai ◽  
Yi-Bing Lin

Software Defined Network separates the control plane from network equipment and has great advantage in network management as compared with traditional approaches. With this paradigm, the security issues persist to exist and could become even worse because of the flexibility on handling the packets. In this paper we propose an effective framework by integrating SDN and machine learning to detect and categorize P2P network traffics. This work provides experimental evidence showing that our approach can automatically analyze network traffic and flexibly change flow entries in OpenFlow switches through the SDN controller. This can effectively help the network administrators manage related security problems.


2014 ◽  
Vol E97.B (1) ◽  
pp. 2-9 ◽  
Author(s):  
Slawomir KUKLINSKI ◽  
Prosper CHEMOUIL

2020 ◽  
pp. 399-410
Author(s):  
Jawad Dalou' ◽  
Basheer Al-Duwairi ◽  
Mohammad Al-Jarrah

Software Defined Networking (SDN) has emerged as a new networking paradigm that is based on the decoupling between data plane and control plane providing several benefits that include flexible, manageable, and centrally controlled networks. From a security point of view, SDNs suffer from several vulnerabilities that are associated with the nature of communication between control plane and data plane. In this context, software defined networks are vulnerable to distributed denial of service attacks. In particular, the centralization of the SDN controller makes it an attractive target for these attacks because overloading the controller with huge packet volume would result in bringing the whole network down or degrade its performance. Moreover, DDoS attacks may have the objective of flooding a network segment with huge traffic volume targeting single or multiple end systems. In this paper, we propose an entropy-based mechanism for Distributed Denial of Service (DDoS) attack detection and mitigation in SDN networks. The proposed mechanism is based on the entropy values of source and destination IP addresses of flows observed by the SDN controller which are compared to a preset entropy threshold values that change in adaptive manner based on network dynamics. The proposed mechanism has been evaluated through extensive simulation experiments.


2020 ◽  
Author(s):  
Catherine M. Mageeney ◽  
Hamidu T. Mohammed ◽  
Marta Dies ◽  
Samira Anbari ◽  
Netta Cudkevich ◽  
...  

ABSTRACTA diverse set of prophage-mediated mechanisms protecting bacterial hosts from infection has been recently uncovered within Cluster N mycobacteriophages. In that context, we unveil a novel defense mechanism in Cluster N prophage Butters. By using bioinformatics analyses, phage plating efficiency experiments, microscopy, and immunoprecipitation assays, we show that Butters genes located in the central region of the genome play a key role in the defense against heterotypic viral attack. Our study suggests that a two component system articulated by interactions between protein products of genes 30 and 31 confers defense against heterotypic phage infection by PurpleHaze or Alma, but is insufficient to confer defense against attack by the heterotypic phage Island3. Therefore, based on heterotypic phage plating efficiencies on the Butters lysogen, additional prophage genes required for defense are implicated.IMPORTANCEMany sequenced bacterial genomes including pathogenic bacteria contain prophages. Some prophages encode defense systems that protect their bacterial host against heterotypic viral attack. Understanding the mechanisms undergirding these defense systems will be critical to development of phage therapy that circumvents these defenses. Additionally, such knowledge will help engineer phage-resistant bacteria of industrial importance.


Sign in / Sign up

Export Citation Format

Share Document