[go: up one dir, main page]

Skowyra et al., 2018 - Google Patents

Effective topology tampering attacks and defenses in software-defined networks

Skowyra et al., 2018

View PDF
Document ID
9881220294833838233
Author
Skowyra R
Xu L
Gu G
Dedhia V
Hobson T
Okhravi H
Landry J
Publication year
Publication venue
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

External Links

Snippet

As Software-Defined Networking has gained increasing prominence, new attacks have been demonstrated which can corrupt the SDN controller's view of network topology. These topology poisoning attacks, most notably host-location hijacking and link fabrication attacks …
Continue reading at par.nsf.gov (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/06Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
    • H04L41/0654Network fault recovery
    • H04L41/0659Network fault recovery by isolating the faulty entity
    • H04L41/0663Network fault recovery by isolating the faulty entity involving offline failover planning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/08Monitoring based on specific metrics
    • H04L43/0805Availability
    • H04L43/0817Availability functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/08Monitoring based on specific metrics
    • H04L43/0805Availability
    • H04L43/0811Connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/16Arrangements for monitoring or testing packet switching networks using threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/06Report generation

Similar Documents

Publication Publication Date Title
Skowyra et al. Effective topology tampering attacks and defenses in software-defined networks
Birkinshaw et al. Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks
Dayal et al. Research trends in security and DDoS in SDN
Marin et al. An in-depth look into SDN topology discovery mechanisms: Novel attacks and practical countermeasures
Hong et al. Poisoning network visibility in software-defined networks: New attacks and countermeasures.
Karmakar et al. Mitigating attacks in software defined networks
Bello et al. On sustained zero trust conceptualization security for mobile core networks in 5g and beyond
Kyung et al. HoneyProxy: Design and implementation of next-generation honeynet via SDN
Chung et al. NICE: Network intrusion detection and countermeasure selection in virtual network systems
Jero et al. Beads: Automated attack discovery in openflow-based sdn systems
US7823204B2 (en) Method and apparatus for detecting intrusions on a computer system
Krishnan et al. SDN/NFV security framework for fog‐to‐things computing infrastructure
Hlavacek et al. DISCO: Sidestepping RPKI's deployment barriers
Hussein et al. Software-Defined Networking (SDN): the security review
Kong et al. Combination attacks and defenses on sdn topology discovery
Ahmed et al. Modelling cyber security for software-defined networks those grow strong when exposed to threats: Analysis and propositions
Grigoryan et al. Enabling cooperative IoT security via software defined networks (SDN)
Feldmann et al. NetCo: Reliable routing with unreliable routers
Jeyanthi et al. Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment
Ádám et al. Artificial neural network based IDS
Gomez et al. Controller-oblivious dynamic access control in software-defined networks
Khosravifar et al. An experience improving intrusion detection systems false alarm ratio by using honeypot
Mahmood et al. Review paper on neighbour discovery protocol in IPv6 link-local network
DeCusatis et al. Zero trust cloud networks using transport access control and high availability optical bypass switching
Thimmaraju et al. Preacher: Network policy checker for adversarial environments