A two-phase detection method against APT attack on flow table management in SDN

被引:1
|
作者
He, Xinfeng [1 ,2 ]
Sun, Shuchao [1 ,2 ]
机构
[1] Hebei Univ, Sch Cyber Secur & Comp, Baoding 071002, Peoples R China
[2] Key Lab High Trusted Informat Syst Hebei Prov, Baoding 071002, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2023年 / 79卷 / 14期
关键词
Software-defined networking; Flow table management; APT attacks; B-P neural network;
D O I
10.1007/s11227-023-05281-5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Long-term occupation of flow table can occur in the management mechanism of software-defined networking (SDN), which is a prerequisite for APT attacks. The task of detecting such APT attacks in existent research is mainly undertaken by the controller, which results in high computation overhead. To address this problem, a two-phase detection method for APT attacks on flow table management (TMAF) is proposed in this paper. Firstly, the suspicious flow entries are pre-detected in the SDN switch according to the periodicity of the packet. Secondly, the five-dimensional features of suspicious flow entries are selected according to the characteristics of packets in load and frequency, and then the B-P neural network on the controller for further analysis. Experiments show that TMAF reduces the controller's load and improves the detection efficiency and accuracy compared to existing works. Additionally, the potential risk of APT attacks can be reduced to a certain extent.
引用
收藏
页码:15415 / 15434
页数:20
相关论文
共 50 条
  • [1] A two-phase detection method against APT attack on flow table management in SDN
    Xinfeng He
    Shuchao Sun
    The Journal of Supercomputing, 2023, 79 : 15415 - 15434
  • [2] The APT Detection Method based on Attack Tree for SDN
    Jia Shan-Shan
    Xu Ya-Bin
    ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 116 - 121
  • [3] The APT Detection Method in SDN
    Jia Shan-Shan
    Xu Ya-Bin
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1240 - 1245
  • [4] Flow Table Saturation Attack against Dynamic Timeout Mechanisms in SDN
    Shen, Yi
    Wu, Chunming
    Kong, Dezhang
    Cheng, Qiumei
    APPLIED SCIENCES-BASEL, 2023, 13 (12):
  • [5] A Detection Method for DDoS Attack against SDN Controller
    Meng, Linhai
    Guo, Xiao
    PROCEEDINGS OF THE 4TH ANNUAL INTERNATIONAL CONFERENCE ON MATERIAL ENGINEERING AND APPLICATION (ICMEA 2017), 2017, 146 : 292 - 296
  • [6] Securing P4-SDN Data Plane against Flow Table Modification Attack
    Reddy, Buchammagari Avinash
    Sahoo, Kshira Sagar
    Bhuyan, Monowar
    PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [7] A Two-Phase Wormhole Attack Detection Scheme in MANETs
    Shamaei, Shiva
    Movaghar, Ali
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 6 (02): : 183 - 191
  • [8] Method for Overflow Attack Defense of SDN Network Flow Table Based on Stochastic Differential Equation
    Zhao, Xinhui
    Wang, Qingxian
    Wu, Zehui
    Guo, Rui
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (04) : 3431 - 3447
  • [9] Method for Overflow Attack Defense of SDN Network Flow Table Based on Stochastic Differential Equation
    Xinhui Zhao
    Qingxian Wang
    Zehui Wu
    Rui Guo
    Wireless Personal Communications, 2021, 117 : 3431 - 3447
  • [10] An APT Attack Detection Method Based on eBPF and Transformer
    Qiu, Rixuan
    Luo, Hao
    Jing, Sitong
    Li, Xinxiu
    Li, Yuancheng
    International Journal of Network Security, 2024, 26 (06) : 964 - 972