Mitigating Timing Side-Channel Attacks in Software-Defined Networks: Detection and Response

被引:2
|
作者
Shoaib, Faizan [1 ]
Chow, Yang-Wai [1 ]
Vlahu-Gjorgievska, Elena [1 ]
Nguyen, Chau [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
来源
TELECOM | 2023年 / 4卷 / 04期
关键词
software-defined networking; side-channel attacks; timing attacks; machine learning; intrusion detection; intrusion response; FRAMEWORK; DEFENSES;
D O I
10.3390/telecom4040038
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Software-defined networking (SDN) is an innovative technology that has the potential to enhance the scalability, flexibility, and security of telecommunications networks. The emergence and development of SDNs have introduced new opportunities and challenges in the telecommunications industry. One of the major challenges encountered by SDNs is the timing side-channel attacks. These attacks exploit timing information to expose sensitive data, including flow tables, routes, controller types, and ports, which pose a significant threat to communication networks. Existing techniques for mitigating timing side-channel attacks primarily focus on limiting them via network architectural changes. This significantly increases the overhead of SDNs and makes it difficult to identify the origin of the attack. To secure resilient integration of SDN in telecommunications networks, it is necessary to conduct comprehensive research that not only identifies the attack activity, but also formulates an adequate response. In this paper, we propose a detection and response solution for timing side-channel attacks in SDN. We used a machine learning-based approach to detect the probing activity and identify the source. To address the identified timing side-channel attack queries, we propose a response mechanism. This entails devising a feedback-oriented response to counter the identified source, such as blocking or diverting it, while minimising any adverse effects on legitimate network traffic. This methodology is characterised by an automated data-driven approach that enables prompt and effective responses. The architecture of this security solution ensures that it has a minimal impact on network traffic and resource usage as it is designed to be used in conjunction with SDN. The overall design findings show that our detection approach is 94% precise in identifying timing side-channel attacks in SDN when compared with traditional mitigation strategies. Additionally, the response mechanism employed by this approach yielded highly customised and precise responses, resulting in an impressive accuracy score of 97.6%.
引用
下载
收藏
页码:877 / 900
页数:24
相关论文
共 50 条
  • [1] Preventing Timing Side-Channel Attacks in Software-Defined Networks
    Shoaib, Faizan
    Chow, Yang-Wai
    Vlahu-Gjorgievska, Elena
    2021 IEEE ASIA-PACIFIC CONFERENCE ON COMPUTER SCIENCE AND DATA ENGINEERING (CSDE), 2021,
  • [2] Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
    Wichelmann, Jan
    Paetschke, Anna
    Wilke, Luca
    Eisenbarth, Thomas
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6789 - 6806
  • [3] DoSGuard: Mitigating Denial-of-Service Attacks in Software-Defined Networks
    Li, Jishuai
    Tu, Tengfei
    Li, Yongsheng
    Qin, Sujuan
    Shi, Yijie
    Wen, Qiaoyan
    SENSORS, 2022, 22 (03)
  • [4] Mitigating Timing-Based NoC Side-Channel Attacks With LLC Remapping
    Kar, Anurag
    Liu, Xueyang
    Kim, Yonghae
    Saileshwar, Gururaj
    Kim, Hyesoon
    Krishna, Tushar
    IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 22 (01) : 53 - 56
  • [5] Parasite: Mitigating Physical Side-Channel Attacks Against Neural Networks
    Chabanne, Herve
    Danger, Jean-Luc
    Guiga, Linda
    Kuhne, Ulrich
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2021, 2022, 13162 : 148 - 167
  • [6] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [7] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [8] Mitigating attacks in software defined networks
    Kallol Krishna Karmakar
    Vijay Varadharajan
    Uday Tupakula
    Cluster Computing, 2019, 22 : 1143 - 1157
  • [9] Mitigating attacks in software defined networks
    Karmakar, Kallol Krishna
    Varadharajan, Vijay
    Tupakula, Uday
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (04): : 1143 - 1157
  • [10] Adaptive Bubble Burst (ABB): Mitigating DDoS Attacks in Software-Defined Networks
    Sattar, Danish
    Matrawy, Ashraf
    Adeojo, Olufemi
    2016 17TH INTERNATIONAL TELECOMMUNICATIONS NETWORK STRATEGY AND PLANNING SYMPOSIUM (NETWORKS), 2016, : 50 - 55