Implementation of a SDN Architecture Observer: Detection of Failure, Distributed Denial-of-Service and Unauthorized Intrusion

被引:2
|
作者
Desgeorges, Loic [1 ]
Georges, Jean-Philippe [1 ]
Divoux, Thierry [1 ]
机构
[1] Univ Lorraine, CNRS, CRAN, F-54000 Nancy, France
关键词
SOFTWARE-DEFINED NETWORKING; SECURITY; CONTROLLERS;
D O I
10.1155/2023/7244541
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-defined networking was recently introduced and proposed to separate the control from the data plane. This architecture introduces new challenges, particularly with regard to security and safety. To address the safety challenges, it is necessary to set up a multi controller architecture to provide redundancy. In addition, the second controller can have a security benefit because it can be used to validate the decisions taken by the first controller. However, communication between the controllers is necessary in these architectures, which may be exploited by an attacker to spread across the controllers, resulting in a security issue. This study aims to develop a multi controller architecture without communication between controllers. The control is executed by the nominal controller, which performs the data plane computation, whereas the second controller is in charge of verifying the consistency of the controller's decisions, i.e., the management traffic. We first formulated the activity of the command and then provided conditions to determine a consistent control. These conditions include a time boundary, which corresponds to the tolerance for a delay in the response time of the controller, and structural properties to verify the consistency of the path setup. Moreover, we proposed a detection algorithm that is divided into two parts: first, a learning phase that aims to learn the consistent path set up by the controller, and second, a running phase which aims to verify that the controller sets up paths that are similar to the learned path. This algorithm was evaluated in terms of its reactivity, precision, and recall. To evaluate this, we considered three use cases: a distributed denial of service (DDOS) attack, an attack to send malicious packets on the network, and a failure of the controller.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Distributed denial-of-service and intrusion detection
    Zhou, Xiaobo
    Xu, Cheng-Zhong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 819 - 822
  • [2] A denial-of-service resistant intrusion detection architecture
    Mell, P
    Marks, D
    McLarnon, M
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2000, 34 (04): : 641 - 658
  • [3] Intrusion Detection Systems' Performance for Distributed Denial-of-Service Attack
    de Sousa Araujo, Tiago Emilio
    Matos, Fernando Menezes
    Moreira, Josilene Aires
    2017 CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (CHILECON), 2017,
  • [4] Intrusion Prevention Against Distributed Denial-of-Service(DDoS) on the cloud
    Vanitha, R.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04): : 90 - 96
  • [5] IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks
    Chan, EYK
    Chan, HW
    Chan, KM
    Chan, VPS
    Chanson, ST
    Cheung, MMH
    Chong, CF
    Chow, KP
    Hui, AKT
    Hui, LCK
    Lam, LCK
    Lau, WC
    Pun, KKH
    Tsang, AYF
    Tsang, WW
    Tso, SCW
    Yeung, DY
    Yu, KY
    I-SPAN 2004: 7TH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND NETWORKS, PROCEEDINGS, 2004, : 581 - 586
  • [6] A Low-Cost Distributed Denial-of-Service Attack Architecture
    Huang, Kaifan
    Yang, Lu-Xing
    Yang, Xiaofan
    Xiang, Yong
    Tang, Yuan Yan
    IEEE ACCESS, 2020, 8 : 42111 - 42119
  • [7] On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic
    Feng, Yebo
    Li, Jun
    Sisodia, Devkishen
    Reiher, Peter
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2211 - 2226
  • [8] An adaptive observer design for denial-of-service attack detection in platoon
    Zhang, Xiaofei
    Du, Haiping
    Jia, Zhijuan
    Cui, Chi
    Cheng, Yage
    Yan, Yan
    OPTIMAL CONTROL APPLICATIONS & METHODS, 2023, 44 (04): : 2148 - 2165
  • [9] Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud
    Phan, Trung, V
    Park, Minho
    IEEE ACCESS, 2019, 7 : 18701 - 18714
  • [10] Denial-of-Service Attacks in OpenFlow SDN Networks
    Kandoi, Rajat
    Antikainen, Markku
    PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 1322 - 1326