Detecting Saturation Attacks in Software-Defined Networks

被引:0
|
作者
Li, Zhiyuan [1 ]
Xing, Weijia [2 ]
Xu, Dianxiang [3 ]
机构
[1] Jiangsu Univ, Dept Cybersecur, Zhenjiang 212013, Jiangsu, Peoples R China
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA 95618 USA
[3] Boise State Univ, Dept Comp Sci, Boise, ID 83725 USA
关键词
software-defined networking; security; saturation attack; intrusion detection; self-similarity of network traffic;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software-Defined Networking (SDN) is a new networking paradigm that has revolutionized network architectures. The separation of data and control planes improves the efficiency of packet delivery. However, there exist various security attacks against SDN systems. For example, a saturation attack may disturb the normal delivery of packets and even make the SDN system out of service by flooding the data plane, the control plane, or both. This paper presents an anomaly detection method, called SA-Detector, for dealing with a family of saturation attacks. SA Detector builds upon the study of self-similarity of OpenFlow traffic, which has shown that the normal and abnormal traffic patterns between the controller and the OpenFlow switches have different characteristics. We have evaluated the performance of SA-Detector with different time scales, network scales, Internet applications, and attack implementations. The experimental results show that the average accuracy is 96.54% and the average precision is 92.06%. This indicates that SA-Detector is effective for detecting saturation attacks.
引用
收藏
页码:163 / 168
页数:6
相关论文
共 50 条
  • [1] Detecting Link Fabrication Attacks in Software-Defined Networks
    Smyth, Dylan
    McSweeney, Sean
    O'Shea, Donna
    Cionca, Victor
    [J]. 2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017), 2017,
  • [2] SPHINX: Detecting Security Attacks in Software-Defined Networks
    Dhawan, Mohan
    Poddar, Rishabh
    Mahajan, Kshiteej
    Mann, Vijay
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [3] Detecting and Mitigating Botnet Attacks in Software-Defined Networks Using Deep Learning Techniques
    Nadeem, Muhammad Waqas
    Goh, Hock Guan
    Aun, Yichiet
    Ponnusamy, Vasaki
    [J]. IEEE ACCESS, 2023, 11 : 49153 - 49171
  • [4] Identifier Binding Attacks and Defenses in Software-Defined Networks
    Jero, Samuel
    Koch, William
    Skowyra, Richard
    Okhravi, Hamed
    Nita-Rotaru, Cristina
    Bigelow, David
    [J]. PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), 2017, : 415 - 432
  • [5] LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking
    Ambrosin, Moreno
    Conti, Mauro
    De Gaspari, Fabio
    Poovendran, Radha
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (02) : 1206 - 1219
  • [6] Watermarking for Detecting Freeloader Misbehavior in Software-Defined Networks
    Park, Younghee
    Chang, Sang-Yoon
    Krishnamurthy, Lavanya M.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016,
  • [7] FADE: Detecting Forwarding Anomaly in Software-Defined Networks
    Pang, Chunhui
    Jiang, Yong
    Li, Qi
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [8] Detecting Cyberattacks to Federated Learning on Software-Defined Networks
    Babbar, Himanshi
    Rani, Shalli
    Singh, Aman
    Gianini, Gabriele
    [J]. MANAGEMENT OF DIGITAL ECOSYSTEMS, MEDES 2023, 2024, 2022 : 120 - 132
  • [9] Effective Topology Tampering Attacks and Defenses in Software-Defined Networks
    Skowyra, Richard
    Xu, Lei
    Gu, Guofei
    Dedhia, Veer
    Hobson, Thomas
    Okhravi, Hamed
    Landry, James
    [J]. 2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, : 374 - 385
  • [10] Detection and Prevention of DoS attacks in Software-Defined Cloud Networks
    Rengaraju, Perumalraja
    Ramanan, Raja, V
    Lung, Chung-Horng
    [J]. 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, 2017, : 217 - 223