Software-Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges

被引:30
|
作者
Khan, Suleman [1 ]
Gani, Abdullah [1 ]
Wahab, Ainuddin Wahid Abdul [1 ]
Abdelaziz, Ahmed [1 ]
Ko, Kwangman [2 ]
Khan, Muhammad Khurram [3 ]
Guizani, Mohsen [4 ]
机构
[1] Univ Malaya, Ctr Mobile Cloud Comp Res, Kuala Lumpur, Malaysia
[2] Sangji Univ, Sch IT Engn, Wonju, South Korea
[3] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11451, Saudi Arabia
[4] Univ Idaho, Moscow, ID 83843 USA
来源
IEEE NETWORK | 2016年 / 30卷 / 06期
关键词
15;
D O I
10.1109/MNET.2016.1600051NM
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The separation of the control plane from the data plane of a switch enables abstraction of a network through a logically centralized controller. The controller functions as the "brain" of a software-defined network. However, centralized control draws attackers to exploit different network devices by hijacking the controller. Security was initially not a key characteristic of SDN architecture, which left it vulnerable to various attackers. The investigation of such attacks in the newly emerging SDN architecture is a challenging task. Therefore, a comprehensive forensic mechanism is required to investigate different forms of attacks by determining their root cause. This article discusses an important area in SDN security, SDN forensics, which until now has received minimal focus. We compare traditional network forensics with SDN forensics to highlight the key differences between them. A brief motivation for SDN forensics is presented to emphasize its significance. Moreover, the potential locations with possible evidence against attackers are identified in SDN. Key requirements are highlighted for SDN forensics with respect to baseline investigation procedures. Finally, we identify challenges in SDN forensics by highlighting potential research areas for researchers, investigators, and academicians.
引用
收藏
页码:6 / 13
页数:8
相关论文
共 50 条
  • [41] A Review of Research on Software-Defined Optical Network
    Li Wei
    Yang Zhe
    Zhao Weihu
    Qi Zhengwei
    Liu Fei
    [J]. 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA & SMART CITY (ICITBS), 2019, : 155 - 160
  • [42] Load balancing for software-defined network: a review
    Srivastava, Vivek
    Pandey, Ravi Shankar
    [J]. International Journal of Computers and Applications, 2022, 44 (08) : 746 - 759
  • [43] Software-defined network support for transport resilience
    Araujo, Joao Taveira
    Landa, Raul
    Clegg, Richard G.
    Pavlou, George
    [J]. 2014 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2014,
  • [44] Securing the Software-Defined Network Control Layer
    Porras, Phillip
    Cheung, Steven
    Fong, Martin
    Skinner, Keith
    Yegneswaran, Vinod
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [45] Defensive Cyber Operations in a Software-Defined Network
    Parker, Thomas
    Jones, Jeremy
    Mayberry, Joshua
    Chanman, Gassium
    Staples, Zachary
    Tummala, Murali
    McEachen, John
    [J]. PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 5561 - 5568
  • [46] Survey of Consistent Software-Defined Network Updates
    Foerster, Klaus-Tycho
    Schmid, Stefan
    Vissicchio, Stefano
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1435 - 1461
  • [47] A FORENSIC METHODOLOGY FOR SOFTWARE-DEFINED NETWORK SWITCHES
    Chin, Tommy
    Xiong, Kaiqi
    [J]. ADVANCES IN DIGITAL FORENSICS XIII, 2017, 511 : 97 - 110
  • [48] How to Handle ARP in a Software-Defined Network
    di Lallo, Roberto
    Lospoto, Gabriele
    Rimondini, Massimo
    Di Battista, Giuseppe
    [J]. 2016 IEEE NETSOFT CONFERENCE AND WORKSHOPS (NETSOFT), 2016, : 63 - 67
  • [49] A Dynamically Configurable Network for Software-Defined Hardware
    Butera, William
    [J]. 2020 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2020,
  • [50] Software-Defined Network Function Virtualization: A Survey
    Li, Yong
    Chen, Min
    [J]. IEEE ACCESS, 2015, 3 : 2542 - 2553