Behavior Anomaly Detection in SDN Control Plane:A Case Study of Topology Discovery Attacks

被引:0
|
作者
Chou, Li-Der [1 ]
Liu, Chien-Chang [1 ]
Lai, Meng-Sheng [1 ]
Chiu, Kai-Cheng [1 ]
Tu, Hsuan-Hao [1 ]
Su, Sen [2 ]
Lai, Chun-Lin [2 ]
Yen, Chia-Kuan [2 ]
Tsai, Wei-Hsiang [2 ]
机构
[1] Natl Cent Univ, Dept Comp Sci & Informat Engn, Taoyuan, Taiwan
[2] Natl Chung Shan Inst Sci & Technol, Informat & Commun Res Div, Taoyuan, Taiwan
关键词
Software Defined Networking; topology discovery attacks; OpenFlow Discovery Protocol; Link Layer Discovery Protocol;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The SDN controller uses the OpenFlow Discovery Protocol (OFDP) to collect network topology status. OFDP detects the link between OpenFlow switches by generating Link Layer Discovery Protocol (LLDP) packets. However, OFDP is not a completely secure protocol and can be used by attackers to perform topology discovery injection attacks, topology discovery man-in-the-middle attacks, and topology discovery flood attacks, thereby confusing the network topology. This paper proposes a Correlation-based Topology Anomaly Detection (CTAD) mechanism to run in a software-defined network controller. Spearman's rank correlation is used to analyze the correlation between network traffic between links and measure the time difference between the round trip time of each LLDP frame to determine whether the topology man-in-the-middle attack exists in the network. This paper also adds a dynamic authentication key and counting mechanism in the LLDP frame to prevent attackers from using the topology discovery injection attack to generate fake links and topology discovery flooding attacks, causing network routing or switching abnormalities.
引用
收藏
页码:357 / 362
页数:6
相关论文
共 50 条
  • [1] Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks
    Chou, Li-Der
    Liu, Chien-Chang
    Lai, Meng-Sheng
    Chiu, Kai-Cheng
    Tu, Hsuan-Hao
    Su, Sen
    Lai, Chun-Lin
    Yen, Chia-Kuan
    Tsai, Wei-Hsiang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [2] Combination Attacks and Defenses on SDN Topology Discovery
    Kong, Dezhang
    Shen, Yi
    Chen, Xiang
    Cheng, Qiumei
    Liu, Hongyan
    Zhang, Dong
    Liu, Xuan
    Chen, Shuangxi
    Wu, Chunming
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2023, 31 (02) : 904 - 919
  • [3] Vulnerabilities in SDN Topology Discovery Mechanism: Novel Attacks and Countermeasures
    Deng, Shuhua
    Dai, Wenjie
    Qing, Xian
    Gao, Xieping
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2541 - 2551
  • [4] An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures
    Marin, Eduard
    Bucciol, Nicola
    Conti, Mauro
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1101 - 1114
  • [5] An in-depth look into SDN topology discovery mechanisms: Novel attacks and practical countermeasures
    Marin, Eduard
    Bucciol, Nicola
    Conti, Mauro
    Proceedings of the ACM Conference on Computer and Communications Security, 2019, : 1101 - 1114
  • [6] Attacks on Industrial Control Systems Modeling and Anomaly Detection
    Eigner, Oliver
    Kreimel, Philipp
    Tavolato, Paul
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 581 - 588
  • [7] Analyzing behavior of DDoS attacks to identify DDoS detection features in SDN
    Dayal, Neelam
    Srivastava, Shashank
    2017 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2017, : 274 - 281
  • [8] User Behavior Anomaly Detection for Application Layer DDoS Attacks
    Najafabadi, Maryam M.
    Khoshgoftaar, Taghi M.
    Calvert, Chad
    Kemp, Clifford
    2017 IEEE 18TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI 2017), 2017, : 154 - 161
  • [9] SDNShield: Towards More Comprehensive Defense against DDoS Attacks on SDN Control Plane
    Chen, Kuan-yin
    Junuthula, Anudeep Reddy
    Siddhrau, Ishant Kumar
    Xu, Yang
    Chao, H. Jonathan
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 28 - 36
  • [10] Combined Control and Data Plane Robustness of SDN Networks against Malicious Node Attacks
    Santos, Dorabella
    de Sousa, Amaro
    Machuca, Carmen Mas
    2018 14TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2018, : 54 - 62