Behavior Anomaly Detection in SDN Control Plane:A Case Study of Topology Discovery Attacks

被引:0
|
作者
Chou, Li-Der [1 ]
Liu, Chien-Chang [1 ]
Lai, Meng-Sheng [1 ]
Chiu, Kai-Cheng [1 ]
Tu, Hsuan-Hao [1 ]
Su, Sen [2 ]
Lai, Chun-Lin [2 ]
Yen, Chia-Kuan [2 ]
Tsai, Wei-Hsiang [2 ]
机构
[1] Natl Cent Univ, Dept Comp Sci & Informat Engn, Taoyuan, Taiwan
[2] Natl Chung Shan Inst Sci & Technol, Informat & Commun Res Div, Taoyuan, Taiwan
关键词
Software Defined Networking; topology discovery attacks; OpenFlow Discovery Protocol; Link Layer Discovery Protocol;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The SDN controller uses the OpenFlow Discovery Protocol (OFDP) to collect network topology status. OFDP detects the link between OpenFlow switches by generating Link Layer Discovery Protocol (LLDP) packets. However, OFDP is not a completely secure protocol and can be used by attackers to perform topology discovery injection attacks, topology discovery man-in-the-middle attacks, and topology discovery flood attacks, thereby confusing the network topology. This paper proposes a Correlation-based Topology Anomaly Detection (CTAD) mechanism to run in a software-defined network controller. Spearman's rank correlation is used to analyze the correlation between network traffic between links and measure the time difference between the round trip time of each LLDP frame to determine whether the topology man-in-the-middle attack exists in the network. This paper also adds a dynamic authentication key and counting mechanism in the LLDP frame to prevent attackers from using the topology discovery injection attack to generate fake links and topology discovery flooding attacks, causing network routing or switching abnormalities.
引用
收藏
页码:357 / 362
页数:6
相关论文
共 50 条
  • [21] A Comparative Study for Accuracy of Anomaly Detection Methods of Adaptive Flow Counting in SDN
    Garg, Gagandeep
    Garg, Roopali
    2015 2ND INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN ENGINEERING & COMPUTATIONAL SCIENCES (RAECS), 2015,
  • [22] A Study on Detection of Anomaly Behavior in Automation Industry
    Ryu, SuMi
    Kang, Young-Jin
    Lee, HoonJae
    2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, : 377 - 380
  • [23] Comparative study for control plane scalability approaches in SDN productive networks
    Nxumalo, Mandisa N.
    Mba, Ijeoma
    Adigun, Matthew O.
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICET), 2017,
  • [24] Sparse Control and Data plane Telemetry features for BGP anomaly detection
    Cordova-Garcia, Jose
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM 2019 WKSHPS), 2019, : 240 - 245
  • [25] Unsupervised Discovery, Control, and Disentanglement of Semantic Attributes With Applications to Anomaly Detection
    Paul, William
    Wang, I-Jeng
    Alajaji, Fady
    Burlina, Philippe
    NEURAL COMPUTATION, 2021, 33 (03) : 802 - 826
  • [26] Online false discovery rate control for anomaly detection in time series
    Rebjock, Quentin
    Kurt, Baris
    Januschowski, Tim
    Callot, Laurent
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34
  • [27] A Case for Systematic Detection and Rigorous Location of SDN Control Conflicts
    Lin, Lan
    Sun, Xin
    PROCEEDINGS OF THE 2018 IEEE 43RD CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2018, : 291 - 294
  • [28] Mitigating DDoS Attacks in SDN-Based IoT Networks Leveraging Secure Control and Data Plane Algorithm
    Wang, Song
    Gomez, Karina
    Sithamparanathan, Kandeepan
    Asghar, Muhammad Rizwan
    Russello, Giovanni
    Zanna, Paul
    APPLIED SCIENCES-BASEL, 2021, 11 (03): : 1 - 27
  • [29] Interaction Context-Aware Network Behavior Anomaly Detection for Discovering Unknown Attacks
    Qin, Zhi-Quan
    Xu, Hong-Zuo
    Ma, Xing-Kong
    Wang, Yong-Jun
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [30] A Case Study of Anomaly Detection in Industrial Environments
    Zou, Jianfeng
    Jin, Xueqi
    Zhang, Lei
    Wang, Yueqiang
    Li, Bo
    2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 294 - 298