Behavior Anomaly Detection in SDN Control Plane:A Case Study of Topology Discovery Attacks

被引:0
|
作者
Chou, Li-Der [1 ]
Liu, Chien-Chang [1 ]
Lai, Meng-Sheng [1 ]
Chiu, Kai-Cheng [1 ]
Tu, Hsuan-Hao [1 ]
Su, Sen [2 ]
Lai, Chun-Lin [2 ]
Yen, Chia-Kuan [2 ]
Tsai, Wei-Hsiang [2 ]
机构
[1] Natl Cent Univ, Dept Comp Sci & Informat Engn, Taoyuan, Taiwan
[2] Natl Chung Shan Inst Sci & Technol, Informat & Commun Res Div, Taoyuan, Taiwan
关键词
Software Defined Networking; topology discovery attacks; OpenFlow Discovery Protocol; Link Layer Discovery Protocol;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The SDN controller uses the OpenFlow Discovery Protocol (OFDP) to collect network topology status. OFDP detects the link between OpenFlow switches by generating Link Layer Discovery Protocol (LLDP) packets. However, OFDP is not a completely secure protocol and can be used by attackers to perform topology discovery injection attacks, topology discovery man-in-the-middle attacks, and topology discovery flood attacks, thereby confusing the network topology. This paper proposes a Correlation-based Topology Anomaly Detection (CTAD) mechanism to run in a software-defined network controller. Spearman's rank correlation is used to analyze the correlation between network traffic between links and measure the time difference between the round trip time of each LLDP frame to determine whether the topology man-in-the-middle attack exists in the network. This paper also adds a dynamic authentication key and counting mechanism in the LLDP frame to prevent attackers from using the topology discovery injection attack to generate fake links and topology discovery flooding attacks, causing network routing or switching abnormalities.
引用
收藏
页码:357 / 362
页数:6
相关论文
共 50 条
  • [41] Anomaly detection using isomorphic analysis for false data injection attacks in industrial control systems
    Zhang, Xinchen
    Jiang, Zhihan
    Ding, Yulong
    Ngai, Edith C. H.
    Yang, Shuang-Hua
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2024, 361 (13):
  • [42] Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions
    Mai, Hoang Long
    Doyen, Guillaume
    Mallouli, Wissam
    de Oca, Edgardo Montes
    Festor, Olivier
    2019 15TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2019,
  • [43] Differentially Private Anomaly Detection with a Case Study on Epidemic Outbreak Detection
    Fan, Liyue
    Xiong, Li
    2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2013, : 833 - 840
  • [44] Hybrid DNN-Dirichlet Anomaly Detection and Ranking: Case of Burned Areas Discovery
    Coca, Mihai
    Coca Neagoe, Iulia
    Datcu, Mihai
    IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2022, 60
  • [45] A hybrid ensemble machine learning model for detecting APT attacks based on network behavior anomaly detection
    Saini, Neeraj
    Kasaragod, Vivekananda Bhat
    Prakasha, Krishna
    Das, Ashok Kumar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (28):
  • [46] Online Recursive Detection and Adaptive Fuzzy Mitigation of Cyber-Physical Attacks Targeting Topology of IMG: An LFC Case Study
    Abazari, Ahmadreza
    Soleymani, Mohammad Mahdi
    Zadsar, Masoud
    Ghafouri, Mohsen
    Assi, Chadi
    Shafie-Khah, Miadreza
    IEEE TRANSACTIONS ON SMART GRID, 2024, 15 (02) : 2129 - 2145
  • [47] Low Rate DDoS Detection Using Weighted Federated Learning in SDN Control Plane in IoT Network
    Ali, Muhammad Nadeem
    Imran, Muhammad
    Din, Muhammad Salah ud
    Kim, Byung-Seo
    APPLIED SCIENCES-BASEL, 2023, 13 (03):
  • [48] High-dimensional time series analysis and anomaly detection: A case study of vehicle behavior modeling and unhealthy state detection
    Alizadeh, Morteza
    Ma, Junfeng
    ADVANCED ENGINEERING INFORMATICS, 2023, 57
  • [49] Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks
    Erba, Alessandro
    Tippenhauer, Nils Ole
    PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, 2022, : 412 - 426
  • [50] Worst-Case Impact Assessment of Multi-Alarm Stealth Attacks Against Control Systems with CUSUM-Based Anomaly Detection
    Gualandi, Gabriele
    Papadopoulos, Alessandro, V
    2023 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING AND SELF-ORGANIZING SYSTEMS, ACSOS, 2023, : 117 - 126