Watermarking for Detecting Freeloader Misbehavior in Software-Defined Networks

被引:0
|
作者
Park, Younghee [1 ]
Chang, Sang-Yoon [2 ]
Krishnamurthy, Lavanya M. [1 ]
机构
[1] San Jose State Univ, Comp Engn, San Jose, CA 95192 USA
[2] Adv Digital Sci Ctr, Singapore, Singapore
关键词
Software-defined networking; OpenFlow; Open Vswtich; Network-based attacks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Software-defined networking (SDN) provides network operators a high level of flexibility and programmability through the separation of the control plane from the data plane. When initiating traffic, users are required to install flow rules that direct the traffic routing. This process requires communication between control and data plane and results in significant overhead and enables the controller to monitor the traffic and its source. In this paper, we introduce a novel misbehavior, called freeloading, where attackers bypass the process of installing flow rules. The attackers thus can send traffic with an unfair advantage in delay (enabling them to launch more timely threats) and significantly reduce the risk of attacker detection by the network controller (especially if further threats were launched). To prevent such attack, we develop a flow watermarking technique that embeds a secret message into the data payload. It facilitates ownership of the established flow rules, so that only the legitimate owners of flow rules can send packets using their own rules and the network can help detect the misuse cases of the installed flow rules.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Detecting Saturation Attacks in Software-Defined Networks
    Li, Zhiyuan
    Xing, Weijia
    Xu, Dianxiang
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 163 - 168
  • [2] Detecting Link Fabrication Attacks in Software-Defined Networks
    Smyth, Dylan
    McSweeney, Sean
    O'Shea, Donna
    Cionca, Victor
    [J]. 2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017), 2017,
  • [3] SPHINX: Detecting Security Attacks in Software-Defined Networks
    Dhawan, Mohan
    Poddar, Rishabh
    Mahajan, Kshiteej
    Mann, Vijay
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [4] FADE: Detecting Forwarding Anomaly in Software-Defined Networks
    Pang, Chunhui
    Jiang, Yong
    Li, Qi
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [5] Detecting Cyberattacks to Federated Learning on Software-Defined Networks
    Babbar, Himanshi
    Rani, Shalli
    Singh, Aman
    Gianini, Gabriele
    [J]. MANAGEMENT OF DIGITAL ECOSYSTEMS, MEDES 2023, 2024, 2022 : 120 - 132
  • [6] Detecting Intrusion Using Multiple Datasets in Software-Defined Networks
    Dang, Quang-Vinh
    [J]. FUTURE DATA AND SECURITY ENGINEERING. BIG DATA, SECURITY AND PRIVACY, SMART CITY AND INDUSTRY 4.0 APPLICATIONS, FDSE 2022, 2022, 1688 : 739 - 746
  • [7] Detecting DDoS based on attention mechanism for Software-Defined Networks
    Yoon, Namkyung
    Kim, Hwangnam
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 230
  • [8] Languages for Software-Defined Networks
    Foster, Nate
    Guha, Arjun
    Reitblatt, Mark
    Story, Alec
    Freedman, Michael J.
    Katta, Naga Praveen
    Monsanto, Christopher
    Reich, Joshua
    Rexford, Jennifer
    Schlesinger, Cole
    Walker, David
    Harrison, Major Robert
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (02) : 128 - 134
  • [9] On the Fingerprinting of Software-Defined Networks
    Cui, Heng
    Karame, Ghassan O.
    Klaedtke, Felix
    Bifulco, Roberto
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2160 - 2173
  • [10] Abstractions for Software-Defined Networks
    Casado, Martin
    Foster, Nate
    Guha, Arjun
    [J]. COMMUNICATIONS OF THE ACM, 2014, 57 (10) : 86 - 95