Effective Topology Tampering Attacks and Defenses in Software-Defined Networks

被引:52
|
作者
Skowyra, Richard [1 ]
Xu, Lei [2 ]
Gu, Guofei [2 ]
Dedhia, Veer [1 ]
Hobson, Thomas [1 ]
Okhravi, Hamed [1 ]
Landry, James [1 ]
机构
[1] MIT, Lincoln Lab, 244 Wood St, Lexington, MA 02173 USA
[2] Texas A&M Univ, College Stn, TX USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/DSN.2018.00047
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As Software-Defined Networking has gained increasing prominence, new attacks have been demonstrated which can corrupt the SDN controller's view of network topology. These topology poisoning attacks, most notably host-location hijacking and link fabrication attacks, enable adversaries to impersonate end-hosts or inter-switch links in order to monitor, corrupt, or drop network flows. In response, defenses have been developed to detect such attacks and raise an alert. In this paper, we analyze two such defenses, TopoGuard and Sphinx, and present two new attacks, Port Probing and Port Amnesia, that can successfully bypass them. We then develop and present extensions to TopoGuard to make it resilient to such attacks.
引用
收藏
页码:374 / 385
页数:12
相关论文
共 50 条
  • [31] Self-Healing Topology Discovery Protocol for Software-Defined Networks
    Ochoa-Aday, Leonardo
    Cervello-Pastor, Cristina
    Fernandez-Fernandez, Adriana
    [J]. IEEE COMMUNICATIONS LETTERS, 2018, 22 (05) : 1070 - 1073
  • [32] Languages for Software-Defined Networks
    Foster, Nate
    Guha, Arjun
    Reitblatt, Mark
    Story, Alec
    Freedman, Michael J.
    Katta, Naga Praveen
    Monsanto, Christopher
    Reich, Joshua
    Rexford, Jennifer
    Schlesinger, Cole
    Walker, David
    Harrison, Major Robert
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (02) : 128 - 134
  • [33] Effective software-defined networking controller scheduling method to mitigate DDoS attacks
    Yan, Q.
    Gong, Q.
    Yu, F. R.
    [J]. ELECTRONICS LETTERS, 2017, 53 (07) : 469 - 471
  • [34] The forensics of ddos attacks in the fifth generation mobile networks based on software-defined networks
    Sedaghat, Shahrzad
    [J]. Sedaghat, Shahrzad (shsedaghat@jahromu.ac.ir), 1600, Femto Technique Co., Ltd. (22): : 41 - 53
  • [35] On the Security of Software-Defined Networks
    Prasad, Abhinandan S.
    Koll, David
    Fu, Xiaoming
    [J]. 2015 FOURTH EUROPEAN WORKSHOP ON SOFTWARE DEFINED NETWORKS - EWSDN 2015, 2015, : 105 - 106
  • [36] Software-Defined Access Networks
    Elbers, Joerg-Peter
    Grobe, Klaus
    Magee, Anthony
    [J]. 2014 EUROPEAN CONFERENCE ON OPTICAL COMMUNICATION (ECOC), 2014,
  • [37] Abstractions for Software-Defined Networks
    Casado, Martin
    Foster, Nate
    Guha, Arjun
    [J]. COMMUNICATIONS OF THE ACM, 2014, 57 (10) : 86 - 95
  • [38] On the Fingerprinting of Software-Defined Networks
    Cui, Heng
    Karame, Ghassan O.
    Klaedtke, Felix
    Bifulco, Roberto
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2160 - 2173
  • [39] Fingerprinting Software-defined Networks
    Bifulco, Roberto
    Cui, Heng
    Karame, Ghassan O.
    Klaedtke, Felix
    [J]. 2015 IEEE 23RD INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2015, : 453 - 459
  • [40] Software-Defined Access Networks
    Kerpez, Kenneth J.
    Cioffi, John M.
    Ginis, George
    Goldburg, Marc
    Galli, Stefano
    Silverman, Peter
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (09) : 152 - 159