Enhancing security in Software-Defined Networks: An approach to efficient ARP spoofing attacks detection and mitigation

被引:2
|
作者
Hnamte, Vanlalruata [1 ]
Hussain, Jamal [1 ]
机构
[1] Mizoram Univ, Dept Math & Comp Sci, Aizawl 796004, Mizoram, India
来源
关键词
Software-Defined Networking; ARP spoofing; Security; Anomaly detection; Network resilience;
D O I
10.1016/j.teler.2024.100129
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
The proliferation of Software-Defined Networks (SDNs) has introduced unparalleled flexibility and efficiency to network management, but at the same time, it has introduced new challenges in securing network infrastructures. Among these challenges, Address Resolution Protocol (ARP) spoofing attacks remain a pervasive threat, compromising network integrity and data confidentiality. In this manuscript, we present an approach to ARP spoofing mitigation within SDNs, addressing the limitations of existing methodologies. Our proposed solution employs a multifaceted strategy that combines dynamic ARP cache management, real-time traffic analysis, and adaptive flow rule orchestration. Central to our approach is a dedicated device that continuously monitors the network topology and detects any deviations from established norms. Notably, our solution adapts seamlessly to networks of varying sizes, ensuring scalability and efficacy across diverse infrastructures. One of our key contributions is the integration of a deep learning-based Deep Neural Network (DNN) model to detect and mitigate ARP spoofing attacks. Leveraging a self-generated ARP spoofing dataset from SDN environments, our model demonstrates exceptional accuracy and adaptability, enhancing the network's capability to identify and counter such threats effectively. Our approach showcases exceptional reliability, achieving 100% accuracy rate in detection of ARP spoofing, which is crucial for sustaining network responsiveness.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Semantic Security Tools in Software-Defined Networks
    Antoshina, E. Ju.
    Chalyy, D. Ju.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (07) : 605 - 607
  • [42] Software-Defined Radio GNSS Instrumentation for Spoofing Mitigation: A Review and a Case Study
    Schmidt, Erick
    Ruble, Zachary
    Akopian, David
    Pack, Daniel J.
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2019, 68 (08) : 2768 - 2784
  • [43] A Proposal for IP Spoofing Mitigation at Origin in Homenet Using Software-Defined Networking
    Ramos, Manoel F.
    Dalmazo, Bruno L.
    Nobre, Jeferson C.
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2019, PT I: 19TH INTERNATIONAL CONFERENCE, SAINT PETERSBURG, RUSSIA, JULY 1-4, 2019, PROCEEDINGS, PT I, 2019, 11619 : 179 - 192
  • [44] Enhancing Security Management at Software-Defined Exchange Points
    Kumar, Himal
    Gharakheili, Hassan Habibi
    Russell, Craig
    Sivaraman, Vijay
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (04): : 1479 - 1492
  • [45] Safeguarding Software-Defined Networks: Comprehensive Frameworks and Best Practices for Security Threat Mitigation
    Verma, Jyoti
    Snehi, Manish
    Kansa, Isha
    Kumar, Rajiv
    Goel, Kanu
    Singh, Ranvijay
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2025,
  • [46] A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks
    Jain, Ankit Kumar
    Shukla, Hariom
    Goel, Diksha
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (09): : 13129 - 13164
  • [47] Detecting Link Fabrication Attacks in Software-Defined Networks
    Smyth, Dylan
    McSweeney, Sean
    O'Shea, Donna
    Cionca, Victor
    2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017), 2017,
  • [48] A Cost-Effective MTD Approach for DDoS Attacks in Software-Defined Networks
    Javadpour, Amir
    Ja'fari, Forough
    Taleb, Tarik
    Shojafar, Mohammad
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 4173 - 4178
  • [49] Identifier Binding Attacks and Defenses in Software-Defined Networks
    Jero, Samuel
    Koch, William
    Skowyra, Richard
    Okhravi, Hamed
    Nita-Rotaru, Cristina
    Bigelow, David
    PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), 2017, : 415 - 432
  • [50] DoS vulnerabilities and mitigation strategies in software-defined networks
    Deng, Shuhua
    Gao, Xing
    Lu, Zebin
    Li, Zhengfa
    Gao, Xieping
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 125 : 209 - 219