An approach for detecting encrypted insider attacks on OpenFlow SDN Networks

被引:0
|
作者
Neu, Charles V. [1 ]
Zorzo, Avelino F. [2 ]
Orozco, Alex M. S. [3 ]
Michelin, Regio A. [4 ]
机构
[1] Univ Santa Cruz Sul UNISC, Santa Cruz Do Sul, Brazil
[2] Pontifical Univ Rio Grande Sul PUCRS, Porto Alegre, RS, Brazil
[3] Sul Rio Grandense Fed Inst IFSul, Pelotas, Brazil
[4] Fed Inst Rio Grande Sul IFRS, Rio Grande, RS, Brazil
关键词
Cryptography; encrypted attacks; insider attacks; SDN; security; network attack; IDS; OpenFlow; OpenDay-light;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Data traffic on the Internet is growing continuously due to the high number of connected devices and increased number of applications and transactions performed online. To ensure information security, integrity and confidentiality, cryptography is applied over transmitted or stored data. Hence, even if an attacker capture data packets, its reading is hampered or not even possible. However, an attacker can also use cryptography to mask an attack in order to avoid detection, for example, by an Intrusion Detection System (IDS). Recent studies in network technologies introduced a new paradigm called Software Defined Networking (SDN). By decoupling data and control plans, the SDN architecture allows centralizing the network management, intelligence and control into a single point, called Controller. The OpenFlow protocol, widely adopted in SDN, provides specific messages to get statistical information of an OpenFlow switch. A Controller can request this information, which enables the development of new IDS models to detect encrypted attacks. In this work, we intend to identify encrypted insider attacks in SDN by developing a new IDS approach that can detect encrypted attacks.
引用
收藏
页码:210 / 215
页数:6
相关论文
共 50 条
  • [21] A roadmap for traffic engineering in SDN-OpenFlow networks
    Akyildiz, Ian F.
    Lee, Ahyoung
    Wang, Pu
    Luo, Min
    Chou, Wu
    COMPUTER NETWORKS, 2014, 71 : 1 - 30
  • [22] Neural Networks Ensemble Approach for Detecting Attacks in Computer Networks
    Bukhtoyarov, Vladimir
    Semenkin, Eugene
    2012 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2012,
  • [23] Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks
    Ivannikova, Elena
    Zolotukhin, Mikhail
    Hamalainen, Timo
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 531 - 543
  • [24] Next generation networks under the SDN and OpenFlow protocol architecture
    Martinez, C.
    Ferro, R.
    Ruiz, W.
    2015 WORKSHOP ON ENGINEERING APPLICATIONS - INTERNATIONAL CONGRESS ON ENGINEERING (WEA), 2015,
  • [25] Deterministic OpenFlow: Performance Evaluation of SDN Hardware for Avionic Networks
    Heise, Peter
    Geyer, Fabien
    Obermaisser, Roman
    2015 11TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2015, : 372 - 377
  • [26] Extending OpenFlow for SDN-enabled Synchronous Ethernet networks
    Suarez, Raul
    Rincon, David
    Sallent, Sebastia
    2015 1ST IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT), 2015,
  • [27] A New Approach for Detection of Insider Attacks
    Sen, Sevil
    2013 21ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2013,
  • [28] Detecting attacks on networks
    Herringshaw, C
    COMPUTER, 1997, 30 (12) : 16 - 17
  • [29] Experience of Developing an OpenFlow SDN Prototype for Managing IPTV Networks
    Thorpe, Christina
    Olariu, Cristian
    Hava, Adriana
    McDonagh, Patrick
    PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 966 - 971
  • [30] SDN-Guard: DoS Attacks Mitigation in SDN Networks
    Dridi, Lobna
    Zhani, Mohamed Faten
    2016 5TH IEEE INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (IEEE CLOUDNET), 2016, : 212 - 217