An approach for detecting encrypted insider attacks on OpenFlow SDN Networks

被引:0
|
作者
Neu, Charles V. [1 ]
Zorzo, Avelino F. [2 ]
Orozco, Alex M. S. [3 ]
Michelin, Regio A. [4 ]
机构
[1] Univ Santa Cruz Sul UNISC, Santa Cruz Do Sul, Brazil
[2] Pontifical Univ Rio Grande Sul PUCRS, Porto Alegre, RS, Brazil
[3] Sul Rio Grandense Fed Inst IFSul, Pelotas, Brazil
[4] Fed Inst Rio Grande Sul IFRS, Rio Grande, RS, Brazil
关键词
Cryptography; encrypted attacks; insider attacks; SDN; security; network attack; IDS; OpenFlow; OpenDay-light;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Data traffic on the Internet is growing continuously due to the high number of connected devices and increased number of applications and transactions performed online. To ensure information security, integrity and confidentiality, cryptography is applied over transmitted or stored data. Hence, even if an attacker capture data packets, its reading is hampered or not even possible. However, an attacker can also use cryptography to mask an attack in order to avoid detection, for example, by an Intrusion Detection System (IDS). Recent studies in network technologies introduced a new paradigm called Software Defined Networking (SDN). By decoupling data and control plans, the SDN architecture allows centralizing the network management, intelligence and control into a single point, called Controller. The OpenFlow protocol, widely adopted in SDN, provides specific messages to get statistical information of an OpenFlow switch. A Controller can request this information, which enables the development of new IDS models to detect encrypted attacks. In this work, we intend to identify encrypted insider attacks in SDN by developing a new IDS approach that can detect encrypted attacks.
引用
收藏
页码:210 / 215
页数:6
相关论文
共 50 条
  • [31] Strategies for detecting and mitigating DDoS attacks in SDN: A survey
    Joelle, Misenga Mumpela
    Park, Young-Hoon
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (06) : 5913 - 5925
  • [32] Machine-Learning Techniques for Detecting Attacks in SDN
    Elsayed, Mahmoud Said
    Nhien-An Le-Khac
    Dev, Soumyabrata
    Jurcut, Anca Delia
    PROCEEDINGS OF 2019 IEEE 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2019), 2019, : 277 - 281
  • [33] Mitigating Denial of Service (DoS) Attacks in OpenFlow Networks
    Oktian, Yustus Eko
    Lee, SangGon
    Lee, HoonJae
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 325 - 330
  • [34] Detecting Saturation Attacks in SDN via Machine Learning
    Khamaiseh, Sarver
    Serra, Edoardo
    Li, Zhiyuan
    Xu, Dianxiang
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND SECURITY (ICCCS), 2019,
  • [35] Detecting Saturation Attacks Based on Self-Similarity of OpenFlow Traffic
    Li, Zhiyuan
    Xing, Weijia
    Khamaiseh, Samer
    Xu, Dianxiang
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01): : 607 - 621
  • [36] An approach for detecting and distinguishing errors versus attacks in sensor networks
    Basile, Claudio
    Gupta, Meeta
    Kalbarczyk, Zbigniew
    Iyer, Ravi K.
    DSN 2006 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, : 473 - 482
  • [37] Implications and Detection of DoS Attacks in OpenFlow-based Networks
    Hommes, Stefan
    State, Radu
    Engel, Thomas
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 537 - 543
  • [38] Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
    Ali, Tariq Emad
    Chong, Yung-Wey
    Manickam, Selvakumar
    APPLIED SCIENCES-BASEL, 2023, 13 (05):
  • [39] Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding
    Komiya, Ryousuke
    Feng, Yaokai
    Sakurai, Kouichi
    2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 417 - 423
  • [40] Detecting DoS Attacks Based on Multi-Features in SDN
    Yue, Meng
    Wang, Huaiyuan
    Liu, Liang
    Wu, Zhijun
    IEEE ACCESS, 2020, 8 : 104688 - 104700