Controlling Your Neighbour's Bandwidth for Fun and for Profit

被引:5
|
作者
Weekes, Jonathan [1 ]
Nagaraja, Shishir [1 ]
机构
[1] Univ Lancaster, Lancaster, England
来源
SECURITY PROTOCOLS XXV | 2017年 / 10476卷
关键词
D O I
10.1007/978-3-319-71075-4_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We carry out a systematic study of the attack-resilience of flow-rule replacement strategies for switch caches in Software-Defined Networks. Flow Rules are inserted into the switch at the request of the network hosts to direct traffic- replacing older rules when the switch flow table is full. Malicious hosts can leverage the flow rule replacement strategy to launch cache flushing attacks. This results in substantially reducing the network throughput of their neighbours forcing their traffic to slow down dramatically. We describe and evaluate the attack on the First-In-First-Out strategy- the defacto SDN flow-rule replacement strategy.
引用
收藏
页码:214 / 223
页数:10
相关论文
共 50 条