Traffic-based Malicious Switch Detection in SDN

被引:3
|
作者
Du, Xiaodong [1 ]
Wang, Ming-Zhong [1 ]
Zhang, Xiaoping [2 ]
Zhu, Liehuang [1 ]
机构
[1] Beijing Inst Technol, Beijing Engn Res Ctr Mass Language Informat Proc, Sch Comp Sci, Beijing, Peoples R China
[2] China North Vehicle Res Inst, Natl Key Lab Vehicular Transmiss, Beijing, Peoples R China
基金
北京市自然科学基金; 美国国家科学基金会;
关键词
SDN; OpenFlow; malicious switch; detection;
D O I
10.14257/ijsia.2014.8.5.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Software Defined Networking (SDN) architecture, the control plane is separated from the data plane. On one hand, OpenFlow switches can only store and forward packets, which leaves all decisions to be made by the controller. On the other hand, the controller has a global view over the SDN. But if any switch is captured by an adversary, it may mislead the controller to make inaccurate decisions which may have terrible influences on the overall networks. In this paper, we elaborate on these problems and propose methods to detect malicious OpenFlow switches. We set a threshold value of the traffic-flows across an OpenFlow switch. If the switch's current traffic-flows exceed the threshold value, the controller has reasons to believe that this switch is suspicious and may monitor it intensively. Another scheme is to add a third-party server to accept users' report to warn the controller. In SDN, the controller cannot communicate with users directly, and sometimes users need to feed back their experience to the controller to help improve the SDN. In this case, it is necessary to set a third-party server in SDN to act as a middle role. These two schemes help to detect malicious switches. The controller can analyze the flow table of the suspicious switch and identify whether it is really malicious before isolating it.
引用
收藏
页码:119 / 130
页数:12
相关论文
共 50 条
  • [1] Balancing the Detection of Malicious Traffic in SDN Context
    Machado, Bruno Salgado
    Silva, Joao Marco C.
    Lima, Solange Rito
    Carvalho, Paulo
    12TH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2021), 2021, : 106 - 111
  • [2] Traffic-Based Automatic Detection of Browser Fingerprinting
    Zhao, Rui
    Chow, Edward
    Li, Chunchun
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I, 2019, 304 : 365 - 385
  • [3] Literature Survey on Traffic-based Server Load Balancing using SDN and Open Flow
    Raghul, S.
    Subashri, T.
    Vimal, K. R.
    2017 FOURTH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2017,
  • [4] Towards Resilient In-band Control Path Routing with Malicious Switch Detection in SDN
    Mohan, Purnima Murali
    Tram Truong-Huu
    Gurusamy, Mohan
    2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2018, : 9 - 16
  • [5] DELM: Deep Ensemble Learning Model for Anomaly Detection in Malicious Network Traffic-based Adaptive Feature Aggregation and Network Optimization
    Ahmed, Mukhtar
    Chen, Jinfu
    Akpaku, Ernest
    Sosu, Rexford nii ayitey
    Latif, Ajmal
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2024, 27 (04)
  • [6] NOMAD: Traffic-based network monitoring framework for anomaly detection
    Telcordia Technologies, Morristown, United States
    IEEE Symp Comput Commun Proc, (442-451):
  • [7] Malicious Encryption Traffic Detection Based on NLP
    Yang, Hao
    He, Qin
    Liu, Zhenyan
    Zhang, Qian
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [8] Deep Learning Based Detection Method for SDN Malicious Applications
    Chi Yaping
    Yu Yuzhou
    Yang Jianxi
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, CSPS 2018, VOL III: SYSTEMS, 2020, 517 : 96 - 104
  • [9] Malicious Domain Detection Based on Traffic Similarity
    Hu, Jianping
    Wang, Yongyi
    Shi, Fan
    Xu, Chengxi
    2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY, CII 2017, 2017, : 416 - 421
  • [10] NOMAD: Traffic-based network monitoring framework for anomaly detection
    Talpade, R
    Kim, G
    Khurana, S
    IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 1999, : 442 - 451