Traffic-based Malicious Switch Detection in SDN

被引:3
|
作者
Du, Xiaodong [1 ]
Wang, Ming-Zhong [1 ]
Zhang, Xiaoping [2 ]
Zhu, Liehuang [1 ]
机构
[1] Beijing Inst Technol, Beijing Engn Res Ctr Mass Language Informat Proc, Sch Comp Sci, Beijing, Peoples R China
[2] China North Vehicle Res Inst, Natl Key Lab Vehicular Transmiss, Beijing, Peoples R China
基金
北京市自然科学基金; 美国国家科学基金会;
关键词
SDN; OpenFlow; malicious switch; detection;
D O I
10.14257/ijsia.2014.8.5.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Software Defined Networking (SDN) architecture, the control plane is separated from the data plane. On one hand, OpenFlow switches can only store and forward packets, which leaves all decisions to be made by the controller. On the other hand, the controller has a global view over the SDN. But if any switch is captured by an adversary, it may mislead the controller to make inaccurate decisions which may have terrible influences on the overall networks. In this paper, we elaborate on these problems and propose methods to detect malicious OpenFlow switches. We set a threshold value of the traffic-flows across an OpenFlow switch. If the switch's current traffic-flows exceed the threshold value, the controller has reasons to believe that this switch is suspicious and may monitor it intensively. Another scheme is to add a third-party server to accept users' report to warn the controller. In SDN, the controller cannot communicate with users directly, and sometimes users need to feed back their experience to the controller to help improve the SDN. In this case, it is necessary to set a third-party server in SDN to act as a middle role. These two schemes help to detect malicious switches. The controller can analyze the flow table of the suspicious switch and identify whether it is really malicious before isolating it.
引用
收藏
页码:119 / 130
页数:12
相关论文
共 50 条
  • [31] Flow based Sequential Grouping System for Malicious Traffic Detection
    Park, Jee-Tae
    Baek, Ui-Jun
    Lee, Min-Seong
    Goo, Young-Hoon
    Lee, Sung-Ho
    Kim, Myung-Sup
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (10): : 3771 - 3792
  • [32] Encrypted Malicious Traffic Detection Based on Hidden Markov Model
    Zou F.-T.
    Yu T.-D.
    Xu W.-L.
    Ruan Jian Xue Bao/Journal of Software, 2022, 33 (07): : 2683 - 2698
  • [33] A traffic-based evolutionary algorithm for network clustering
    Naldi, Maurizio
    Salcedo-Sanz, Sancho
    Carro-Calvo, Leopoldo
    Laura, Luigi
    Portilla-Figueras, Antonio
    Italiano, Giuseppe F.
    APPLIED SOFT COMPUTING, 2013, 13 (11) : 4303 - 4319
  • [34] Traffic-Based Labor Planning in Retail Stores
    Chuang, Howard Hao-Chun
    Oliva, Rogelio
    Perdikaki, Olga
    PRODUCTION AND OPERATIONS MANAGEMENT, 2016, 25 (01) : 96 - 113
  • [35] A Method of Malicious Bot Traffic Detection
    Wu, Mengying
    Wu, Zhendong
    Lv, Hao
    Wang, Jingjing
    CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 67 - 76
  • [36] HackWrt: Network Traffic-Based Eavesdropping of Handwriting
    Kinfe, Aaron
    Jung, Chijung
    Lin, Kai
    Clyburn, Marshall
    Suya, Fnu
    2023 CYBER-PHYSICAL SYSTEMS AND INTERNET-OF-THINGS WEEK, CPS-IOT WEEK WORKSHOPS, 2023, : 55 - 60
  • [37] DTIA: Differentiated Traffic-based Interconnection Agreement
    Davoyan, Ruzana
    2008 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES, 2008, : 683 - 688
  • [38] Traffic-based Validation of Virtualized Communication Networks
    Roesch, Dennis
    Li, Zhenqian
    Nicolai, Steffen
    Seitz, Jochen
    2024 9TH INTERNATIONAL CONFERENCE ON SMART AND SUSTAINABLE TECHNOLOGIES, SPLITECH 2024, 2024,
  • [39] Semi-Supervised Encrypted Malicious Traffic Detection Based on Multimodal Traffic Characteristics
    Liu, Ming
    Yang, Qichao
    Wang, Wenqing
    Liu, Shengli
    SENSORS, 2024, 24 (20)
  • [40] Multi-probability sampling-based detection of malicious switching nodes in SDN
    Xiao, Jingxu
    Chang, Chaowen
    Wu, Ping
    Yuan, Lu
    COMPUTERS & SECURITY, 2025, 151