• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Kong, Dezhang (Kong, Dezhang.) [1] | Shen, Yi (Shen, Yi.) [2] | Chen, Xiang (Chen, Xiang.) [3] | Cheng, Qiumei (Cheng, Qiumei.) [4] | Liu, Hongyan (Liu, Hongyan.) [5] | Zhang, Dong (Zhang, Dong.) [6] (Scholars:张栋) | Liu, Xuan (Liu, Xuan.) [7] | Chen, Shuangxi (Chen, Shuangxi.) [8] | Wu, Chunming (Wu, Chunming.) [9]

Indexed by:

EI Scopus SCIE

Abstract:

The topology discovery service in Software-Defined Networking (SDN) provides the controller with a global view of the substrate network topology, allowing for central management of the entire network. Unfortunately, emerging topology attacks can poison the network topology and result in unforeseeable disasters. Although researchers have made great efforts to mitigate this problem, security hazards still exist. In this paper, we propose Invisible Assailant Attack (IAA), the first combination topology attack capable of injecting and maintaining fake links even when 12 existing defense strategies are deployed simultaneously. IAA consists of 14 attack phases that apply multiple attack strategies. Attackers skillfully disguise the attack traffic in each phase so that it looks like normal network traffic, and perform these phases in a well-planned sequence, thereby bypassing existing defenses step by step. To mitigate this attack, we propose a Route Path Verification (RPV) mechanism that orchestrates multiple defense strategies to identify fake links. According to the experiments, RPV can successfully detect IAA with low overhead: its detection completes within 1 ms while its per-flow storage consumption is only a few KB.

Keyword:

Control systems IEEE transactions Metadata Network topology Security Software-defined networking (SDN) Topology topology attacks and defenses topology discovery Toxicology

Community:

  • [ 1 ] [Kong, Dezhang]Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310058, Peoples R China
  • [ 2 ] [Shen, Yi]Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310058, Peoples R China
  • [ 3 ] [Chen, Xiang]Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310058, Peoples R China
  • [ 4 ] [Cheng, Qiumei]Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310058, Peoples R China
  • [ 5 ] [Liu, Hongyan]Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310058, Peoples R China
  • [ 6 ] [Wu, Chunming]Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310058, Peoples R China
  • [ 7 ] [Zhang, Dong]Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350108, Peoples R China
  • [ 8 ] [Liu, Xuan]Yangzhou Univ, Coll Informat Engn, Coll Artificial Intelligence, Yangzhou 225127, Jiangsu, Peoples R China
  • [ 9 ] [Liu, Xuan]Southeast Univ, Sch Comp Sci & Engn, Nanjing 211189, Peoples R China
  • [ 10 ] [Chen, Shuangxi]Jiaxing Vocat Tech Coll, Jiaxing 314036, Peoples R China
  • [ 11 ] [Chen, Shuangxi]Zhejiang Univ, Polytech Inst, Hangzhou 310058, Peoples R China

Reprint 's Address:

  • [Wu, Chunming]Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310058, Peoples R China;;

Show more details

Version:

Related Keywords:

Source :

IEEE-ACM TRANSACTIONS ON NETWORKING

ISSN: 1063-6692

Year: 2022

Issue: 2

Volume: 31

Page: 904-919

3 . 7

JCR@2022

3 . 0 0 0

JCR@2023

ESI Discipline: COMPUTER SCIENCE;

ESI HC Threshold:61

JCR Journal Grade:2

CAS Journal Grade:2

Cited Count:

WoS CC Cited Count: 5

SCOPUS Cited Count: 7

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:180/10039618
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1