• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Kong, D. (Kong, D..) [1] | Shen, Y. (Shen, Y..) [2] | Chen, X. (Chen, X..) [3] | Cheng, Q. (Cheng, Q..) [4] | Liu, H. (Liu, H..) [5] | Zhang, D. (Zhang, D..) [6] | Liu, X. (Liu, X..) [7] | Chen, S. (Chen, S..) [8] | Wu, C. (Wu, C..) [9]

Indexed by:

Scopus

Abstract:

The topology discovery service in Software-Defined Networking (SDN) provides the controller with a global view of the substrate network topology, allowing for central management of the entire network. Unfortunately, emerging topology attacks can poison the network topology and result in unforeseeable disasters. Although researchers have made great efforts to mitigate this problem, security hazards still exist. In this paper, we propose Invisible Assailant Attack (IAA), the first combination topology attack capable of injecting and maintaining fake links even when 12 existing defense strategies are deployed simultaneously. IAA consists of 14 attack phases that apply multiple attack strategies. Attackers skillfully disguise the attack traffic in each phase so that it looks like normal network traffic, and perform these phases in a well-planned sequence, thereby bypassing existing defenses step by step. To mitigate this attack, we propose a Route Path Verification (RPV) mechanism that orchestrates multiple defense strategies to identify fake links. According to the experiments, RPV can successfully detect IAA with low overhead: its detection completes within 1 ms while its per-flow storage consumption is only a few KB. © 1993-2012 IEEE.

Keyword:

Software-defined networking (SDN) topology attacks and defenses topology discovery

Community:

  • [ 1 ] [Kong D.]Zhejiang University, College of Computer Science and Technology, Hangzhou, 310058, China
  • [ 2 ] [Shen Y.]Zhejiang University, College of Computer Science and Technology, Hangzhou, 310058, China
  • [ 3 ] [Chen X.]Zhejiang University, College of Computer Science and Technology, Hangzhou, 310058, China
  • [ 4 ] [Cheng Q.]Zhejiang University, College of Computer Science and Technology, Hangzhou, 310058, China
  • [ 5 ] [Liu H.]Zhejiang University, College of Computer Science and Technology, Hangzhou, 310058, China
  • [ 6 ] [Zhang D.]Fuzhou University, College of Computer and Data Science, Fuzhou, 350108, China
  • [ 7 ] [Liu X.]Yangzhou University, College of Information Engineering, College of Artificial Intelligence, Yangzhou, 225127, China
  • [ 8 ] [Liu X.]Southeast University, School of Computer Science and Engineering, Nanjing, 211189, China
  • [ 9 ] [Chen S.]Jiaxing Key Laboratory of Industrial Internet, Jiaxing, 314036, China
  • [ 10 ] [Chen S.]Polytechnic Institute, Zhejiang University, Hangzhou, 310058, China
  • [ 11 ] [Wu C.]Zhejiang University, College of Computer Science and Technology, Hangzhou, 310058, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

ACM Transactions on Networking

ISSN: 1063-6692

Year: 2023

Issue: 2

Volume: 31

Page: 904-919

3 . 0

JCR@2023

3 . 0 0 0

JCR@2023

ESI HC Threshold:32

JCR Journal Grade:2

CAS Journal Grade:2

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 4

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:96/10046458
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1