• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Chen, Xiang (Chen, Xiang.) [1] | Liu, Hongyan (Liu, Hongyan.) [2] | Huang, Qun (Huang, Qun.) [3] | Zhang, Dong (Zhang, Dong.) [4] | Zhou, Haifeng (Zhou, Haifeng.) [5] | Wu, Chunming (Wu, Chunming.) [6] | Liu, Xuan (Liu, Xuan.) [7] | Khan, Muhammad Khurram (Khan, Muhammad Khurram.) [8]

Indexed by:

EI

Abstract:

Due to limited memory usage and provably high accuracy, sketches running on programmable switches have been commonly used by the literature for network measurement. However, their vulnerabilities are still largely unknown and neglected, which is highly concerning given the increasing popularity of network measurement. In this paper, we identify the Stalker attacks, where attackers aim to degrade the accuracy of sketches running on programmable switches. More precisely, attackers tamper with some sketch operations during sketch deployment atop programmable switches. At runtime, the tampered sketch will record highly inaccurate flow data, which degrades measurement accuracy. We implement Stalker attacks on Tofino switches. The results indicate that Stalker attacks significantly drop the accuracy of network management applications, e.g., reducing the F1 score of heavy hitter detection to zero. However, our analysis indicates that none of existing methods can detect Stalker attacks since they can hardly verify the correctness of sketch operations. Finally, we analyze potential defense mechanisms and identify challenges to enable further research in this context. © 2005-2012 IEEE.

Keyword:

Computer control systems Electronic mail Error analysis Hash functions

Community:

  • [ 1 ] [Chen, Xiang]Zhejiang University, College of Computer Science and Technology, Hangzhou; 310058, China
  • [ 2 ] [Liu, Hongyan]Zhejiang University, College of Computer Science and Technology, Hangzhou; 310058, China
  • [ 3 ] [Huang, Qun]Peking University, Department of Computer Science and Technology, Beijing; 100871, China
  • [ 4 ] [Zhang, Dong]Fuzhou University, College of Computer Science and Big Data and the Zhicheng College, Fuzhou; 350002, China
  • [ 5 ] [Zhou, Haifeng]Zhejiang University, College of Control Science and Engineering, Hangzhou; 310027, China
  • [ 6 ] [Wu, Chunming]Zhejiang University, College of Computer Science and Technology, Hangzhou; 310058, China
  • [ 7 ] [Liu, Xuan]Yangzhou University, College of Information Engineering, College of Artificial Intelligence, Yangzhou; 225009, China
  • [ 8 ] [Liu, Xuan]Southeast University, School of Computer Science and Engineering, Nanjing; 211189, China
  • [ 9 ] [Khan, Muhammad Khurram]King Saud University, Center of Excellence in Information Assurance (CoEIA), Riyadh; 11421, Saudi Arabia

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Information Forensics and Security

ISSN: 1556-6013

Year: 2023

Volume: 18

Page: 5832-5847

6 . 3

JCR@2023

6 . 3 0 0

JCR@2023

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:117/10046562
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1