• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Kong, D. (Kong, D..) [1] | Chen, X. (Chen, X..) [2] | Lin, H. (Lin, H..) [3] | Zhou, Z. (Zhou, Z..) [4] | Shen, Y. (Shen, Y..) [5] | Liu, H. (Liu, H..) [6] | Cheng, Q. (Cheng, Q..) [7] | Liu, X. (Liu, X..) [8] | Zhang, D. (Zhang, D..) [9] (Scholars:张栋) | Wu, C. (Wu, C..) [10] | Khan, M.K. (Khan, M.K..) [11]

Indexed by:

Scopus

Abstract:

In-band Network Telemetry (INT) is a widely used monitoring framework in modern large-scale networks. It provides packet-level visibility into network conditions by inserting telemetry data into packets, enabling unprecedented fine-grained network management. However, this mechanism also introduces new vulnerabilities that malicious attackers can exploit. In this paper, we present eight In-band Network Telemetry Manipulation Attacks that take advantage of INT's weakness, demonstrating that attackers can cause severe damage with little effort by manipulating INT packets. To address this issue, we designed SecureINT, a security-enhanced INT prototype that provides encryption and integrity verification for INT packets. Specifically, SecureINT deploys Even-Mansour and SipHash for confidentiality and integrity, respectively. It also uses a zero-delay rotation mechanism, which enables administrators to dynamically change the version of the deployed Even-Mansour/SipHash running on programmable switches without the need to re-install new programs. In this way, SecureINT can provide lasting security for INT packets using the limited resources of programmable switches. According to the experiments, SecureINT can be deployed on programmable switches using a single pipeline. Besides, the overhead of the rotation mechanism running on the control plane is still minimal.  © 2004-2012 IEEE.

Keyword:

attack In-band network telemetry programmable network security

Community:

  • [ 1 ] [Kong D.]Zhejiang University, College of Computer Science and Technology, Hangzhou, 310058, China
  • [ 2 ] [Chen X.]Zhejiang University, College of Computer Science and Technology, Hangzhou, 310058, China
  • [ 3 ] [Lin H.]Fuzhou University, College of Computer and Data Science, Fuzhou, 350108, China
  • [ 4 ] [Zhou Z.]Zhejiang University, College of Computer Science and Technology, Hangzhou, 310058, China
  • [ 5 ] [Shen Y.]Zhejiang University, College of Computer Science and Technology, Hangzhou, 310058, China
  • [ 6 ] [Liu H.]Zhejiang University, College of Computer Science and Technology, Hangzhou, 310058, China
  • [ 7 ] [Cheng Q.]Zhejiang University, College of Computer Science and Technology, Hangzhou, 310058, China
  • [ 8 ] [Liu X.]Yangzhou University, College of Information Engineering, College of Artificial Intelligence), China
  • [ 9 ] [Zhang D.]Fuzhou University, College of Computer and Data Science, Fuzhou, 350108, China
  • [ 10 ] [Wu C.]Zhejiang University, College of Computer Science and Technology, Hangzhou, 310058, China
  • [ 11 ] [Khan M.K.]King Saud University, Center of Excellence in Information Assurance, Riyadh, 11362, Saudi Arabia

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Network and Service Management

ISSN: 1932-4537

Year: 2024

4 . 7 0 0

JCR@2023

CAS Journal Grade:2

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Online/Total:354/10840237
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1