Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3241539.3267763acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
poster

Detection of Topology Poisoning by Silent Relay Attacker in SDN

Published: 15 October 2018 Publication History

Abstract

Topology Poisoning can be easily performed by injecting a fake link between SDN switches using a silent relay attack. This attack is difficult to detect because 1) the attacker is a passive man-in-the-middle to relay control messages between the compromised ports on SDN switches, and 2) such messages are genuine for the SDN switches and controller. This poster proposes Silent Relay Detector (SRD) that tailor- makes the SDN control messages to be processed normally by authentic switches but to make the attacker malfunction. The SRD implementation and experiment reveal how the silent relay attack is detected and fake link injection is prohibited ingeniously.

References

[1]
Shang Gao, Zecheng Li, et al. 2018. Security Threats in the Data Plane of Software-Defined Networks. IEEE Network (2018).
[2]
Sungmin Hong, Lei Xu, et al. 2015. Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures. In NDSS, Vol. 15.
[3]
Richard Skowyra, Lei Xu, et almbox. 2018. Effective Topology Tampering Attacks and Defenses in Software-Defined Networks (DSN). In IEEE/IFIP International Conference on Dependable Systems and Networks.

Cited By

View all
  • (2024)Attopo: An SDN Non-Protocol Topology Discovery Method Based on Attention Mechanism and Network Flow AnalysisIEEE Access10.1109/ACCESS.2024.341538412(182190-182202)Online publication date: 2024
  • (2024)A novel link fabrication attack detection method for low-latency SDN networksJournal of Information Security and Applications10.1016/j.jisa.2024.10380784(103807)Online publication date: Aug-2024
  • (2023)Combination Attacks and Defenses on SDN Topology DiscoveryIEEE/ACM Transactions on Networking10.1109/TNET.2022.320356131:2(904-919)Online publication date: Apr-2023
  • Show More Cited By

Index Terms

  1. Detection of Topology Poisoning by Silent Relay Attacker in SDN

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking
      October 2018
      884 pages
      ISBN:9781450359030
      DOI:10.1145/3241539
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 October 2018

      Check for updates

      Author Tags

      1. silent relay attack
      2. topology discovery
      3. topology poisoning

      Qualifiers

      • Poster

      Conference

      MobiCom '18
      Sponsor:

      Acceptance Rates

      MobiCom '18 Paper Acceptance Rate 42 of 187 submissions, 22%;
      Overall Acceptance Rate 440 of 2,972 submissions, 15%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)9
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 06 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Attopo: An SDN Non-Protocol Topology Discovery Method Based on Attention Mechanism and Network Flow AnalysisIEEE Access10.1109/ACCESS.2024.341538412(182190-182202)Online publication date: 2024
      • (2024)A novel link fabrication attack detection method for low-latency SDN networksJournal of Information Security and Applications10.1016/j.jisa.2024.10380784(103807)Online publication date: Aug-2024
      • (2023)Combination Attacks and Defenses on SDN Topology DiscoveryIEEE/ACM Transactions on Networking10.1109/TNET.2022.320356131:2(904-919)Online publication date: Apr-2023
      • (2021)Topology Validator - Defense Against Topology Poisoning Attack in SDNQuality, Reliability, Security and Robustness in Heterogeneous Systems10.1007/978-3-030-91424-0_15(241-260)Online publication date: 17-Nov-2021

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media