完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Lin, Cheng-Hsu | en_US |
dc.contributor.author | Li, Chi-Yu | en_US |
dc.contributor.author | Wang, Kuochen | en_US |
dc.date.accessioned | 2019-05-02T00:26:50Z | - |
dc.date.available | 2019-05-02T00:26:50Z | - |
dc.date.issued | 2018-01-01 | en_US |
dc.identifier.isbn | 978-1-5386-5790-4 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/151758 | - |
dc.description.abstract | Software-defined networking (SDN) apps are developed to support various functions (e.g., traffic engineering, routing, security, etc.) for SDN networks. Their operations rely on the APIs offered by the control plane. They may be compromised or designed to be malicious by third parties. Though there have been many studies against malicious apps, they only restrict the APIs used by them with coarse-grained controls. In this work, we seek to show that some malicious flow entries cannot be detected or prevented by current defenses. They may impede the operations of control-plane services or hinder packets from being forwarded correctly in the data plane. To show their negative impact, we devise two attacks, topology spoofing and forwarding-based DoS, as well as examine their damage and analyze root causes. We then propose a context-aware, event-based anomaly detection (CEAD) framework to defend against the malicious flow entries. It provides more fine-grained controls over the flow entries set by apps. Different from other studies, it does anomaly detection by examining the context correlation between an event, the app registering it, and the flow entries set by the app for the event. Our evaluation results show that the CEAD can detect all the malicious flow entries in our given cases, and confirm its scalability with negligible overhead at increasing TCP connection attempt rates. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | SDN | en_US |
dc.subject | security | en_US |
dc.subject | topology spoofing | en_US |
dc.subject | DoS | en_US |
dc.subject | context-aware | en_US |
dc.title | Setting Malicious Flow Entries Against SDN Operations: Attacks and Countermeasures | en_US |
dc.type | Proceedings Paper | en_US |
dc.identifier.journal | 2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC) | en_US |
dc.citation.spage | 205 | en_US |
dc.citation.epage | 212 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000462054900026 | en_US |
dc.citation.woscount | 0 | en_US |
顯示於類別: | 會議論文 |