An Evidence-Based Technical Process for OpenFlow-Based SDN Forensics

S. Mugitama, N. Cahyani, Parman Sukamo
{"title":"An Evidence-Based Technical Process for OpenFlow-Based SDN Forensics","authors":"S. Mugitama, N. Cahyani, Parman Sukamo","doi":"10.1109/ICoICT49345.2020.9166215","DOIUrl":null,"url":null,"abstract":"Globally planning packets forwarding based on the operator’s objectives by a centralized controller is possible in Software Defined Network (SDN). The chief purpose of the SDN architecture is to manage the network due to centralized control of the network easily. The SDN architecture does not focus on network security since the beginning of its emergence. That matter has created some vulnerabilities due to centralized control of the network. Vulnerability is caused by attacks causing the packet overload on the controller (such as DoS attack). Hence, the controller runs into a race condition. Another vulnerability existed in the controller is the topology poisoning attack utilizing spoofed packet and exploiting LLDP packets in the network. Forensics in a traditional network does not have the capability to deeply analyze the attack because the tools ignore evidence existed in the control and application layer of SDN. This research focuses on technical processes in running forensics on SDN architecture comprehensively and develops modules needed to retrieve log’s evidence existed in the controller by applying forensics’ principles. The result shows DoS attack and topology poisoning can be investigated by utilizing these technical processes. Evidence in the controller can be utilized to create analyses, attribution, and presentation. The technical processes of this study are expected to help forensic investigators in revealing crime incidents in the OpenFlow-based SDN environment.","PeriodicalId":113108,"journal":{"name":"2020 8th International Conference on Information and Communication Technology (ICoICT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 8th International Conference on Information and Communication Technology (ICoICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICoICT49345.2020.9166215","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Globally planning packets forwarding based on the operator’s objectives by a centralized controller is possible in Software Defined Network (SDN). The chief purpose of the SDN architecture is to manage the network due to centralized control of the network easily. The SDN architecture does not focus on network security since the beginning of its emergence. That matter has created some vulnerabilities due to centralized control of the network. Vulnerability is caused by attacks causing the packet overload on the controller (such as DoS attack). Hence, the controller runs into a race condition. Another vulnerability existed in the controller is the topology poisoning attack utilizing spoofed packet and exploiting LLDP packets in the network. Forensics in a traditional network does not have the capability to deeply analyze the attack because the tools ignore evidence existed in the control and application layer of SDN. This research focuses on technical processes in running forensics on SDN architecture comprehensively and develops modules needed to retrieve log’s evidence existed in the controller by applying forensics’ principles. The result shows DoS attack and topology poisoning can be investigated by utilizing these technical processes. Evidence in the controller can be utilized to create analyses, attribution, and presentation. The technical processes of this study are expected to help forensic investigators in revealing crime incidents in the OpenFlow-based SDN environment.
基于openflow的SDN取证循证技术流程
在软件定义网络(SDN)中,由一个集中的控制器根据运营商的目标对数据包转发进行全局规划是可能的。SDN架构的主要目的是便于对网络进行集中控制,从而实现对网络的管理。SDN架构从出现之初就没有把重点放在网络安全上。由于网络的集中控制,这件事造成了一些漏洞。漏洞是指对控制器造成报文过载的攻击(如DoS攻击)。因此,控制器进入竞争状态。控制器存在的另一个漏洞是利用欺骗数据包和利用网络中的LLDP数据包的拓扑中毒攻击。由于传统网络中的取证工具忽略了SDN控制层和应用层存在的证据,因此无法对攻击进行深入分析。本研究全面研究了在SDN架构下运行取证的技术流程,并应用取证原理开发了检索控制器中存在的日志证据所需的模块。结果表明,利用这些技术流程可以对DoS攻击和拓扑中毒进行调查。控制器中的证据可用于创建分析、归因和表示。本研究的技术流程有望帮助法医调查人员在基于openflow的SDN环境中揭示犯罪事件。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信