Classifying Poisoning Attacks in Software Defined Networking

Thomas A. V. Sattolo, Saumil Macwan, Michael J. Vezina, A. Matrawy
{"title":"Classifying Poisoning Attacks in Software Defined Networking","authors":"Thomas A. V. Sattolo, Saumil Macwan, Michael J. Vezina, A. Matrawy","doi":"10.1109/WiSEE.2019.8920310","DOIUrl":null,"url":null,"abstract":"Software-Defined Networking (SDN) provides significant flexibility when it comes to complex network management. This makes this technology an ideal candidate for dealing with network management issues in satellite and terrestrial networks.One key innovation of SDN is the separation of the control plane from the data plane. This results in a new network element: the controller. Given the importance of the role of the logically centralised (physically distributed) controller, it becomes an important point to protect in the new SDN paradigm. It could be vulnerable to attacks that are common in traditional networks such as Distributed Denial of Service (DDoS). In this paper, we address a type of attack that could threaten the operation of SDN-based environments: poisoning attacks.To perform its function, the logically centralised controller must have an accurate view of the network state. The accuracy of this view is crucial to the operation of the network. This view is obtained by exchanging information among controllers and between controllers and network elements. Such information flow could be vulnerable to different types of poisoning attacks. The motivation for writing this paper is that (1) poisoning attacks on SDN networks could have great impact, (2) most of them are relatively recent and (3) the differences between such attacks could be subtle. Therefore, we address the issues by classifying poisoning attacks in SDN. We classify both attacks and defences. For attacks we make a distinction between direct poisoning attacks and attacks that are designed to evade a specific defence.","PeriodicalId":167663,"journal":{"name":"2019 IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WiSEE.2019.8920310","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Software-Defined Networking (SDN) provides significant flexibility when it comes to complex network management. This makes this technology an ideal candidate for dealing with network management issues in satellite and terrestrial networks.One key innovation of SDN is the separation of the control plane from the data plane. This results in a new network element: the controller. Given the importance of the role of the logically centralised (physically distributed) controller, it becomes an important point to protect in the new SDN paradigm. It could be vulnerable to attacks that are common in traditional networks such as Distributed Denial of Service (DDoS). In this paper, we address a type of attack that could threaten the operation of SDN-based environments: poisoning attacks.To perform its function, the logically centralised controller must have an accurate view of the network state. The accuracy of this view is crucial to the operation of the network. This view is obtained by exchanging information among controllers and between controllers and network elements. Such information flow could be vulnerable to different types of poisoning attacks. The motivation for writing this paper is that (1) poisoning attacks on SDN networks could have great impact, (2) most of them are relatively recent and (3) the differences between such attacks could be subtle. Therefore, we address the issues by classifying poisoning attacks in SDN. We classify both attacks and defences. For attacks we make a distinction between direct poisoning attacks and attacks that are designed to evade a specific defence.
软件定义网络中的投毒攻击分类
软件定义网络(SDN)在复杂的网络管理方面提供了极大的灵活性。这使得该技术成为处理卫星和地面网络中网络管理问题的理想选择。SDN的一个关键创新是控制平面与数据平面的分离。这就产生了一个新的网络元素:控制器。考虑到逻辑集中式(物理分布式)控制器角色的重要性,它成为新的SDN范式中需要保护的一个重要点。它可能容易受到传统网络中常见的攻击,例如分布式拒绝服务(DDoS)。在本文中,我们讨论了一种可能威胁到基于sdn的环境运行的攻击类型:中毒攻击。逻辑集中式控制器必须对网络状态有准确的了解,才能发挥其功能。这种观点的准确性对网络的运行至关重要。该视图通过控制器之间以及控制器与网元之间的信息交换获得。这样的信息流可能容易受到不同类型的毒化攻击。撰写本文的动机是:(1)SDN网络上的中毒攻击可能会产生很大的影响,(2)它们中的大多数是相对较新的,(3)这些攻击之间的差异可能是微妙的。因此,我们通过对SDN中的投毒攻击进行分类来解决问题。我们对攻击和防御进行分类。对于攻击,我们区分了直接中毒攻击和旨在逃避特定防御的攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信