NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium 2016
DOI: 10.1109/noms.2016.7502995
|View full text |Cite
|
Sign up to set email alerts
|

Handling malicious switches in software defined networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 16 publications
0
9
0
Order By: Relevance
“…• Traffic Delay: a compromised switch may delay traffic in order to increase jitter, which raises full of problems with time-sensitive traffic. Moreover, delaying traffic for a TCP stream triggers spurious timeouts and unjustified retransmissions, resulting in grave damage to the TCP throughput [13]. From the compromised switch behaviors mentioned above, an attacker can compromise a switch by dropping, slowing down, or misrouting network traffic [13], or by executing flooding attacks against the control plane, either by replaying or spoofing packet_in messages [5].…”
Section: A Problem Statementsmentioning
confidence: 99%
See 2 more Smart Citations
“…• Traffic Delay: a compromised switch may delay traffic in order to increase jitter, which raises full of problems with time-sensitive traffic. Moreover, delaying traffic for a TCP stream triggers spurious timeouts and unjustified retransmissions, resulting in grave damage to the TCP throughput [13]. From the compromised switch behaviors mentioned above, an attacker can compromise a switch by dropping, slowing down, or misrouting network traffic [13], or by executing flooding attacks against the control plane, either by replaying or spoofing packet_in messages [5].…”
Section: A Problem Statementsmentioning
confidence: 99%
“…The damaging effects of compromised switches can cause great difficulties in any network system. In addition, to the best of our knowledge, and as seen in [5], [13]- [15], not many studies have efficiently solved these critical problems.…”
Section: A Problem Statementsmentioning
confidence: 99%
See 1 more Smart Citation
“…Packet Delay: Occurs when a forwarding device delays traffic and increases jitter. A packet delay is a threat against time-sensitive traffic [13]. A delay of TCP stream also causes spurious timeouts and unnecessary re-transmission, which severely threatens the TCP throughput [44].…”
Section: Attack Detectionmentioning
confidence: 99%
“…In general, the development of SDN security applications and controllers and real-time verification of network constraints, separately, have been the primary focus of SDN security literature (see [3,25] for surveys). However, no combination of these provides effective protection against compromised forwarding devices [8,11,13].…”
Section: Introductionmentioning
confidence: 99%