Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft) 2015
DOI: 10.1109/netsoft.2015.7116184
|View full text |Cite
|
Sign up to set email alerts
|

How to detect a compromised SDN switch

Abstract: SDN is a concept of programmable networking. A network manager can process each network flow through software programs. There is a hypothesis that all switches are trusted and follow programmed commands to handle packets. That is, once a switch is compromised by an attacker and does not follow the order of the network manager, this will bring a huge network disaster. In this paper, we define some attack models through compromised switches and design a detection mechanism to find these compromised devices. We e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(1 citation statement)
references
References 12 publications
(10 reference statements)
0
1
0
Order By: Relevance
“…They detect these threats by using anomaly detection. Chi et al [106] propose an online detection algorithm that creates an artificial packet from a controller to see if it follows the intended forwarding path. Mohan et al [107] use node-disjoint control paths based on the fact that two control messages will be inconsistent if the source switch is compromised.…”
Section: Infrastructure Layermentioning
confidence: 99%
“…They detect these threats by using anomaly detection. Chi et al [106] propose an online detection algorithm that creates an artificial packet from a controller to see if it follows the intended forwarding path. Mohan et al [107] use node-disjoint control paths based on the fact that two control messages will be inconsistent if the source switch is compromised.…”
Section: Infrastructure Layermentioning
confidence: 99%