2017
DOI: 10.1109/tnet.2016.2626287
|View full text |Cite
|
Sign up to set email alerts
|

LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking

Abstract: IEEE/ACM Transactions on Networking\ud 29 November 2016\ud LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking ( Articles not published yet, but available online Article in press About articles in press (opens in a new window) )\ud Ambrosin, M., \ud Conti, M., \ud De Gaspari, F., \ud Poovendran, R.\ud Abstract\ud \ud Software defined networking (SDN) is a new networking paradigm that in recent years has revolutionized network architectures. At its core, SDN separates the data … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
54
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 98 publications
(57 citation statements)
references
References 14 publications
0
54
0
Order By: Relevance
“…On the other hand, the potential advantages in exploiting collaborative intelligence of SDN have not been well investigated as effective DDoS attack defense requires extremely accurate detection and rapid reaction in both. Otherwise, it may result in SDN controller saturation attack in the worst case, as discussed in [16,17].…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, the potential advantages in exploiting collaborative intelligence of SDN have not been well investigated as effective DDoS attack defense requires extremely accurate detection and rapid reaction in both. Otherwise, it may result in SDN controller saturation attack in the worst case, as discussed in [16,17].…”
Section: Introductionmentioning
confidence: 99%
“…The major issues of contention are: (1) TCP connection‐migration proxy technique may break the end‐to‐end semantics of TCP/IP client and server paradigm and (2) large volume of completed TCP handshakes from legit users may incapacitate the stateful connection‐migration mechanism, filling up the translation table and also limiting simultaneous connections for migration. We believe that some of the works that proposed solutions based on the proxy/firewall techniques, did not consider the finer aspects of the system and hence that opened up vulnerabilities and protocol violations. In our DTARS antispoofing system, we attempted to solve the above issues to a large extent by applying a probabilistic model to select connections for proxying and consequent connection‐migration for TCP/IP services in an SDN‐enabled network.…”
Section: Discussionmentioning
confidence: 99%
“…The goal is to avoid the control channel choking (“switch‐to‐controller”), communication overhead, and a delayed response for newflow connections. There are some exemplary works that proposed adding intelligence to SDN switches . The primary goal for this design is to keep the packet inspection and defensive actions within the data plane.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, [168] also consider DoS attacks against the SDN control channel. The authors introduce LineSwitch, which is a mitigation approach based probabilistic proxying and blacklisting.…”
Section: Related Workmentioning
confidence: 99%