2017
DOI: 10.14569/ijacsa.2017.080474
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Address Spoofing Attacks in Hybrid SDN

Abstract: Abstract-Address spoofing attacks like ARP spoofing and DDoS attacks are mostly launched in a networking environment to degrade the performance. These attacks sometimes break down the network services before the administrator comes to know about the attack condition. Software Defined Networking (SDN) has emerged as a novel network architecture in which date plane is isolated from the control plane. Control plane is implemented at a central device called controller. But, SDN paradigm is not commonly used due to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…In [23], the authors demonstrated the feasibility of attacking controllers from a data layer, by implementing and testing the "fingerprint" technique of the SDN controller, with the primary goal of emphasizing the need for high controller security. By introducing open source SDN interfaces and known protocols to simplify programming, the network functionality allows attacker location detection presented in [24], where in a hybrid SDN the attacker is detected by analyzing the ARP request from the source. A graph-based switching mechanism is also used to detect the location of the attacker by checking legitimate users.…”
Section: Security Features and Attack Vectors In Software Defined Networkmentioning
confidence: 99%
“…In [23], the authors demonstrated the feasibility of attacking controllers from a data layer, by implementing and testing the "fingerprint" technique of the SDN controller, with the primary goal of emphasizing the need for high controller security. By introducing open source SDN interfaces and known protocols to simplify programming, the network functionality allows attacker location detection presented in [24], where in a hybrid SDN the attacker is detected by analyzing the ARP request from the source. A graph-based switching mechanism is also used to detect the location of the attacker by checking legitimate users.…”
Section: Security Features and Attack Vectors In Software Defined Networkmentioning
confidence: 99%
“…Ubaid et al, [6] presented a graph based mechanism to tackle the ARP spoofing attacks. The graph based traversal mechanism detects the location of the forged or compromised hosts through the pattern of the request packets.…”
Section: Sm-arp: Stochastic Markovian Gamementioning
confidence: 99%
“…Using the likelihood, cost and reward functions, the utility functions of source and relay nodes can be computed using Eq. (6) Adding the likelihood of forwarding source packets, , to the Eq. 5and (6) provides utility functions for the flexible relay method.…”
Section: Wherementioning
confidence: 99%
See 1 more Smart Citation
“…A cloud might be restricted to a single firm (private cloud) or be open to different firms (public cloud). Several attacks are being launched on cloud systems using modern tools and software [ 2 ].…”
Section: Introductionmentioning
confidence: 99%