2019
DOI: 10.1109/lcomm.2019.2896928
|View full text |Cite
|
Sign up to set email alerts
|

Using INSPECTOR Device to Stop Packet Injection Attack in SDN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…For the security research of the data plane, SPHINX [12] detected both known and potentially unknown attacks on network topology and data-plane forwarding originating within an SDN by leveraging the novel abstraction of flow graphs. However, the attacker can bypass this method by distributing or slowing down the attack procedure [9]. FT-Guard [13] implemented a behavior-based priority-aware defense strategy to cope with the flow table overflow attack.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For the security research of the data plane, SPHINX [12] detected both known and potentially unknown attacks on network topology and data-plane forwarding originating within an SDN by leveraging the novel abstraction of flow graphs. However, the attacker can bypass this method by distributing or slowing down the attack procedure [9]. FT-Guard [13] implemented a behavior-based priority-aware defense strategy to cope with the flow table overflow attack.…”
Section: Related Workmentioning
confidence: 99%
“…PacketChecker [8] only defends against packet-injection attacks based on a MAC address. The INSPECTOR [9] protects a compromised controller by verifying Packet-In messages, tops the attack efficiently, and enhances the performance of the controller under malicious attack. As a hardware device added to the SDN architecture, INSPECTOR requires additional measures to ensure that it is not damaged.…”
Section: Introductionmentioning
confidence: 99%
“…In an SDN network, any data packet flow coming from an external network passes through a gateway switch before it gets routed through the internal SDN controlled network. In reactive mode [4], an SDN switch triggers a Packet-In message to be sent to the controller when it encounters any unmatched data packet flow [5]. Especially companies with outward facing servers open to traffic from new customers will have gateway switches operating in reactive mode.…”
Section: Background and Motivation A Packet Injection Attacksmentioning
confidence: 99%
“…Later, Alshraa et al [4] proposed another mitigation technique for packet injection attacks. In their approach, a specialized device, called INSPECTOR, prevents the controller separated from having to manage Packet-In messages from malicious data packet flows.…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation