Watermarking for Detecting Freeloader Misbehavior in Software-Defined Networks
|
|
|
- Melinda Andrews
- 10 years ago
- Views:
Transcription
1 Watermarking for Detecting Freeloader Misbehavior in Software-Defined Networks Younghee Park* Sang-Yoon Chang* Lavanya M. Krishnamurthy Computer Engineering San Jose State University Advanced Digital Sciences Center Singapore Computer Engineering San Jose State University Abstract Software-defined networking (SDN) provides network operators a high level of flexibility and programmability through the separation of the control plane from the data plane. When initiating traffic, users are required to install flow rules that direct the traffic routing. This process requires communication between control and data plane and results in significant overhead and enables the controller to monitor the traffic and its source. In this paper, we introduce a novel misbehavior, called freeloading, where attackers bypass the process of installing flow rules. The attackers thus can send traffic with an unfair advantage in delay (enabling them to launch more timely threats) and significantly reduce the risk of attacker detection by the network controller (especially if further threats were launched). To prevent such attack, we develop a flow watermarking technique that embeds a secret message into the data payload. It facilitates ownership of the established flow rules, so that only the legitimate owners of flow rules can send packets using their own rules and the network can help detect the misuse cases of the installed flow rules. Keywords Software-defined networking, OpenFlow, Open Vswtich, Network-based attacks. I. INTRODUCTION Software Defined Networking (SDN) provides highly flexible programming capability and the abstraction of the lower level network functionalities by decoupling the network controller from the data plane [11], [14], [28]. SDN provides an easy operational platform by having a centralized controller to manage the network; the controller has a global view of current network states [28], and can quickly adapt to complex and dynamic networks by reacting to network states and events [23], [24]. However, the shift in networking paradigm due to SDN introduced new sets of security issues, such as DoS attacks on the controller and the data plane [11], [13], [17], [26], poisoning attacks on network visibility [2], and others [3], [15], [16], [30]. Whereas much prior work focused on vulnerabilities and threats on the control plane, there has been limited treatment on the misuse of the data plane. In this paper, we study the security in the data plane. First, we introduce freeloading, a novel SDN-based attack allowing attackers to send their malicious packets by exploiting the existing data plane. Through freeloading, attackers can avoid * The first two authors equally contribute to this work and Professor Younghee Park is the corresponding author. This work is supported by the Research Foundation of San Jose State and by the research grant for the Human-Centered Cyber-physical Systems Programme at the Advanced Digital Sciences Center from Singapore s Agency for Science, Technology and Research (A*STAR). the following: the risk of exposure to the controller and the network operators (which, for instance, can facilitate anomaly detection by traffic monitoring), the costs of processing delay and the communication overhead (which are incurred from establishing the data plane and the traffic paths). To defend against freeloading, we propose a flow watermarking technique to protect the origin integrity of the forwarding path. Each legitimate host can embed its own secret message (a watermark) into the payload of any packet. The unique watermark is used as a signature of ownership of flow rules in the data plane since the watermark can only be generated by the source host who initiated the communication by sending the first packet to the data plane and established the flow rule with the controller. The destination host can verify the watermark by decoding it based on pre-shared secret configuration information. Any packet that does not contain this watermark signature is not authorized to use the data plane and thus will be dropped. This paper makes three important contributions to construct reliable and secure SDN. First, we address the misuse of the data plane in SDN and present freeloading. Second, we propose the watermarking technique to defend against the freeloading attack. Lastly, we implement and experiment our proposed method to show its effectiveness. This paper is organized as follows. Section II will explain SDN in general and introduce the new freeloading attack. Section III will present our proposed methods, watermarking. Experimental results will be discussed in Section IV. Section V will review the related literature. Finally, we will conclude our work suggesting directions for future research in Section VII. II. PROBLEM STATMENT The history of computer network, most notably the Internet, has demonstrated that users inject unauthorized packets for variety of purposes. The users can be selfish (such as stealthily piggybacking on other users network resources to minimize costs) or malicious (such as DoS attacks for remote servers, malware propagation into network, spam, and exploitation of remote hosts). We introduce a novel threat that facilitates such operations and call the entity subjects attackers. To motivate our attack, we first focus on the attacker s point of view. As discussed in Section II-A, all users need to establish the path access to utilize the forwarding path; in SDN, this
2 process involves the interaction with the network controller. A naïve attacker who wants to access the network will comply to such protocol and assume the overhead in control communication with the controller (which can hinder the timely actuation of the attack) and risk being subjected to reactive security measures implemented by the controller (such as traffic monitoring and source detection). We consider an intelligent attacker. In our threat model, the attackers exploit existing flow rules to launch malicious actions instead of installing new flow rules themselves, making the attackers unaccountable for their behaviors and the detection difficult. They could scrounge for existing flow rules in a flow table while intercepting any communication between two hosts. We call such an SDN attack freeloading. Such an attack is very difficult to detect and prevent because (1) the attack traffic is piggybacking on the existing flow rules used by benign hosts and (2) the flow establishment does not involve interactions with the network controller. In other words, the attack traffic is not processed through the controller, which generally assumes the security implementation and enforcement responsibilities in SDN. Furthermore, it enables attackers to bypass the installation cost of new flow rules. Host1 IP Address: :00:00:00:00:03 Host3 IP Address: :00:00:00:00:01 (3)$Response$ (1)$Sniff$Host1$ (2)$Spoofed$Packet$ S1(Open vswitch) Controller S2(Open vswitch) Host 2 IP Address: :00:00:00:00:04 Host 4 IP Address: :00:00:00:00:02 Figure 1. An illustrated freeloading attack in a virtual network in Mininet. A. Freeloading Attack: An Instantiation Freeloading is possible because the current SDN practice does not offer mechanisms to verify who is using flow rules beyond the address matching. To launch freeloading, the attackers need to be aware of the flow rules. The network-layer metadata, including flow rules, can be easily obtained via packet capture or other more sophisticated techniques in the data plane that uses the network topology information [35] or timing information due to processing and the controlcommunication-overhead delay [15], [17]. The attackers can also get the current network information by using various networking tools such as ping, traceroute, LLDP (Link Layer Discovery Protocol). In addition, man-in-the-middle attacks and spoofing attacks can be used to get the flow information [36]. After compromising the physical access to the local network, the attacker first sniffs neighbor hosts to acquire necessary data such as the source and destination IP/MAC addresses and the communication port numbers. Then, it sends its spoofed packets using the information obtained and launches stealthy attack without installing flow rules. Figure 1 illustrates such process with Host 1 communicating to Host 2. When Host 1 initiates its communication with Host 2 by exchanging ARP request/response and establishes flow rules with the controller, Host 3 can first obtain the necessary information of Host 1 and Host 2 and then use that information to send unauthorized packets to Host 2 without installing the flow rule itself. III. OUR PROPOSED COUTERMEASURE This section presents our proposed method to defend against the freeloading attack. To detect the misuse of flow tables, our proposed defense method is watermakring-based encoding. The watermark can help to identify the origin of packets for detecting malicious packets and check the ownership of the used flow rules. It requires the cooperation between the controllers, the switches, and the destinations. A. System Architecture We assume a priori established key between the users, for example, by using public-key infrastructure (PKI) and certificate authorities (CA); secure distribution of keys and configurations [23], [24] is beyond the scope of our contribution, and such assumptions are typical in conventional watermaking [20], [29] and, more broadly, in general secure protocol design. We leverage such infrastructure to share the watermark configuration information between a source host and the verification host, for example, the centralized controller distributes the configuration information to the source and the destination during the bootstrapping process, e.g., when the flow rule is established. In addition, the self-synchronization during decoding can be applied to avoid sharing configuration information in advance [29]. The encoding/decoding system can be placed as a wrapper function to capture packets between the application layer and the transport layer based on TCP/IP protocol stacks. The watermark will be embedded into application data (i.e. payload) in the packet through socket functions. Since many IP packets have a full payload and it is difficult to find space inside the payload of IP packets, the watermark is processed at the application layer. Thus, our scheme is robust against obfuscation-based threats that occur at the transport layer such as chaff, re-packetization, flow splitting, and so on [29]. This is in contrast to the traditional watermarking techniques to find the origin of attacks through intermediate hosts in the network. When a source host sends traffic after gaining legitimate access by having the controller establish the flow rules on the switches, the encoding system on the source host embeds a watermark into the payload according to predefined configurations. The decoding system (which can be located at the destination host or at the controller) verifies whether the source host uses its own flow rules installed between a source and a destination. If the decoded watermark does not match with the pre-shared configuration, the destination host sends out an alert to disclose the misuse of the flow rules to the controller. B. Encoding and Decoding a Watermark into Data Payloads We first describe the watermark generation. The configuration information, which is shared between the source host and the decoding host as described in Section III-A, includes a watermark f, the length of the watermark l, the random position to embed the watermark bits into the data
3 payload d. A traffic flow F with a series of packets F = <P 1, P 2,. >, is indexed in order of the departure time from a source host. Per configuration, the watermark is embedded in a packet or across multiple packets. Given an encoding or decoding function and the watermark FPT = < f, l, d, k >, the encoding system embeds the intended watermark f into the payload for a given flow F. The last value k is a control bit to disable the option of extending the watermark across multiple packets. If k is 0, the encoding system encodes all the watermark bits into the payload of one packet in the positions specified by d. The watermark bits are multiples of eight starting from 24 bits. For encoding multiple packets, the number of packets needed is derived by dividing the total watermark bits by eight. Encoding the watermark bits is based on one byte (8 bits) since the packet is formatted in 8-bit bytes with control bytes. Payload P i Header Encoding a fingerprint f P i Header Figure 2. An illustration of encoding a 24-bit watermark into one packet. (Note that f = , l=24, d={1, 3, 5}, k=0 for FPT = < f, l, d, k >.) Fig. 2 illustrates the encoding of a 24-bit watermark when k=0. The watermark bits shown in red are divided into 3 groups of 8 bits. According to the random distance d, each group is embedded after 1 byte, 3 bytes, and 5 bytes offset, as shown in Fig. 2. Because k is 0, only one packet is used to encode the 24- bit watermark. If k were 1, three packets would be needed to embed each of the 8 bits into different packets. Specifically, the first packet would have the first 8 bits of f after 1 byte offset in the payload of the first packet. The second packet would have another 8 bits of f after 3 bytes offset, starting from the first byte of the payload. Finally, the third packet would have the last 8 bits of f after 5 bytes offset in the payload of the third packet. This encoding rule can be changed by using different configuration information. The encoding process on a source host is simply performed when applications generate user data (payload) to be sent to a destination. The process is activated after a flow rule is installed on the switch. Because freeloading is launched on the existing flow rules, our proposed method encodes a watermark after the first successful communication (i.e. after installing flow rules). In addition, depending on the network protocol, the packet size varies from 7 to the maximum 65,542 bytes including the packet header. After SYN packets, a flow rule must be actually installed to prevent any possible DoS attack, as addressed in [17]. ACK is also often piggybacked with user data instead of a stand-alone packet. Therefore, any packet can be encoded with a watermark after flow rule installation. Similarly, the decoding system with the secret configuration information FPT = < f, l, d, k > used to encode f is now able to decode a f and match against f. Before reading user data, the decoding system deletes the embedded watermark from the payload according to the distance d. Given a watermarked flow F f and shared secret information (f, l, d, k), the decoding system is able to decode a watermark f and then compare it against f for detection purposes. If the original watermark f is matched with the decoded f, we can verify that the installed flow rule was used by the original flow rule requester, not an attacker. If not matched, the decoding system can drop the packets and inform a controller of the detection. A Hamming distance threshold h is used to filter out any noise in the process, including active transformations of the payload by attackers. Let H(f, f) represent the Hamming distance between f and f. If H(f, f) h, where h(0 h l) is a decoding threshold, the decoding system reports a positive detection. Although a higher threshold increases the detection rate (the possibility of correctly identifying a flow as being encoded with f), it also increases the false positive rate (the possibility of falsely identifying a flow as being embedded with f). The decision on h affects the tradeoff between the detection and the false positive [20]. The watermark presence provides a strong assurance for the legitimacy of the packet, as the unauthorized attackers do not have the configuration information by definition and cannot generate the correct watermarks. IV. EVALUATION A. Implementation and Experiment Setup We implemented the proposed method based on the socket library to read packets and to embed a watermark into packets. We also implemented the python PCAP file library to check the embedded watermarks by reading packets. We constructed a virtual network in Mininet based on Open vswitch version on Linux [1]. Mininet creates customized topology with OpenFlow switches, routers, and the controller. As described in Figure 1, the experimental setup consisted of one SDN controller, two OpenFlow-enabled switches and four hosts in a network. We used POX for the SDN controller using OpenFlow 1.0, which is the default controller in Mininet. To generate flows and to replay PCAP files collected from public websites, we used Tcpreplay [21] on the Mininet. In addition, to generate attacks on the Mininet, we used Scapy [22]. We simulate threat scenarios described in Fig. 1. First, we evaluated a port scan attack and a SYN flood attack to measure the major characteristics of these two attacks in SDN. We also analyzed the time required to launch a freeloading attack by using an IP spoofing attack in the SDN environment. Lastly, we evaluated the effectiveness of the proposed method in detecting the watermarks under various attacks. B. Experimental Results Attacks without freeloading: To motivate freeloading, we first study the naïve attacker s overhead when it attacks the network without taking advantage of the freeloading vulnerability. (As discussed previously, our work is the first to build integrity and check the enforcement of flow rule establishment.) We first tested the processing time to install one flow rule on swithces. It takes, on average ms for a switch to install one flow rule on the switch S1 in Mininetbased simulation, and the same process requires ms for emulator-based testbed using actual computers as hosts.
4 Fig. 2 shows the results of port scan attacks and SYN flood attacks in the SDN and shows the number of flow rules that the attackers installed in the switch (S1) over time. The number of flow rules installed in the other switch (S2) is comparable to that of S1. In addition, The figure demonstrated the time overhead in launching attacks due to the flow rule installation time. For example, it requires about 0.5 ms to launch these attacks in Mininet and more than 4 ms in the emulation. We expected that the delays takes effect more than these values in real networks since each attack requires the installation of many new flow rules to forward attack packets. Both attacks required installation of almost the same number of flow rules per packet with respect to applications or port numbers. Moreover, the flow installation will enable the security monitor tools on the controller to monitor the activity of the installed flow rules. First, in for port scanning, Host 1 acted as an attacker and scanned the ports of Host 2. In SDN in Mininet, the controller enforced both of the switches (S1 and S2) to install every single flow rule for each packet because each packet had targeted different port numbers. Similarly, a SYN flood attack was performed from Host1 to Host 2 on Host 2 s ports 22 and 80. As the attack started, the number of flow rules increased over time. Therefore, due to the flow rule installation time, the time to lunch attacks also increased as the number of packets increased. monitored by the controller because the malicious traffic is injected into the benign traffic on the existing flow rules. This is a serious attack that circumvents the fundamental requirement of SDN for installation of new rules and avoid security monitoring on the controller. At a per-packet level, there was no difference between the legitimate packets and the freeloading packets. Although a flow traffic analyses (intuitively, the number of packets do increase) can be used for attack detection, but this will likely penalize the legitimate user Host 1 as well since the two flows cannot be distinguished from each other. We introduce watermarks to distinguish the legitimate and the freeloading packets. Further developments such as an end-to-end security leveraging the watermark is beyond the scope of this paper. Robustness and effectiveness of watermarking: To evaluate the robustness of the proposed method, we varied the payload according to attack rate. The attack rate will be from 0% to 50 % to obfuscate the percentage of the payload. For example, if the attack rate is 20%, only 20% of the total payload per packet will be randomly changed. To defeat the watermarking technique, attackers might develop other obfuscation techniques, but we have only assumed this simple randomness to alter the payload of a packet. Figure 2. The number of flow rules in the switch installed by attacks over time (Freeloading attack resulted in no flow rules installed over time and is thus omitted here). Freeloading attacks: We evaluated a freeloading attack over time. From Fig. 1, Host 3 caused a freeloading attack to Host 2 by using the flow rules that Host 1 set up. As a result, the network held Host 1 accountable when Host 3 used the flow. In addition, there was no difference in the number of flow rules installed in switch S2. In other words, even though Host 3 sent a new packet to Host 2, Host 3 did not need to wait to install flow rules in both switches, S1 and S2. It just took ms on average at first to get the target host information, but it eventually consumed a very small amount of time to launch the malicious actions in SDN in order to understand the existing flow rules. This was expected since the freeloading attack just utilized existing flow rules already installed in the switches. It doesn t require to install any flow rule to send any packets. Therefore, no communication and processing costs are involved between the controller and the data plane. Compared to the results of the two well-known attacks, freeloading can be launched with existing flow rules on the switches, with the very small delay time at first. Furthermore, this attacks can not be (a) One packet used for encoding and decoding (b) Multiple packets used for encoding and decoding Figure 3. A detection rate under various attack rates.
5 (a) One packet used for encoding and decoding Throughout the experiments, the embedded watermark was strong enough to identify whether the payload was generated by the installed flow rules from a particular source. The watermark was not sensitive to an attacker s obfuscation, which failed to defeat the watermarking method. In fact, other intrusion detection systems as well as our proposed system can identify if attackers change the entire original payload. In addition, the higher the threshold value (h), the higher the false positive rate. Therefore, the threshold value should be less than 7 even though the large value can theoretically be used as in [20]. The number of packets to embed a watermark affects the effectiveness of the watermarking scheme. It is proportional to the length of the watermark. Comparing to traditional watermark schemes [20], [29], this new watermark technique doesn t require many packets since it embeds a watermark into data payloads instead of using packet timings. Given FPT = < f, l, d, k >, the number of packets needed is derived by dividing the total watermark bits by eight. Encoding the watermark bits is based on one byte (8 bits) since the packet is formatted in 8- bit bytes with control bytes. To embed a 48-bit watermark, depending on the random distance d, we might need around 6 packets when we choose k=1. If k=0, it is better to choose a 24- bit watermark to use only one packet. (b) Multiple packets used for encoding and decoding Figure 4. A false positive rate under various attack rates. As shown in Fig. 3, the detection rate of the watermark was almost 98% for attack rates up to 50% with configurations as shown in Fig. 3. For attack rates up to a 30% attack rate, the detection rate of the watermark was 100% for all the configuration values used in these experiments. This shows how difficult it is for attackers to change the watermark, since they do not have any knowledge of the configuration values. In the case where multiple packets are encoded, it is harder for attackers to obfuscate payloads because the watermark will be spread throughout different packets randomly. They can only randomly inject bytes into packets on the fly, which requires a great level of sophistication and increases the attacker cost. Fig. 4 showed false positive rates according to various attack rates since the detection rate was almost 98% at any attack rates. Fig. 4 demonstrated the robustness and the effectiveness of the proposed method even when attackers try to obfuscate the payload. In Fig. 4 (a) and (b), the false positive rate was less than % whether using one packet or multiple packets to encode a 24-bit watermark into the payload. Compared to 48-bit watermark with the same values as other parameters, the false positive rate dropped to 0.024%. However, if we use the decoding threshold h=9, the false positive rate increased up to 0.1% in spite of a 48-bit watermark. V. RELATED WORK Many prior work has successfully implemented SDN. FlowVisor has proposed a virtual network by slicing the network and has provided an modular platform for OpenFlow controllers [14]. VeriFlow has presented a method for checking invariant property violations in the network through network slicing [9]. FleXam has suggested a sampling method that enables the controller to access packet-level information [18]. While the aforementioned work has focused on the general virtualization aspect of SDN, others have focused more on the routing behavior of SDN. FortNox enables NOX to check contradiction of flow rules in real time, and safeguards against malware applications that may update rules to contradict existing flow rules [13]. FLOVER has proposed a model checking system to verify the compliance of a flow rule set against an invariant security policy [19]. Our work operates orthogonally to these work; while these work investigates the flow rule itself to detect anomaly, our work embeds watermark and implements the origin integrity at the application layer, i.e., the watermark is embedded at the data payload. In OpenFlow, which enables communication between the controller and the routing switches, poor rule design can lead to accidental saturation of queries to the controller, creating a bottleneck in all switches because of the heavy reliance on the controller. Researchers have highlighted this vulnerability and its security implications in prior work [11], [15], and others have proposed solutions in traffic monitoring [4] and ratelimiting [11]. In contrast to these prior work which adopts reactive solutions, we offer a proactive approach in protecting the source integrity of flow rule. Others have also used machine learning techniques in the security context to detect abnormal flows by selecting important features from network flows [31], [32]. Livadas et. al [31] and Narang et. al [32] detected botnet traffic based on selecting important features based on Naïve Bayes algorithm and the
6 Bayesian Network classifier. Braga et. al. proposed the use of machine learning techniques for DDOS flooding attack detection based on self-organized maps in NOX/OpenFlow [4]. These prior work extracted more feature sets from the flow table than we did; we can incorporate their techniques into our work to improve accuracy, as we will discuss in Section VI. VI. CONCLUSION This paper studies the freeloading vulnerability and presents a countermeasure to detect such attacks and to identify the misuse of flow table. Our work is the first to address the potential for a flow rule (installed on a switch) to be exploited by attackers for malicious purposes. To defend against such attacks, we have proposed a scheme that embeds watermarks on the packet payload, which can then be used to detect the misuse of flow rules when the rules are not used by unauthorized users. Our evaluations show that our proposed method is resilient against attackers who obfuscate the watermarking signature and performs well in a noisy environment. REFERENCES [1] Open vswitch. [2] Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu, Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures. In Proc. of 22nd Annual Network & Distributed System Security Symposium (NDSS'15), San Diego, CA, USA. February [3] Antikainen, Markku and Aura, Tuomas and Särelä, Mikko, Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch, Secure IT Systems, Lecture Notes in Computer Science, pp , Springer, [4] R. Braga, Braga, E. Mota, Mota, and A. Passito, Passito, Lightweight ddos flooding attack detection using nox/openflow, In Proc. of IEEE Conference on Local Computer Networks, LCN, [5] A. D. Ferguson, A. Guha, C. Liang, R. Fonseca, and S. Krishnamurthi, Participatory networking: An api for application control of sdns, SIGCOMM Comput. Commun. Rev., 43(4): , [6] S. K. FG ottingen, oayazbakhsh, V. Sekar, M. Yu, and J. C. Mogul, Flowtags: Enforcing network-wide policies in the presence of dynamic middlebox actions, In Proc. of ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking(HotSDN), [7] O. N. Foundation. Software-defined networking: The new norm for networks. Technical report, [8] R. Hand, M. Ton, and E. Keller, Active security, In Proc. of ACM Workshop on Hot Topics in Networks, HotNets-XII, [9] A. Khurshid, W. Zhou, M. Caesar, and P. B. Godfrey, Veriflow: Verifying network-wide invariants in real time,. In Proc. of ACM Workshop on Hot Topics in Software Defined Networks (HotSDN), [10] R. Kloti, V. Kotronis, and P. Smith. Openflow: A security analysis. In Proc. of IEEE International Conference on Network Protocols, ICNP, [11] D. Kreutz, F. M. Ramos, and P. Verissimo. Towards secure and dependable software-defined networks. In Proc. of ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, HotSDN 13, [12] OpenFlow. Openflow switch specification version Technical report, [13] P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu. A security enforcement kernel for openflow networks. In Proc. of ACM Workshop on Hot Topics in Software Defined Networks, HotSDN 12, [14] R. Sherwood, G. Gibb, K.-K. Yap, G. Appenzeller, M. Casado, N. McKeown, and G. Parulkar. Can the production network be the testbed? In Proc. of USENIX Conference on Operating Systems Design and Implementation, OSDI 10, [15] S. Shin and G. Gu. Attacking software-defined networks: A first feasibility study. In Proc. of ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, HotSDN 13, pages , [16] S. Shin, P. A. Porras, V. Yegneswaran, M. W. Fong, G. Gu, and M. Tyson. Fresco: Modular composable security service for software-defined networks. In Proc. of Annual Network and Distributed System Security Symposium, NDSS [17] S. Shin, V. Yegneswaran, P. Porras, and G. Gu. Avant-guard: Scalable and vigilant switch flow management in softwaredefined networks. In Proc. of ACM SIGSAC Conference on Computer and Communications Security, CCS 13, pages , [18] S. Shirali-Shahreza and Y. Ganjali. Flexam: Flexible sampling extension for monitoring and security applications in openflow. In Proc. of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), 2013 [19] S. Son, S. Shin, V. Yegneswaran, P. A. Porras, and G. Gu. Model checking invariant security properties in openflow. In Proc. of IEEE International Conference on Communications, ICC, [20] X. Wang and D. S. Reeves, Robust Correlation of Encrypted AttackTraffic through Stepping Stones by Manipulation of Interpacket Delays, in Proc. of ACM conference on Computer and CommunicationSecurity (CCS), Oct [21] Tcpreplay. [22] Scapy. [23] J. Chiang and Y.C. Hu, Dynamic Jamming Mitigation for Wirelss Broadcast Networks, in Proc. of IEEE Conference on Computer Communications (Infocom), Phoenix, AZ, April [24] S.Y. Chang, Y.C. Hu, and N. Laurenti, SimpleMAC: A Jamming-Resilient MAC- Layer Protocol for Wireless Channel Coordination, in Proc. of ACM Conference on Mobile Computing and Networking (MobiCom), Istanbul, Turkey, August [25] Mitchell, Thomas M., Machine Learning, McGraw-Hill, Inc., New York, NY, USA, [26] S. Mousavi, Early Detection of DDoS Attacks in Software Defined Networks Controller, Master Thesis at Carleton University, May, 2014 [27] Open Networking Foundation. Software-Defined Network: The New Norm for Networks, ONF White Paper, April, [28] T. Koponen et al., Onix: a distributed control platform for large-scale production networks, In Proc. of USENIX Conference on Operating Systems Design and Implementation (OSDI), [29] Xinyuan Wang, Shiping Chen and Sushil Jajodia. Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. In Proc. of the 2007 IEEE Symposium on Security & Privacy (S&P 2007), May [30] Scott-Hayward, S., O'Callaghan, G. and Sezer, S, SDN Security: A Survey, In Proc. of IEEE SDN for Future Networks and Services (SDN4FNS), [31] C. Livadas, R. Walsh, D. Lapsley, W. Strayer, Using machine learning technliques to identify botnet traffic, in Proc. of IEEE Conference on Local Computer Networks, [32] Pratik Narang, Jagan Mohan Reddy and Chitterranjan Hota, Feature Selection for Detection of Peer-to-Peer Botnet Traffic, in the Proc. of ACM Computing Convention, [33] Young June Pyun and Dogulas S. Reeves, Strategic deployment of network monitors for attack attribution, in the Proc. of IEEE International Conference on Broadband Communications, Networks and Systems (BROADNETS), [34] Xiaosong Wang; Li Wang; Benhai Yu; Guixue Dong, "Studies on Network Management System framework of Campus Network," In Proc. of 2nd International Asia Conference on Informatics in Control, Automation and Robotics (CAR), March 2010.
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, University of Padua, Italy {surname}@math.unipd.it
Future of DDoS Attacks Mitigation in Software Defined Networks
Future of DDoS Attacks Mitigation in Software Defined Networks Martin Vizváry, Jan Vykopal Institute of Computer Science, Masaryk University, Brno, Czech Republic {vizvary vykopal}@ics.muni.cz Abstract.
Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu
Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu Presented by Alaa Shublaq SDN Overview Software-Defined Networking
SDN Security Design Challenges
Nicolae Paladi SDN Security Design Challenges SICS Swedish ICT! Lund University In Multi-Tenant Virtualized Networks Multi-tenancy Multiple tenants share a common physical infrastructure. Multi-tenancy
Security improvement in IoT based on Software Defined Networking (SDN)
Security improvement in IoT based on Software Defined Networking (SDN) Vandana C.P Assistant Professor, New Horizon College of Engineering Abstract With the evolving Internet of Things (IoT) technology,
DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking
DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking Bing Wang Yao Zheng Wenjing Lou Y. Thomas Hou Virginia Polytechnic Institute and State University, Blacksburg, VA, USA
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Towards Autonomic DDoS Mitigation using Software Defined Networking
Towards Autonomic DDoS Mitigation using Software Defined Networking Authors: Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar NDSS Workshop on Security of Emerging Networking Technologies (SENT
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
FLOWGUARD: Building Robust Firewalls for Software-Defined Networks
FLOWGUARD: Building Robust Firewalls for Software-Defined Networks Hongxin Hu, Wonkyu Han, Gail-Joon Ahn, and Ziming Zhao Clemson University Arizona State University [email protected], {whan7,gahn,zzhao3}@asu.edu
Accurate Anomaly Detection using Adaptive Monitoring and Fast Switching in SDN
I.J. Information Technology and Computer Science, 2015, 11, 34-42 Published Online October 2015 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2015.11.05 Accurate Anomaly Detection using Adaptive
FLOWGUARD: Building Robust Firewalls for Software-Defined Networks
FLOWGUARD: Building Robust Firewalls for Software-Defined Networks Hongxin Hu, Wonkyu Han, Gail-Joon Ahn, and Ziming Zhao Clemson University Arizona State University [email protected], {whan7,gahn,zzhao3}@asu.edu
LPM: Layered Policy Management for Software-Defined Networks
LPM: Layered Policy Management for Software-Defined Networks Wonkyu Han 1, Hongxin Hu 2 and Gail-Joon Ahn 1 1 Arizona State University, Tempe, AZ 85287, USA {whan7,gahn}@asu.edu 2 Clemson University, Clemson,
Mitigating High-Rate Application Layer DDoS Attacks in Software Defined Networks
Mitigating High-Rate Application Layer DDoS Attacks in Software Defined Networks João Henrique 1, Iguatemi E. Fonseca 1 and Vivek Nigam 1 1 Federal University of Paraíba, Brazil [email protected], {iguatemi,vivek}@ci.ufpb.br
Enabling Practical SDN Security Applications with OFX (The OpenFlow extension Framework)
Enabling Practical SDN Security Applications with OFX (The OpenFlow extension Framework) John Sonchack, Adam J. Aviv, Eric Keller, and Jonathan M. Smith Outline Introduction Overview of OFX Using OFX Benchmarks
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Traffic-based Malicious Switch Detection in SDN
, pp.119-130 http://dx.doi.org/10.14257/ijsia.2014.8.5.12 Traffic-based Malicious Switch Detection in SDN Xiaodong Du 1, Ming-Zhong Wang 1, Xiaoping Zhang 2* and Liehuang Zhu 1 1 Beijing Engineering Research
A collaborative model for routing in multi-domains OpenFlow networks
A collaborative model for routing in multi-domains OpenFlow networks Xuan Thien Phan, Nam Thoai Faculty of Computer Science and Engineering Ho Chi Minh City University of Technology Ho Chi Minh city, Vietnam
OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?
OpenFlow and Onix Bowei Xu [email protected] [1] McKeown et al., "OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, 38(2):69-74, Apr. 2008. [2] Koponen et al., "Onix: a Distributed Control
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
Taxonomic Modeling of Security Threats in Software Defined Networking
Taxonomic Modeling of Security Threats in Software Defined Networking Recent advances in software defined networking (SDN) provide an opportunity to create flexible and secure next-generation networks.
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,
Software Defined Networking What is it, how does it work, and what is it good for?
Software Defined Networking What is it, how does it work, and what is it good for? slides stolen from Jennifer Rexford, Nick McKeown, Michael Schapira, Scott Shenker, Teemu Koponen, Yotam Harchol and David
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
Can Software Defined Networks (SDN) manage the dependability of the service provided to selected customers?
Can Software Defined Networks (SDN) manage the dependability of the service provided to selected customers? Gianfranco Nencioni Dipartimento di Ingegneria dell Informazione Università di Pisa Mini-seminar
48 0890-8044/15/$25.00 2015 IEEE
An Extended SDN Architecture for Network Function Virtualization with a Case Study on Intrusion Prevention Ying-Dar Lin, Po-Ching Lin, Chih-Hung Yeh, Yao-Chun Wang, and Yuan-Cheng Lai Abstract In conventional
DDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia [email protected] Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
Open Source Network: Software-Defined Networking (SDN) and OpenFlow
Open Source Network: Software-Defined Networking (SDN) and OpenFlow Insop Song, Ericsson LinuxCon North America, Aug. 2012, San Diego CA Objectives Overview of OpenFlow Overview of Software Defined Networking
Network Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Security Challenges & Opportunities in Software Defined Networks (SDN)
Security Challenges & Opportunities in Software Defined Networks (SDN) June 30 th, 2015 SEC2 2015 Premier atelier sur la sécurité dans les Clouds Nizar KHEIR Cyber Security Researcher Orange Labs Products
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
Xperience of Programmable Network with OpenFlow
International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 2013 Xperience of Programmable Network with OpenFlow Hasnat Ahmed, Irshad, Muhammad Asif Razzaq, and Adeel Baig each one is
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
Intrusion Detection in Software Defined Networks with Self-organized Maps
Paper Intrusion Detection in Software Defined Networks with Self-organized Maps Damian Jankowski and Marek Amanowicz Institute of Telecommunication, Faculty of Electronics, Military University of Technology,
Review On Architecture & Security Issues of SDN
Review On Architecture & Security Issues of SDN Gagandeep Garg 1, Roopali Garg 2 Research Scholar, Dept. Of IT, U.I.E.T., PU, Chandigarh, India 1 Coordinator, Dept. Of IT, U.I.E.T., PU, Chandigarh, India
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Shie-Yuan Wang Hung-Wei Chiu and Chih-Liang Chou Department of Computer Science, National Chiao Tung University, Taiwan Email: [email protected]
Network Security through Software Defined Networking: a Survey
[email protected] 09/30/14 Network Security through Software Defined Networking: a Survey Jérôme François, Lautaro Dolberg, Olivier Festor, Thomas Engel 2 1 Introduction 2 Firewall 3 Monitoring
OperationCheckpoint: SDN Application Control
OperationCheckpoint: SDN Application Control Workshop on Secure Network Protocols (NPSec 14) 19 October 2014 Sandra Scott-Hayward, Christopher Kane and Sakir Sezer [email protected] Centre for
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Multiple Service Load-Balancing with OpenFlow
2012 IEEE 13th International Conference on High Performance Switching and Routing Multiple Service Load-Balancing with OpenFlow Marc Koerner Technische Universitaet Berlin Department of Telecommunication
A Survey of SDN Security Research
A Survey of SDN Security Research Michael Coughlin University of Colorado Boulder [email protected] ABSTRACT Software defined networking (SDN) has established a new method for creating and
FRESCO: Modular Composable Security Services for So;ware- Defined Networks
FRESCO: Modular Composable Security Services for So;ware- Defined Networks Seungwon Shin, Phil Porras, Vinod Yegneswaran, MarIn Fong, Guofei Gu, and Mabry Tyson SUCCESS LAB, Texas A&M and SRI Interna7onal
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
A denial of service attack against the Open Floodlight SDN controller
A denial of service attack against the Open Floodlight SDN controller Jeremy M. Dover Dover Networks LLC [email protected] Open Floodlight is an open-source software-defined network controller,
White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.
TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Providing Elasticity to Intrusion Detection Systems in Virtualized Software Defined Networks
IEEE ICC 215 - Communication and Information Systems Security Symposium Providing Elasticity to Intrusion Detection Systems in Virtualized Software Defined Networks Martin Andreoni Lopez, Otto Carlos M.
Early Detection of DDoS Attacks in Software Defined Networks Controller
Early Detection of DDoS Attacks in Software Defined Networks Controller By Seyed Mohammad Mousavi A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks
1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion
Securing Local Area Network with OpenFlow
Securing Local Area Network with OpenFlow Master s Thesis Presentation Fahad B. H. Chowdhury Supervisor: Professor Jukka Manner Advisor: Timo Kiravuo Department of Communications and Networking Aalto University
OrchSec: An Orchestrator-Based Architecture For Enhancing Network Monitoring and SDN Control Functions
OrchSec: An Orchestrator-Based Architecture For Enhancing Network Monitoring and SDN Control Functions 9 May 2014 Dr.-Ing. Kpatcha Bayarou Head, Mobile Networks Fraunhofer SIT [email protected]
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
An Introduction to Software-Defined Networking (SDN) Zhang Fu
An Introduction to Software-Defined Networking (SDN) Zhang Fu Roadmap Reviewing traditional networking Examples for motivating SDN Enabling networking as developing softwares SDN architecture SDN components
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
OpenFlow: Load Balancing in enterprise networks using Floodlight Controller
OpenFlow: Load Balancing in enterprise networks using Floodlight Controller Srinivas Govindraj, Arunkumar Jayaraman, Nitin Khanna, Kaushik Ravi Prakash [email protected], [email protected],
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
OpenFlow Vulnerability Assessment
OpenFlow Vulnerability Assessment Kevin Benton School of Informatics and Computing Indiana University Bloomington, Indiana, USA [email protected] L. Jean Camp School of Informatics and Computing Indiana
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators Liang Xia [email protected] Tianfu Fu [email protected] Cheng He Danping He [email protected]
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Vulnerability Analysis 1 Roadmap Why vulnerability analysis? Example: TCP/IP related vulnerabilities
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Software Defined Networking and OpenFlow: a Concise Review
Software Defined Networking and OpenFlow: a Concise Review Stefano Forti [email protected] MSc in Computer Science and Networking Scuola Superiore Sant'Anna - University of Pisa 1. Introduction
Improving Network Management with Software Defined Networking
Improving Network Management with Software Defined Networking Hyojoon Kim and Nick Feamster, Georgia Institute of Technology 2013 IEEE Communications Magazine Presented by 101062505 林 瑋 琮 Outline 1. Introduction
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
AuthFlow: Authentication and Access Control Mechanism for Software Defined Networking
AuthFlow: Authentication and Access Control Mechanism for Software Defined Networking Diogo Menezes Ferrazani Mattos, Lyno Henrique Gonçalves Ferraz, Otto Carlos Muniz Bandeira Duarte Grupo de Teleinformática
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Empowering Software Defined Network Controller with Packet-Level Information
Empowering Software Defined Network Controller with Packet-Level Information Sajad Shirali-Shahreza, Yashar Ganjali Department of Computer Science, University of Toronto, Toronto, Canada Abstract Packet
Cloud Computing Security: What Changes with Software-Defined Networking?
Cloud Computing Security: What Changes with Software-Defined Networking? José Fortes Center for Cloud and Autonomic Computing Advanced Computing and Information Systems Lab ARO Workshop on Cloud Security
Failover Mechanisms for Distributed SDN Controllers
Failover Mechanisms for Distributed SDN Controllers Mathis Obadia, Mathieu Bouet, Jérémie Leguay, Kévin Phemius, Luigi Iannone Thales Communications & Security {firstname.name}@thalesgroup.com Telecom
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
SHIN, WANG AND GU: A FIRST STEP TOWARDS NETWORK SECURITY VIRTUALIZATION: FROM CONCEPT TO PROTOTYPE 1
SHIN, WANG AND GU: A FIRST STEP TOWARDS NETWORK SECURITY VIRTUALIZATION: FROM CONCEPT TO PROTOTYPE 1 A First Step Towards Network Security Virtualization: From Concept To Prototype Seungwon Shin, Haopei
Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks
Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks *Abhishek Vora B. Lakshmi C.V. Srinivas National Remote Sensing Center (NRSC), Indian Space Research Organization (ISRO),
Ten Things to Look for in an SDN Controller
Ten Things to Look for in an SDN Controller Executive Summary Over the last six months there has been significant growth in the interest that IT organizations have shown in Software-Defined Networking
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
How To Understand The Power Of The Internet
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461
Software-Defined Networking Security: Pros and Cons
Software-Defined Networking Security: Pros and Cons Mehiar Dabbagh, Bechir Hamdaoui, Mohsen Guizani and Ammar Rayes Oregon State University, Corvallis, OR 97331, dabbaghm,[email protected] Qatar University,
Towards Secure Multi-tenant Virtualized Networks
Towards Secure Multi-tenant Virtualized Networks Nicolae Paladi SICS Swedish ICT [email protected] Christian Gehrmann SICS Swedish ICT [email protected] Abstract Network virtualization enables multi-tenancy
