Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ International Journa...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
https://dx.doi.org/10.60692/t5...
Other literature type . 2017
Data sources: Datacite
https://dx.doi.org/10.60692/3z...
Other literature type . 2017
Data sources: Datacite
versions View all 3 versions
addClaim

Mitigating Address Spoofing Attacks in Hybrid SDN

التخفيف من هجمات تزييف العناوين في الشبكات المعرفة بالبرمجيات الهجينة
Authors: Fahad Ubaid; Rashid Amin; Faisal Bin; Muhammad Muwar;

Mitigating Address Spoofing Attacks in Hybrid SDN

Abstract

Les attaques d'usurpation d'adresse comme l'usurpation ARP et les attaques DDoS sont principalement lancées dans un environnement de réseau pour dégrader les performances. Ces attaques décomposent parfois les services réseau avant que l'administrateur ne prenne connaissance de la condition d'attaque. Le Software Defined Networking (SDN) est apparu comme une nouvelle architecture de réseau dans laquelle le plan de date est isolé du plan de contrôle. Le plan de contrôle est mis en œuvre au niveau d'un dispositif central appelé contrôleur. Mais, le paradigme SDN n'est pas couramment utilisé en raison de certaines contraintes comme le budget, les compétences limitées pour contrôler SDN, la flexibilité des protocoles traditionnels. Pour obtenir des avantages SDN dans un réseau traditionnel, un nombre limité de périphériques SDN peut être déployé parmi les périphériques existants. Cette technique est appelée SDN hybride. Dans cet article, nous proposons une nouvelle approche pour détecter automatiquement la condition d'attaque et atténuer cette attaque dans le SDN hybride. Nous représentons la topologie du réseau sous la forme d'un graphe. Un mécanisme de traversée basé sur un graphique est adopté pour indiquer l'emplacement de l'attaquant. Les résultats de la simulation montrent que notre approche améliore l'efficacité du réseau et améliore la sécurité du réseau.

Los ataques de suplantación de direcciones, como la suplantación de ARP y los ataques DDoS, se lanzan principalmente en un entorno de red para degradar el rendimiento. Estos ataques a veces descomponen los servicios de red antes de que el administrador se entere de la condición del ataque. Las redes definidas por software (SDN) han surgido como una nueva arquitectura de red en la que el plano de fecha está aislado del plano de control. El plano de control se implementa en un dispositivo central llamado controlador. Sin embargo, el paradigma SDN no se usa comúnmente debido a algunas limitaciones como el presupuesto, las habilidades limitadas para controlar SDN y la flexibilidad de los protocolos tradicionales. Para obtener beneficios de SDN en una red tradicional, se puede implementar un número limitado de dispositivos SDN entre dispositivos heredados. Esta técnica se llama SDN híbrido. En este documento, proponemos un nuevo enfoque para detectar automáticamente la condición de ataque y mitigar ese ataque en SDN híbrido. Representamos la topología de red en forma de gráfico. Se adopta un mecanismo transversal basado en gráficos para indicar la ubicación del atacante. Los resultados de la simulación muestran que nuestro enfoque mejora la eficiencia de la red y mejora la seguridad de la red.

Address spoofing attacks like ARP spoofing and DDoS attacks are mostly launched in a networking environment to degrade the performance. These attacks sometimes break down the network services before the administrator comes to know about the attack condition. Software Defined Networking (SDN) has emerged as a novel network architecture in which date plane is isolated from the control plane. Control plane is implemented at a central device called controller. But, SDN paradigm is not commonly used due to some constraints like budget, limited skills to control SDN, the flexibility of traditional protocols. To get SDN benefits in a traditional network, a limited number of SDN devices can be deployed among legacy devices. This technique is called hybrid SDN. In this paper, we propose a new approach to automatically detect the attack condition and mitigate that attack in hybrid SDN. We represent the network topology in the form of a graph. A graph based traversal mechanism is adopted to indicate the location of the attacker. Simulation results show that our approach enhances the network efficiency and improves the network security.

يتم إطلاق هجمات تزييف العناوين مثل خداع ARP وهجمات DDoS في الغالب في بيئة شبكية لتقليل الأداء. تعطل هذه الهجمات أحيانًا خدمات الشبكة قبل أن يتعرف المسؤول على حالة الهجوم. برزت الشبكات المعرفة بالبرمجيات (SDN) كهندسة شبكة جديدة يتم فيها عزل مستوى التاريخ عن مستوى التحكم. يتم تنفيذ مستوى التحكم على جهاز مركزي يسمى وحدة التحكم. ولكن، لا يتم استخدام نموذج SDN بشكل شائع بسبب بعض القيود مثل الميزانية، والمهارات المحدودة للتحكم في SDN، ومرونة البروتوكولات التقليدية. للحصول على فوائد SDN في شبكة تقليدية، يمكن نشر عدد محدود من أجهزة SDN بين الأجهزة القديمة. تسمى هذه التقنية Hybrid SDN. في هذه الورقة، نقترح نهجًا جديدًا للكشف التلقائي عن حالة الهجوم والتخفيف من هذا الهجوم في SDN الهجين. نمثل طوبولوجيا الشبكة في شكل رسم بياني. يتم اعتماد آلية اجتياز قائمة على الرسم البياني للإشارة إلى موقع المهاجم. تُظهر نتائج المحاكاة أن نهجنا يعزز كفاءة الشبكة ويحسن أمان الشبكة.

Related Organizations
Keywords

Denial-of-service attack, Computer Networks and Communications, Security in SDN, Artificial Intelligence, Computer security, Software-defined networking, Network administrator, SDN Controllers, Spoofing attack, DDoS Attacks, Computer network, Routing control plane, Network topology, Network packet, Network architecture, Software-Defined Networking and Network Virtualization, Forwarding plane, Computer science, Software-Defined Networking, Distributed computing, Intrusion Detection, Operating system, Machine Learning for Internet Traffic Classification, Computer Science, Physical Sciences, Network Intrusion Detection and Defense Mechanisms, The Internet

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    5
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
5
Average
Average
Average
gold