Detecting Suspicious Behavior of SDN Switches by Statistics Gathering with Time

Size: px
Start display at page:

Download "Detecting Suspicious Behavior of SDN Switches by Statistics Gathering with Time"

Transcription

1 Detecting Suspicious Behavior of SDN Switches by Statistics Gathering with Time Takahiro Shimizu, Naoya Kitagawa, Kohta Ohshima, Nariyoshi Yamai Tokyo University of Agriculture and Technology Tokyo University of Marine Science and Technology APAN Research Workshop 2018 August 6 th, 2018

2 2 Outline Background Related Work Proposed Method: Forwarding state verification with scheduled statistics gathering Experiment Discussion Conclusion

3 3 What is Software Defined Network (SDN)? Decouples network control and packet forwarding function Enables flexible network control by centralized control plane Controller is programmable Maintains a global view of the entire network, thus enable efficient routing OpenFlow: A protocol to realize SDN CP DP CP DP Switch CP DP Traditional Network CP DP Controller CP DP DP DP DP SDN Switch Software Defined Network

4 4 Background Software Defined Network: often used programmable software switches Increase probability of compromise than traditional hardware switches CVE : buffer overflow vulnerability caused by compromised MPLS packet in Open vswitch

5 5 Background Attacks possible from compromised switches Packet misrouting Packet dropping (Switch blackhole) Packet injecting üthese attacks affects the entire network! Protection of SDN data plane is more important than traditional networks! [1],[2] [1] Dhawan, M., Poddar, R., Kshiteej, M., & Vijay, M. (2015). SPHINX: Detecting Security Attacks in Software-Defined Networks. In Proceedings 2015 Network and Distributed System Security Symposium (pp. 8 11). [2] Shaghaghi, A., Kaafar, M. A., & Jha, S. (2017). WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS 17 (pp ). New York, New York, USA: ACM Press.

6 6 Related Work Byte consistency check (SPHINX [M.Dhawan et al. / NDSS 15] ) Compare the entire view of network (Flow graph) with the amount of packet transfer Construct flow graph with collected route information (FLOW_MOD messages) and calculate expected path Controller Controller Application Route info. (FLOW_MOD) SPHINX Statistics data(stats_reply): asynchronous message from switches respond to STATS_REQUEST ü Depends on the timing of STATS_REQUEST message received Issue Verification accuracy depends on the controller performance Host OpenFlow switches Host

7 7 Background Technology Time4 [T.Mizrahi et al./infocom 16] Schedule network updating at the same time with Scheduled Bundle Utilizes IEEE1588 Precision Time Protocol (PTP) Enables nanosecond order time synchronization using hardware-timestamping enabled NIC module. Without depend on the controller performance It is scalable! Controller Our Challenge Solve the issue of Byte consistency check with statistics gathering at the same time Host Time-synchronized OpenFlow Switches Host

8 8 Our method Forwarding State Verification with Timed Statistics Gathering Schedule the timing of statistics gathering at the same time to each switches Synchronize clocks between Verifier and OpenFlow switches üenables to verify without depending on the performance of the controller Route information (FLOW_MOD) Controller Controller Application Performing verification without depend on the performance of the controller Verifier Statistics (STATS_REPLY) Get actual transfer statistics of all switches at the same time with Scheduled Bundle. Host Time synchronized OpenFlow switches Host

9 9 Assumption The controller applications are trusted Majority of switches are legitimate These assumption similar to SPHINX Focus on the data plane security Knows reliable physical topology Control-plane security is well studied by other work [3] Trusted controller application Controller Controller Application Verifier Knows reliable physical topology Majority of switches are legitimate (some compromised switches included) Host Time synchronized OpenFlow switches Host [3] S. Khan, A. Gani, A. W. Abdul Wahab, M. Guizani, and M. K. Khan, "Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art," IEEE Communications Surveys & Tutorials, vol. 19, no. 1, pp , 2017.

10 10 Sequence of Verification 1 SPHINX (Existing solution) Calculate current path Proposal Method 2 Gather statistics Gather statistics at the same time 3 Verify with the moving average of the statistics (Similarity Index) Verify transfer state consistency Verify with the statistics gathered at the same time

11 11 1. Calculate Current Path Uses a flow graph (network assumed by a trusted controller) and physical topology information Uses match fields and instruction: src/dst MAC address, src/dst IP address, and in/out port Controller Controller Application Route information (FLOW_MOD) Verifier Calculates current path using physical topology information and FLOW_MOD messages h1 h2 h1 Time synchronized OpenFlow switches h2

12 12 2. Statistics Gathering with Scheduled Bundle Scheduled Bundle [T.Mizrahi et al. / INFOCOM 16][OpenFlow 1.5] A generic method to schedule any OpenFlow message Included in OpenFlow 1.5 üschedules STATS_REQUEST message with Scheduled Bundle to each switches Enables gathering statistics at the same time Mainly uses byte_cnt and match field Uses the moving average of last four statistics in verification Eliminates the effects of switch performance Send Bundle Commit contains schedule execution time TS At TS, processes STATS_REQUEST message

13 13 3. Verification (1) Verify each traffic flow with two points of view Whether the flow statistics of switches included in the current path reports similar value between each switches The margin calculate by threshold (input value) Detects malicious packet delaying and packet dropping Whether the flow statistics of switches not included in the current path reports zero Detects malicious packet injecting and misrouting

14 14 3. Verification (2) Difference of SPHINX: Reference value of verification SPHINX: The average of Similarity Index each switches (Similarity Index: Moving average of byte transfer statistics) Our method: The statistics of the verification already passed switches Considers the difference of the statistics values which occurs by propagation delay

15 15 Example of our method s algorithm behavior Case of all switches are legitimate: s1 s2 s3 OK ByteDiff = 100 Compare ByteDiff = 98 Compare ByteDiff = 96 Case of switch s2 is compromised switch (perform blackhole) : Detect attacks by honest downstream switch s1 s2 s3 ByteDiff = 100 Compare ByteDiff = 98 Compare ByteDiff = 96 Wrong Raise an alarm

16 16 Experiment Environment Emulated Mininet network Use minimal topology (linear topology, 3 switches and 3 hosts) Separated the controller application host and the Mininet host To mitigate the impact of resource conflicting Controller Same host to emulate time synchronization with accurate time Time synchronized OpenFlow switches Controller Application Verifier s1 s2 s3 Floodlight v1.1 OpenFlow Proxy (implemented our method) ofsoftswitch13_ext-340 h1 h2 h3

17 17 Experiments Scheduling Accuracy Measured the accuracy of scheduling emulated testbed (Mininet) False-Positive Rate Measured the probability of detecting normal TCP traffic as attacks Check the impact to verification when controller performance occurs degradation. False-Negative Rate Measured the probability of the lack of genuine alarm Check the impact to verification when controller performance occurs degradation. Simulated the variation of the controller performance by delay (d) Insert before sending STATS_REQUEST from the verifier.

18 NTP synchronization accuracy millisecond order Scheduling error in NTP synchronization environment max millisecond order 18 Scheduling Accuracy of our testbed Measured the accuracy of scheduling emulated testbed (Mininet) Measured the difference between actual execution time and scheduled execution time Less than 0.3 millisecond in the 90 percentiles at all switches This environment is sufficient to evaluate our method

19 19 False-Positive Rate: SPHINX vs our method Generate TCP flows from h1 to h3 with iperf Simulated the variation of the controller performance by delay (d) Occurs false-positive when threshold (the margin of statistics value) decrease Controller Controller Application Time synchronized OpenFlow switches Verifier s1 s2 s3 TCP Flow from h1 to h3 h1 h2 h3

20 20 False-Positive Rate: SPHINX vs our method Result SPHINX s False-Positive Rate Our method s False-Positive Rate increases false alarms when controller performance degrade Not increase false alarms! Our method without depend on controller performance!

21 21 False-Negative Rate: SPHINX vs our method Generate TCP flows from h1 to h3 with iperf Emulate malicious behaviors by compromised switches performed packet drop on s2-s3 link with link loss rates(2%, 4%, 6%) Occurs false-negative when threshold (the margin of byte count value) increase Controller Controller Application Time synchronized OpenFlow switches Verifier s1 s2 s3 Link loss (2%, 4%, 6%) (emulated malicious behavior) TCP Flow from h1 to h3 h1 h2 h3

22 22 False-Negative Rate: SPHINX vs our method Result 2% loss 4% loss 6% loss 2% loss 4% loss 6% loss Delay d = 0 Our method false-negative rate is not much different from SPHINX. Delay d = 10 (From FP rate experiment) Our method can set lower threshold than SPHINX the false-negative rate equivalent to SPHINX by tuning threshold.

23 23 Discussion: Future Work Evaluates in real-world environment Reduce the statistics gathering overhead of Scheduled Bundle Improves Scheduled Bundle to enable periodical execution scheduling Distributed Controller environment (such as ONOS) Improves the method to consider a link specific delay

24 24 Conclusion Background Protection of SDN data plane is more important than traditional networks SPHINX s verification accuracy depends on the controller performance Proposal method: Forwarding state verification with scheduled statistics gathering Key idea: Schedule the timing of statistics gathering at the same time to each switches Detects attacks by compromised switches without depending on the controller performance Experiment Result Confirm the false positive rate of our method is lower than SPHINX even if the controller performance decrease Thank you for listening!

BYZANTINE FAULT TOLERANT SOFTWARE- DEFINED NETWORKING (SDN) CONTROLLERS

BYZANTINE FAULT TOLERANT SOFTWARE- DEFINED NETWORKING (SDN) CONTROLLERS BYZANTINE FAULT TOLERANT SOFTWARE- DEFINED NETWORKING (SDN) CONTROLLERS KARIM ELDEFRAWY* AND TYLER KACZMAREK** * INFORMATION AND SYSTEMS SCIENCES LAB (ISSL), HRL LABORATORIES ** UNIVERSITY OF CALIFORNIA

More information

A Software-Defined Networking Security Controller Architecture. Fengjun Shang, Qiang Fu

A Software-Defined Networking Security Controller Architecture. Fengjun Shang, Qiang Fu 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Software-Defined Networking Security Controller Architecture Fengjun Shang, Qiang Fu College of Computer Science

More information

Securing Network Application Deployment in Software Defined Networking 11/23/17

Securing Network Application Deployment in Software Defined Networking 11/23/17 Securing Network Application Deployment in Software Defined Networking Yuchia Tseng, Farid Naıı t-abdesselam, and Ashfaq Khokhar 11/23/17 1 Outline Introduction to OpenFlow-based SDN Security issues of

More information

On the State of the Inter-domain and Intra-domain Routing Security

On the State of the Inter-domain and Intra-domain Routing Security On the State of the Inter-domain and Intra-domain Routing Security Mingwei Zhang April 19, 2016 Mingwei Zhang Internet Routing Security 1 / 54 Section Internet Routing Security Background Internet Routing

More information

Lecture 14 SDN and NFV. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 14 SDN and NFV. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 14 SDN and NFV Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Traditional network vs SDN TRADITIONAL Closed equipment Software + hardware Cost Vendor-specific management.

More information

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Identifier Binding Attacks and Defenses in Software-Defined Networks

Identifier Binding Attacks and Defenses in Software-Defined Networks Identifier Binding Attacks and Defenses in Software-Defined Networks Samuel Jero 1, William Koch 2, Richard Skowyra 3, Hamed Okhravi 3, Cristina Nita-Rotaru 4, and David Bigelow 3 1 Purdue University,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Enhanced Malware Monitor in SDN using Kinetic Controller

Enhanced Malware Monitor in SDN using Kinetic Controller IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727 PP 46-52 www.iosrjournals.org Enhanced Malware Monitor in SDN using Kinetic Controller Jiphi T S, Simi Krishna K R Department

More information

Design and development of the reactive BGP peering in softwaredefined routing exchanges

Design and development of the reactive BGP peering in softwaredefined routing exchanges Design and development of the reactive BGP peering in softwaredefined routing exchanges LECTURER: HAO-PING LIU ADVISOR: CHU-SING YANG (Email: alen6516@gmail.com) 1 Introduction Traditional network devices

More information

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS Andry Putra Fajar and Tito Waluyo Purboyo Faculty of Electrical Engineering,

More information

Building world-class security response and secure development processes

Building world-class security response and secure development processes Building world-class security response and secure development processes David Jorm, Senior Manager of Product Security, IIX Outline Introduction SDN attack surface Recent OpenDaylight vulnerabilities Defensive

More information

Counteracting UDP Flooding Attacks in SDN

Counteracting UDP Flooding Attacks in SDN Counteracting UDP Flooding Attacks in SDN Yung-Hao Tung, Hung-Chuan Wei, Chia-Mu Yu Yuan Ze University Outline SDN overview Problem statement Proposed method Experiments 2 SDN Introduction Centralized

More information

HEX Switch: Hardware-assisted security extensions of OpenFlow

HEX Switch: Hardware-assisted security extensions of OpenFlow HEX Switch: Hardware-assisted security extensions of OpenFlow Taejune Park / KAIST / taejune.park@kaist.ac.kr Zhaoyan Xu / StackRox Inc. / z@stackrox.com Seungwon Shin / KAIST / claude@kaist.ac.kr Software-Defined

More information

Switching and Routing projects description

Switching and Routing projects description Switching and Routing 2012-2013 projects description Outline Introduction to OpenFlow A case study The projects Additional information What s OpenFlow An open standard, which defines: An abstraction of

More information

Network Intrusion Detection Systems. Beyond packet filtering

Network Intrusion Detection Systems. Beyond packet filtering Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic

More information

CSC 774 Advanced Network Security

CSC 774 Advanced Network Security Computer Science CSC 774 Advanced Network Security Topic 4.3 Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks 1 Wireless Sensor Networks (WSN) A WSN consists of a potentially

More information

Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN

Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN Pedro Heleno Isolani Juliano Araujo Wickboldt Cristiano Bonato Both Lisandro Zambenedetti Granville Juergen Rochol July 16,

More information

Towards an SDN-based Mobile Core Networks (MCN)

Towards an SDN-based Mobile Core Networks (MCN) Towards an SDN-based Mobile Core Networks (MCN) Xueli An and Artur Hecker Huawei Technologies, European Research Center Munich Xueli.An@huawei.com and Artur.Hecker@huawei.com VDE/ITG-Fachgruppe 5.2.4,

More information

OpenFlow: A Security Analysis

OpenFlow: A Security Analysis Introduction OpenFlow: A Security Analysis Rowan Klöti 1 Vasileios Kotronis 2 Paul Smith 3 1 rkloeti@alumni.ethz.ch ETH Zurich 2 vkotroni@tik.ee.ethz.ch ETH Zurich 3 paul.smith@ait.ac.at AIT Austrian Institute

More information

A Hybrid Hierarchical Control Plane for Software-Defined Network

A Hybrid Hierarchical Control Plane for Software-Defined Network A Hybrid Hierarchical Control Plane for Software-Defined Network Arpitha T 1, Usha K Patil 2 1* MTech Student, Computer Science & Engineering, GSSSIETW, Mysuru, India 2* Assistant Professor, Dept of CSE,

More information

Automated Signature Generation: Overview and the NoAH Approach. Bernhard Tellenbach

Automated Signature Generation: Overview and the NoAH Approach. Bernhard Tellenbach Automated Signature Generation: Overview and the NoAH Approach Structure Motivation: The speed of insecurity Overview Building Blocks and Techniques The NoAH approach 2 The speed of insecurity Source:

More information

Software Defined Networking Data centre perspective: Open Flow

Software Defined Networking Data centre perspective: Open Flow Software Defined Networking Data centre perspective: Open Flow Seminar: Prof. Timothy Roscoe & Dr. Desislava Dimitrova D. Dimitrova, T. Roscoe 04.03.2016 1 OpenFlow Specification, protocol, architecture

More information

Using SDN and NFV to Realize a Scalable and Resilient Omni-Present Firewall

Using SDN and NFV to Realize a Scalable and Resilient Omni-Present Firewall Institute of Computer Science Chair of Communication Networks Prof. Dr.-Ing. P. Tran-Gia Using SDN and NFV to Realize a Scalable and Resilient Omni-Present Firewall comnet.informatik.uni-wuerzburg.de SarDiNe

More information

CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks

CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks Prathap U, Deepa Shenoy P and Venugopal K R Department of Computer Science and Engineering University Visvesvaraya College

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

Configuring Cisco IOS IP SLAs Operations

Configuring Cisco IOS IP SLAs Operations CHAPTER 39 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

Intrusion Detection System in Wireless Sensor Networks

Intrusion Detection System in Wireless Sensor Networks Intrusion Detection System in Wireless Sensor Networks Pooja Thakre 1, Mohammad Hassan 2, Irfan Javed 3, Sneha Sambare 4 Professor, Department of EJ, NCET, NAGPUR, India 1 Lecturer, Department of EJ, NCET,

More information

ANR-13-INFR-013 ANR DISCO

ANR-13-INFR-013 ANR DISCO DIstributed SDN COntrollers for rich and elastic services ANR-13-INFR-013 ANR DISCO DIstributed SDN COntrollers for rich and elastic services Mathieu Bouet @Thales Communications & Security 1 Project s

More information

Delay Controlled Elephant Flow Rerouting in Software Defined Network

Delay Controlled Elephant Flow Rerouting in Software Defined Network 1st International Conference on Advanced Information Technologies (ICAIT), Nov. 1-2, 2017, Yangon, Myanmar Delay Controlled Elephant Flow Rerouting in Software Defined Network Hnin Thiri Zaw, Aung Htein

More information

Network Security. Chapter 0. Attacks and Attack Detection

Network Security. Chapter 0. Attacks and Attack Detection Network Security Chapter 0 Attacks and Attack Detection 1 Attacks and Attack Detection Have you ever been attacked (in the IT security sense)? What kind of attacks do you know? 2 What can happen? Part

More information

SDN-based Defending against ARP Poisoning Attack

SDN-based Defending against ARP Poisoning Attack Journal of Advances in Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sari Branch, Islamic Azad University, Sari, I.R.Iran (Vol. 8, No. 2, May 2017), Pages: 95- www.jacr.iausari.ac.ir SDN-based

More information

Intrusion Detection System for Rushing Attack in MANETs

Intrusion Detection System for Rushing Attack in MANETs Intrusion Detection System for Rushing Attack in MANETs D.Shiny, K. Ganesh Reddy, Dept. of Computer Science and Engineering Shri Vishnu Engineering College for Women,Bhimavaram, India Abstract MANETs are

More information

Design and Implementation of Virtual TAP for Software-Defined Networks

Design and Implementation of Virtual TAP for Software-Defined Networks Design and Implementation of Virtual TAP for Software-Defined Networks - Master Thesis Defense - Seyeon Jeong Supervisor: Prof. James Won-Ki Hong Dept. of CSE, DPNM Lab., POSTECH, Korea jsy0906@postech.ac.kr

More information

Outline. SDN Overview Mininet and Ryu Overview Mininet VM Setup Ryu Setup OpenFlow Protocol and Open vswitch Reference

Outline. SDN Overview Mininet and Ryu Overview Mininet VM Setup Ryu Setup OpenFlow Protocol and Open vswitch Reference 1 Mininet and Ryu 2 Outline SDN Overview Mininet and Ryu Overview Mininet VM Setup Ryu Setup OpenFlow Protocol and Open vswitch Reference 3 SDN Overview Decoupling of control and data planes Directly Programmable

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. Network IPS Overview Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. By using protocol recognition, identification, and traffic analysis

More information

Sleep/Wake Aware Local Monitoring (SLAM)

Sleep/Wake Aware Local Monitoring (SLAM) Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and

More information

Lab 3: Simple Firewall using OpenFlow

Lab 3: Simple Firewall using OpenFlow Lab 3: Simple Firewall using OpenFlow This lab builds on the knowledge acquired through Lab 1 where you were first introduced to the Mininet environment. It will also help you prepare for the class project.

More information

Listen and Whisper: Security Mechanisms for BGP

Listen and Whisper: Security Mechanisms for BGP Listen and Whisper: Security Mechanisms for BGP Lakshminarayanan Subramanian UC Berkeley Joint work with: Volker Roth, Ion Stoica, Scott Shenker, Randy Katz BGP Route Verification BGP speakers blindly

More information

Accelerating OpenFlow SDN Switches with Per-Port Cache

Accelerating OpenFlow SDN Switches with Per-Port Cache Accelerating OpenFlow SDN Switches with Per-Port Cache Cheng-Yi Lin Youn-Long Lin Department of Computer Science National Tsing Hua University 1 Outline 1. Introduction 2. Related Work 3. Per-Port Cache

More information

Security Research for Software Defined Network

Security Research for Software Defined Network , pp.87-93 http://dx.doi.org/10.14257/astl.2016.134.15 Security Research for Software Defined Network 1 Jianfei Zhou, 2 Na Liu 1 Admission and Employment Office, Chongqing Industry Polytechnic College

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Intrusion Detection Systems Intrusion Actions aimed at compromising the security of the target (confidentiality, integrity, availability of computing/networking

More information

Available online at ScienceDirect. Procedia Computer Science 34 (2014 )

Available online at   ScienceDirect. Procedia Computer Science 34 (2014 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 34 (2014 ) 680 685 International Workshop on Software Defined Networks for a New Generation of Applications and Services

More information

4-2 Rapid Analysis Technologies for Live Networks

4-2 Rapid Analysis Technologies for Live Networks 4 Cyber-Security Technologies: Live Network Monitoring and Analysis Technologies 4-2 Rapid Analysis Technologies for Live Networks Ichiro SHIMADA and Yu TSUDA In targeted cyberattacks, the attackers intrude

More information

CSE543 - Computer and Network Security Module: Intrusion Detection

CSE543 - Computer and Network Security Module: Intrusion Detection CSE543 - Computer and Network Security Module: Intrusion Detection Professor Trent Jaeger 1 Intrusion An authorized action... that exploits a vulnerability... that causes a compromise... and thus a successful

More information

Real Time Monitoring of Packet Loss in Software Defined Networks

Real Time Monitoring of Packet Loss in Software Defined Networks Real Time Monitoring of Packet Loss in Software Defined Networks Yash Sinha 1(B), Shikhar Vashishth 2, and K. Haribabu 1 1 Department of Computer Science and Information Systems, BITS, Pilani, Pilani Campus,

More information

Research on Firewall in Software Defined Network

Research on Firewall in Software Defined Network Advances in Computer, Signals and Systems (2018) 2: 1-7 Clausius Scientific Press, Canada Research on Firewall in Software Defined Cunqun Fan a, Manyun Lin, Xiangang Zhao, Lizi Xie, Xi Zhang b,* National

More information

Programming Assignment

Programming Assignment Overview Programming Assignment In this assignment, you will program the OpenFlow controller POX and use it to implement two applications. Task 1: Firewall In this part, your task is to implement a layer-2

More information

Time and Timestamping in Softwarized Environments

Time and Timestamping in Softwarized Environments Time and Timestamping in Softwarized Environments Tal Mizrahi, Yoram Moses Technion Israel Institute of Technology April 2016 The First Synchronized Clocks Railway switch 2 Networks: Communications vs.

More information

Automatic bootstrapping of OpenFlow networks

Automatic bootstrapping of OpenFlow networks Automatic bootstrapping of OpenFlow networks Sachin Sharma, Dimitri Staessens, Didier Colle, Mario Pickavet and Piet Demeester Department of Information Technology (INTEC), Ghent University - iminds E-mail:

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

Data Sheet. DPtech IPS2000 Series Intrusion Prevention System. Overview. Series IPS2000-MC-N. Features

Data Sheet. DPtech IPS2000 Series Intrusion Prevention System. Overview. Series IPS2000-MC-N. Features Data Sheet DPtech IPS2000 Series DPtech IPS2000 Series Intrusion Prevention System Overview With the rapid development of network, application layer attacks emerge endlessly, such as worms, Trojan horses,

More information

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation

More information

Lecture 12. Application Layer. Application Layer 1

Lecture 12. Application Layer. Application Layer 1 Lecture 12 Application Layer Application Layer 1 Agenda The Application Layer (continue) Web and HTTP HTTP Cookies Web Caches Simple Introduction to Network Security Various actions by network attackers

More information

On Demand secure routing protocol resilient to Byzantine failures

On Demand secure routing protocol resilient to Byzantine failures On Demand secure routing protocol resilient to Byzantine failures Primary Reference: B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An on-demand secure routing protocol resilient to Byzantine failures,

More information

Building Security Services on top of SDN

Building Security Services on top of SDN Building Security Services on top of SDN Gregory Blanc Télécom SudParis, IMT 3rd FR-JP Meeting on Cybersecurity WG7 April 25th, 2017 Keio University Mita Campus, Tokyo Table of Contents 1 SDN and NFV as

More information

Bloom Filters. References:

Bloom Filters. References: Bloom Filters References: Li Fan, Pei Cao, Jussara Almeida, Andrei Broder, Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol, IEEE/ACM Transactions on Networking, Vol. 8, No. 3, June 2000.

More information

Encrypted Traffic Security (ETS) White Paper

Encrypted Traffic Security (ETS) White Paper Encrypted Traffic Security (ETS) White Paper The rapid rise in encrypted traffic is changing the security landscape. As more organizations become digital, an increasing number of services and applications

More information

Model-Based Load Testing for Performance and Security. Cornel Barna, Mark Shtern, Michael Smit, Marin Litoiu

Model-Based Load Testing for Performance and Security. Cornel Barna, Mark Shtern, Michael Smit, Marin Litoiu for Performance and Security Cornel Barna Mark Shtern Michael Smit Marin Litoiu Computer Science and Engineering York University April 17, 212 Performance Testing The Performance Stress Space The Framework

More information

2-STAGE SOFT DEFENDING SCHEME AGAINST DDOS ATTACK OVER SDN BASED ON NB AND SVM

2-STAGE SOFT DEFENDING SCHEME AGAINST DDOS ATTACK OVER SDN BASED ON NB AND SVM 8 th International Conference from Scientific Computing to Computational Engineering 8 th IC-SCCE Athens, 4-7 July, 2018 LFME 2-STAGE SOFT DEFENDING SCHEME AGAINST DDOS ATTACK OVER SDN BASED ON NB AND

More information

Behavioral Analysis for Intrusion Resilience. Ahmed Fawaz Dec 6, 2016

Behavioral Analysis for Intrusion Resilience. Ahmed Fawaz Dec 6, 2016 Behavioral Analysis for Intrusion Resilience Ahmed Fawaz Dec 6, 2016 1 Recent Cyber Attacks on Private and Public Entities 2 Design for Resiliency Diverse Monitoring Secure Monitoring Monitoring Fusion

More information

System Models for Distributed Systems

System Models for Distributed Systems System Models for Distributed Systems INF5040/9040 Autumn 2015 Lecturer: Amir Taherkordi (ifi/uio) August 31, 2015 Outline 1. Introduction 2. Physical Models 4. Fundamental Models 2 INF5040 1 System Models

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.

More information

Extending Dijkstra s Shortest Path Algorithm for Software Defined Networking

Extending Dijkstra s Shortest Path Algorithm for Software Defined Networking Extending Dijkstra s Shortest Path Algorithm for Software Defined Networking Jehn-Ruey Jiang, Hsin-Wen Huang, Ji-Hau Liao, and Szu-Yuan Chen Department of Computer Science and Information Engineering National

More information

IN this letter we focus on OpenFlow-based network state

IN this letter we focus on OpenFlow-based network state 1 On the Impact of Networ State Collection on the Performance of SDN Applications Mohamed Aslan, and Ashraf Matrawy Carleton University, ON, Canada Abstract Intelligent and autonomous SDN applications

More information

Applying Packet Score Technique in SDN for DDoS Attack Detection

Applying Packet Score Technique in SDN for DDoS Attack Detection of Emerging Computer trends ( inand, and-sustainable Applying Packet Score Technique in SDN for DDoS Attack Detection Sangeetha MV, Bhavithra J, II ME CSE, Department of Computer and, DrMCET, Coimbatore,

More information

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Mitigating Malicious Activities by Providing New Acknowledgment Approach Mitigating Malicious Activities by Providing New Acknowledgment Approach G. S. Devi Lakshmi, J. Rajasekaran 2 PG Student, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India

More information

DDoS Detection&Mitigation: Radware Solution

DDoS Detection&Mitigation: Radware Solution DDoS Detection&Mitigation: Radware Solution Igor Urosevic Head of Technical Department SEE CCIE #26391 Ingram Micro Inc. 1 Agenda DDoS attack overview Main point of failures Key challenges today DDoS protection

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Contents Motivation and basics (Why and what?) IDS types and detection principles Key Data Problems

More information

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS Su Man Nam 1 and Tae Ho Cho 2 1 College of Information and Communication

More information

A Technique for Improving Security in Mobile Ad-hoc Networks

A Technique for Improving Security in Mobile Ad-hoc Networks A Technique for Improving Security in Mobile Ad-hoc Networks By Ahmed Mahmoud Abdel Mo men A Master Thesis Submitted to the Faculty of Computers and Information Cairo University Information Technology

More information

Security Challenges in Software Defined Networks (SDN)

Security Challenges in Software Defined Networks (SDN) ecurity Challenges in oftware Defined Networks (DN) Lecture 18 1 Outline Market and DN Conventional Networks v.s DN OpenFlow-enabled DN devices DN ecurity Applications DN ecurity Challenges Community Debate

More information

SDN_CDN Documentation

SDN_CDN Documentation SDN_CDN Documentation Release 0.1.1 introom9 June 02, 2016 Contents 1 What s it about 1 2 Get the code 3 3 Contents: 5 3.1 Overview................................................. 5 3.2 sdn_module................................................

More information

Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations

Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations Lecture Notes on Critique of 1998 and 1999 DARPA IDS Evaluations Prateek Saxena March 3 2008 1 The Problems Today s lecture is on the discussion of the critique on 1998 and 1999 DARPA IDS evaluations conducted

More information

DYNAMIC LOAD BALACING USING QUEUING INTERFACE SYSTEM

DYNAMIC LOAD BALACING USING QUEUING INTERFACE SYSTEM DYNAMIC LOAD BALACING USING QUEUING INTERFACE SYSTEM Sairam R, Neshan Anand and V Deeban Chakravarthy SRM University of Science and Technology, India E-Mail: sairam_r@icloud.com ABSTRACT Software-Defined

More information

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks S. Balachandran, D. Dasgupta, L. Wang Intelligent Security Systems Research Lab Department of Computer Science The University of

More information

A Novel Approach to Detect and Prevent Known and Unknown Attacks in Local Area Network

A Novel Approach to Detect and Prevent Known and Unknown Attacks in Local Area Network International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(4): 43-47 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) A Novel Approach

More information

A POX Controller Module to Collect Web Traffic Statistics in SDN Environment

A POX Controller Module to Collect Web Traffic Statistics in SDN Environment A POX Controller Module to Collect Web Traffic Statistics in SDN Environment Wisam H. Muragaa, Kamaruzzaman Seman, Mohd Fadzli Marhusin Abstract Software Defined Networking (SDN) is a new norm of networks.

More information

Using libnetvirt to control the virtual network

Using libnetvirt to control the virtual network Using libnetvirt to control the virtual network Daniel Turull, Markus Hidell, Peter Sjödin KTH Royal Institute of Technology, School of ICT Kista, Sweden Email: {danieltt,mahidell,psj}@kth.se Abstract

More information

Communication System Design Projects

Communication System Design Projects Communication System Design Projects KUNGLIGA TEKNISKA HÖGSKOLAN PROFESSOR: DEJAN KOSTIC TEACHING ASSISTANT: GEORGIOS KATSIKAS Traditional Vs. Modern Network Management What is Network Management (NM)?

More information

Congestion Control in Datacenters. Ahmed Saeed

Congestion Control in Datacenters. Ahmed Saeed Congestion Control in Datacenters Ahmed Saeed What is a Datacenter? Tens of thousands of machines in the same building (or adjacent buildings) Hundreds of switches connecting all machines What is a Datacenter?

More information

A Knowledge-based Alert Evaluation and Security Decision Support Framework 1

A Knowledge-based Alert Evaluation and Security Decision Support Framework 1 A Knowledge-based Alert Evaluation and Security Decision Support Framework 1 Jinqiao Yu Department of Mathematics and Computer Science Illinois Wesleyan Univerisity P.O.Box 2900 Bloomington, IL 61701 Ramana

More information

Secure and QoS Aware Architecture for Cloud Using Software Defined Networks and Hadoop

Secure and QoS Aware Architecture for Cloud Using Software Defined Networks and Hadoop Secure and QoS Aware Architecture for Cloud Using Software Defined Networks and Hadoop Abhijeet Desai [1], Nagegowda K S [3] Department of Computer Science and Engineering, PESIT Bangalore, 560085, India

More information

Peer-to-peer Sender Authentication for . Vivek Pathak and Liviu Iftode Rutgers University

Peer-to-peer Sender Authentication for  . Vivek Pathak and Liviu Iftode Rutgers University Peer-to-peer Sender Authentication for Email Vivek Pathak and Liviu Iftode Rutgers University Email Trustworthiness Sender can be spoofed Need for Sender Authentication Importance depends on sender Update

More information

Ferdinand von Tüllenburg Layer-2 Failure Recovery Methods in Critical Communication Networks

Ferdinand von Tüllenburg Layer-2 Failure Recovery Methods in Critical Communication Networks Ferdinand von Tüllenburg Layer-2 Failure Recovery Methods in Critical Communication Networks Dependable Communication for Critical Infrastructures Electricity Health Transport Finance Dependable Communication

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #11 - Identity Mgmt.; Routing Security 2016 Patrick Tague 1 Class #11 Identity threats and countermeasures Basics of routing in ad hoc networks

More information

1588v2 Performance Validation for Mobile Backhaul May Executive Summary. Case Study

1588v2 Performance Validation for Mobile Backhaul May Executive Summary. Case Study Case Study 1588v2 Performance Validation for Mobile Backhaul May 2011 Executive Summary Many mobile operators are actively transforming their backhaul networks to a cost-effective IP-over- Ethernet paradigm.

More information

ProCurve Network Immunity

ProCurve Network Immunity ProCurve Network Immunity Hans-Jörg Elias Key Account Manager hans-joerg.elias@hp.com 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

Firewall offloading based on SDN and NFV

Firewall offloading based on SDN and NFV Chair of Communication Networks Department of Electrical and Computer Engineering Technical University of Munich Firewall offloading based on SDN and NFV ITG 5.2.2/5.2.4 05.12.2016 Raphael Durner r.durner@tum.de

More information

ANOMALY DETECTION IN COMMUNICTION NETWORKS

ANOMALY DETECTION IN COMMUNICTION NETWORKS Anomaly Detection Summer School Lecture 2014 ANOMALY DETECTION IN COMMUNICTION NETWORKS Prof. D.J.Parish and Francisco Aparicio-Navarro Loughborough University (School of Electronic, Electrical and Systems

More information

Training for the cyber professionals of tomorrow

Training for the cyber professionals of tomorrow Hands-On Labs Training for the cyber professionals of tomorrow CYBRScore is a demonstrated leader in professional cyber security training. Our unique training approach utilizes immersive hands-on lab environments

More information

Scalability and Resilience in SDN: an overview. Nicola Rustignoli

Scalability and Resilience in SDN: an overview. Nicola Rustignoli Scalability and Resilience in SDN: an overview Nicola Rustignoli rnicola@student.ethz.ch Nicola Rustignoli 11.03.2016 1 Software-Defined networking CONTROL LAYER SWITCH FORWARDING LAYER Graphs source:[1]

More information

Stateful Firewall Application on Software Defined Networking

Stateful Firewall Application on Software Defined Networking 1st International Conference on Advanced Information Technologies (ICAIT), Nov. 1-2, 2017, Yangon, Myanmar Stateful Firewall Application on Software Defined Networking Nan Haymarn Oo, Aung Htein Maw University

More information

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II Our Narrow Focus 15-441 15-441 Computer Networking 15-641 Lecture 22 Security: DOS Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Yes: Creating a secure channel for communication (Part I) Protecting

More information

The Reconnaissance Phase

The Reconnaissance Phase The Reconnaissance Phase Detecting the Enemy Before the Attack Carrie Gates PhD Candidate, Dalhousie University Visiting Scientist, CERT, Carnegie Mellon University Outline! Indicate a gap in our defences!

More information

A Low-Cost Measurement Framework in Software Defined Networks

A Low-Cost Measurement Framework in Software Defined Networks Int. J. Communications, Network and System Sciences, 2017, 10, 54-66 http://www.scirp.org/journal/ijcns ISSN Online: 1913-3723 ISSN Print: 1913-3715 A Low-Cost Measurement Framework in Software Defined

More information

SoftRing: Taming the Reactive Model for Software Defined Networks

SoftRing: Taming the Reactive Model for Software Defined Networks SoftRing: Taming the Reactive Model for Software Defined Networks Chengchen Hu, Kaiyu Hou, Hao Li, Ruilong Wang Peng Zheng, Peng Zhang, Huanzhao Wang MOE KLINNS Lab Xi an Jiaotong University Match-Action

More information

State Replication for Programmable Stateful Data Planes in SDN

State Replication for Programmable Stateful Data Planes in SDN State Replication for Programmable Stateful Data Planes in SDN Paolo Giaccone Giuseppe Bianchi, Andrea Bianco, Marco Bonola, Abubakar Muqaddas, Janvi Palan, German Sviridov, Angelo Tulumello Workshop on

More information