透過您的圖書館登入
IP:3.135.186.154
  • 學位論文

Rapid Detection of Disobedient Forwarding on a Compromised OpenFlow Switch

Rapid Detection of Disobedient Forwarding on a Compromised OpenFlow Switch

指導教授 : 林柏青
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

並列摘要


Software-defined networking (SDN) is programmable, centrally managed, and flexible with topology alteration. It allows network administrators to manage network flows easily from a centralized controller. However, these new features also lead to new security threats with applications, controllers, OpenFlow switches, topology management and so on. In this work, we study the attack of compromising a switch, and design a method to detect disobedient forwarding in the flow table. To enhance the detection efficiency and minimize additional network traffic, we reduce the number of detection packets necessary by aggregating the flow entries in a short time. To aggregate the flow entries, we select entries whose match fields are able to compose a valid packet from different switches. The switches on which the entries are form a path that allows the packet to travel through for rapid detection. We evaluate the effectiveness of this detection method in various topology types typically found in a data center network by Mininet simulation. The experimental result demonstrates that this method can examine the forwarding correctness of nearly 3 flow entries simultaneously on average for each detection packet. Furthermore, since the positive and negative factors to the growth of aggregation rates break even in a large topology, the scale of the network topology does not affect the efficiency of the method significantly.

參考文獻


[1] D. Kreutz, F. M. Ramos, P.E. Verissimo, C.E. Rothenberg, S. Azodolmolky
Survey,” In Proceeedings of the IEEE, vol. 103, no. 1, pp. 14-76, Jan.
[2] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson,
Campus Networks,” ACM SIGCOMM Computer Communication Review,
[3] B. Lantz, B. Heller, N. McKeown, “A Network in a Laptop: Rapid Prototyping