425 research outputs found

    A SIMULATION STUDY OF SDN DEFENSE AGAINST BOTNET ATTACK BASED ON NETWORK TRAFFIC DETECTION

    Get PDF
    This paper discusses the Software Defined Networking (SDN) security experiment on Zeus Botnet attacks based on traffic behavior in the network. The development of SDN technology is increasingly in demand today, both on the researcher and industry side. This is inseparable from the SDN feature that gives the developer the flexibility to program the system inside. But on the other hand, the development of network technology cannot be separated from the threat of attack, especially Botnet attacks. Botnets are able to take control of the SDN network by attacking the control plane. This is possible when the botmaster enters a third party into the network and infects the associated device in the SDN network as a bot. This problem is categorized as Integrity in CIA triad (Confidentiality, Integrity, and Availability) used in the evaluation of security performance. Integrity in the CIA triad is a state of information that is always accurate and consistent until a recognized user makes a change. At the end of this paper will be explained about future research based on experimental test results

    Understanding Disruptive Monitoring Capabilities of Programmable Networks

    Get PDF
    International audienceThe design shift proposed by OpenFlow, with its simple stateless dataplane, initially contributed to the success of Software-Defined Networks. Its lack of state, however, prevents the implementation of many dataplane algorithms. Network applications must therefore offload stateful operations to the control plane, thereby increasing latency and limiting network scalability. Thus, recent research efforts centered on the addition of stateful properties to switches. In this paper, we discuss the impact of emerging programmable dataplane abstractions on network monitoring. In particular, we investigate the need for dataplane states in the design of scalable monitoring applications. We argue that these abstractions are ill-suited for software switches as they retain hardware-specific limitations. Furthermore, we analyse the impact of stateful dataplane designs on the control plane visibility of the network. Finally, we identify opportunities for improvement in the design of stateful software switches

    Defeating Protocol Abuse with P4: Application to Explicit Congestion Notification

    Get PDF
    International audienceIn recent years, programmable data planes enabled by the protocol independent switch architecture (PISA) allowed the relocation of network functions closer to traffic flows and thereby the ability to react in real-time to network events. However , expressing complex and stateful network monitoring functions using state-of-the-art data plane programming languages such as P4 still remain challenging. In this context, we propose a method for modeling a stateful security monitoring function as an Extended Finite State Machine (EFSM) and express the EFSM using P4 language abstractions. We demonstrate the feasibility and benefit of our proposed approach in detecting and mitigating Explicit Congestion Notification (ECN) protocol abuse without any TCP protocol modification. Our evaluation shows that the proposed security monitoring function can restore 24.67% throughput loss caused by misbehaving TCP end-hosts while ensuring fair share of bandwidth among TCP flows

    A Framework to assess the value of web services

    Get PDF
    Large organizations often begin to adopt new software technologies prior to establishing appropriate value frameworks. This approach may produce sub-optimal investment decisions and technology adoption rates, and introduce excessive risk. In this thesis, a value-based framework is developed for assessing the impact of Web Services technology investments on business systems development. The value factors included in the framework are data management, application development and deployment, system integration, and response time to market opportunities

    Tennison: A Distributed SDN Framework for Scalable Network Security

    Get PDF
    Despite the relative maturity of the Internet, the computer networks of today are still susceptible to attack. The necessary distributed nature of networks for wide area connectivity has traditionally led to high cost and complexity in designing and implementing secure networks. With the introduction of software-defined networks (SDNs) and network functions virtualization, there are opportunities for efficient network threat detection and protection. SDN's global view provides a means of monitoring and defense across the entire network. However, current SDN-based security systems are limited by a centralized framework that introduces significant control plane overhead, leading to the saturation of vital control links. In this paper, we introduce TENNISON, a novel distributed SDN security framework that combines the efficiency of SDN control and monitoring with the resilience and scalability of a distributed system. TENNISON offers effective and proportionate monitoring and remediation, compatibility with widely available networking hardware, support for legacy networks, and a modular and extensible distributed design. We demonstrate the effectiveness and capabilities of the TENNISON framework through the use of four attack scenarios. These highlight multiple levels of monitoring, rapid detection, and remediation, and provide a unique insight into the impact of multiple controllers on network attack detection at scale
    corecore