基于SDN的蜜网原型

Andres Manzano, José Naranjo, Ivan Bernal, David Mejia
{"title":"基于SDN的蜜网原型","authors":"Andres Manzano, José Naranjo, Ivan Bernal, David Mejia","doi":"10.1109/EATIS.2016.7520100","DOIUrl":null,"url":null,"abstract":"This paper presents a prototype for a honeynet based on SDN. The prototype is structured by a Pyretic controller, an application, a switch with OpenFlow support and a network. The network is composed of two segments; one of them called the production network, and the other, the honeynet. The application helps detecting and deviating attacks to the honeynet. Six different types of attacks are considered, three of them are Denial of Service (DoS) attacks and the other two are spoofing attacks. The DoS selected attacks are SMURF, THC SSL DoS and TCP SYN Flood; and the spoofing attacks are based on DNS, IP and ARP. The application contains a main module that is responsible for calling six additional modules, each designed for detecting a particular attack; the main module also loads a secondary module that injects the analyzed packets back into one of the two segments of the network. The application can be customized using a configuration file that flags whether the application will run a specific module or the six modules simultaneously; this allows protecting the network from either a particular attack or from all the six chosen attacks. A description of the developed modules using Pyretic is included. In addition, results of several tests carried out using the prototype for testing attacks are presented.","PeriodicalId":158157,"journal":{"name":"2016 8th Euro American Conference on Telematics and Information Systems (EATIS)","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A prototype for a honeynet based on SDN\",\"authors\":\"Andres Manzano, José Naranjo, Ivan Bernal, David Mejia\",\"doi\":\"10.1109/EATIS.2016.7520100\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a prototype for a honeynet based on SDN. The prototype is structured by a Pyretic controller, an application, a switch with OpenFlow support and a network. The network is composed of two segments; one of them called the production network, and the other, the honeynet. The application helps detecting and deviating attacks to the honeynet. Six different types of attacks are considered, three of them are Denial of Service (DoS) attacks and the other two are spoofing attacks. The DoS selected attacks are SMURF, THC SSL DoS and TCP SYN Flood; and the spoofing attacks are based on DNS, IP and ARP. The application contains a main module that is responsible for calling six additional modules, each designed for detecting a particular attack; the main module also loads a secondary module that injects the analyzed packets back into one of the two segments of the network. The application can be customized using a configuration file that flags whether the application will run a specific module or the six modules simultaneously; this allows protecting the network from either a particular attack or from all the six chosen attacks. A description of the developed modules using Pyretic is included. In addition, results of several tests carried out using the prototype for testing attacks are presented.\",\"PeriodicalId\":158157,\"journal\":{\"name\":\"2016 8th Euro American Conference on Telematics and Information Systems (EATIS)\",\"volume\":\"2009 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-04-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 8th Euro American Conference on Telematics and Information Systems (EATIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EATIS.2016.7520100\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 8th Euro American Conference on Telematics and Information Systems (EATIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EATIS.2016.7520100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

本文提出了一个基于SDN的蜜网原型。该原型由一个Pyretic控制器、一个应用程序、一个支持OpenFlow的交换机和一个网络组成。该网络由两段组成;一个叫生产网络,另一个叫蜜网。该应用程序有助于检测和偏离对蜜网的攻击。考虑了六种不同类型的攻击,其中三种是拒绝服务(DoS)攻击,另外两种是欺骗攻击。选择的DoS攻击有SMURF、THC SSL DoS和TCP SYN Flood;基于DNS、IP和ARP的欺骗攻击。该应用程序包含一个主模块,负责调用六个附加模块,每个模块用于检测特定的攻击;主模块还加载一个辅助模块,该模块将分析后的数据包注入两个网络段中的一个。应用程序可以使用一个配置文件来定制,该文件标记应用程序是运行特定模块还是同时运行六个模块;这允许保护网络免受特定攻击或所有六种选择的攻击。介绍了使用Pyretic开发的模块。此外,还介绍了使用该原型进行的几次攻击测试的结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A prototype for a honeynet based on SDN
This paper presents a prototype for a honeynet based on SDN. The prototype is structured by a Pyretic controller, an application, a switch with OpenFlow support and a network. The network is composed of two segments; one of them called the production network, and the other, the honeynet. The application helps detecting and deviating attacks to the honeynet. Six different types of attacks are considered, three of them are Denial of Service (DoS) attacks and the other two are spoofing attacks. The DoS selected attacks are SMURF, THC SSL DoS and TCP SYN Flood; and the spoofing attacks are based on DNS, IP and ARP. The application contains a main module that is responsible for calling six additional modules, each designed for detecting a particular attack; the main module also loads a secondary module that injects the analyzed packets back into one of the two segments of the network. The application can be customized using a configuration file that flags whether the application will run a specific module or the six modules simultaneously; this allows protecting the network from either a particular attack or from all the six chosen attacks. A description of the developed modules using Pyretic is included. In addition, results of several tests carried out using the prototype for testing attacks are presented.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Investigación sobre el hacker y sus posibles comienzos en la comunidad estudiantil. Caso Universidad Piloto de Colombia E-learning: An approach using tools for creation online activities Ontology based monitoring and error detection in converged telecommunication processes On existing mobile grids for Android devices Applying design thinking in disciplines of systems development
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1