绑定攻击对软件定义网络的影响

Septha Anggara, H. Nuha, Muhammad Agus Triawan
{"title":"绑定攻击对软件定义网络的影响","authors":"Septha Anggara, H. Nuha, Muhammad Agus Triawan","doi":"10.1109/ICET53279.2021.9575093","DOIUrl":null,"url":null,"abstract":"The internet has created a digital society, where people from various circles can connect to each other and can be accessed easily. But despite being widely adopted, traditional networks are still widely implemented where these networks are complex and difficult to manage. Software Defined Network (SDN) offers a solution where managing a network becomes easier with the centralized controller. However, because of the ease of SDN in managing the network, SDN has a very worrying security gap where Attackers attack Controllers that are taken over by the network. By using a new attack method called Persona Hijacking that disrupts the identifier binding process, SDN will go through a testing process by comparing how long the Persona Hijacking attack will take time and how the impact of this attack using two scenarios. The first testing scenario combines DHCP with Controller and the second test scenario by separating DHCP and Controller. This study indicates that the second scenario produces a larger black-hole presentation, which is 66% and takes 10 seconds slower than the first scenario.","PeriodicalId":187876,"journal":{"name":"2021 7th International Conference on Education and Technology (ICET)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Effect of Binding Attack on Software Defined Network\",\"authors\":\"Septha Anggara, H. Nuha, Muhammad Agus Triawan\",\"doi\":\"10.1109/ICET53279.2021.9575093\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The internet has created a digital society, where people from various circles can connect to each other and can be accessed easily. But despite being widely adopted, traditional networks are still widely implemented where these networks are complex and difficult to manage. Software Defined Network (SDN) offers a solution where managing a network becomes easier with the centralized controller. However, because of the ease of SDN in managing the network, SDN has a very worrying security gap where Attackers attack Controllers that are taken over by the network. By using a new attack method called Persona Hijacking that disrupts the identifier binding process, SDN will go through a testing process by comparing how long the Persona Hijacking attack will take time and how the impact of this attack using two scenarios. The first testing scenario combines DHCP with Controller and the second test scenario by separating DHCP and Controller. This study indicates that the second scenario produces a larger black-hole presentation, which is 66% and takes 10 seconds slower than the first scenario.\",\"PeriodicalId\":187876,\"journal\":{\"name\":\"2021 7th International Conference on Education and Technology (ICET)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 7th International Conference on Education and Technology (ICET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICET53279.2021.9575093\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 7th International Conference on Education and Technology (ICET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICET53279.2021.9575093","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

互联网创造了一个数字社会,来自不同圈子的人可以相互联系,可以很容易地联系。但是,尽管传统网络被广泛采用,但在网络复杂且难以管理的情况下,传统网络仍然被广泛应用。软件定义网络(SDN)提供了一种解决方案,通过集中式控制器可以更轻松地管理网络。然而,由于SDN易于管理网络,SDN存在一个非常令人担忧的安全漏洞,即攻击者攻击被网络接管的控制器。通过使用一种名为Persona Hijacking的新攻击方法来破坏标识符绑定过程,SDN将通过比较Persona Hijacking攻击需要多长时间以及这种攻击使用两种场景的影响来进行测试过程。第一个测试场景将DHCP与Controller合并,第二个测试场景将DHCP与Controller分离。这项研究表明,第二种情况会产生更大的黑洞呈现,比第一种情况慢10秒,占66%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Effect of Binding Attack on Software Defined Network
The internet has created a digital society, where people from various circles can connect to each other and can be accessed easily. But despite being widely adopted, traditional networks are still widely implemented where these networks are complex and difficult to manage. Software Defined Network (SDN) offers a solution where managing a network becomes easier with the centralized controller. However, because of the ease of SDN in managing the network, SDN has a very worrying security gap where Attackers attack Controllers that are taken over by the network. By using a new attack method called Persona Hijacking that disrupts the identifier binding process, SDN will go through a testing process by comparing how long the Persona Hijacking attack will take time and how the impact of this attack using two scenarios. The first testing scenario combines DHCP with Controller and the second test scenario by separating DHCP and Controller. This study indicates that the second scenario produces a larger black-hole presentation, which is 66% and takes 10 seconds slower than the first scenario.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Development of Open-Source Bot: An Action Research Approach MOOCs in Foreign Language Learning: A Review of Development Strategies, Benefits, and User Perspectives MBCL (Metacognition Based Contextual Learning)-based e-Module Development for Elementary School Students Classification of News Articles for Learning Using the K-Nearest Neighbor Algorithm Research Theme Map of Ubiquitous Learning: A 27-Years Overview
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1