DIS-Guard:增强 SDN 抵御拓扑和 RCO 攻击的能力

IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Computer Networks Pub Date : 2024-08-20 DOI:10.1016/j.comnet.2024.110723
{"title":"DIS-Guard:增强 SDN 抵御拓扑和 RCO 攻击的能力","authors":"","doi":"10.1016/j.comnet.2024.110723","DOIUrl":null,"url":null,"abstract":"<div><p>SDN controllers employ discovery protocols with LLDP packets to discover the network topology; however, this approach is susceptible to topology attacks due to the static reuse of LLDP packets without proper origin verification or integrity checks. This paper proposes a novel form of topology attack called the Round-trip time Confusion Onslaught (RCO) attack. Our findings showcase the capability of the RCO attack to mislead the discovery service of SDN controllers and bypass the Real-time Link Verification (RLV) defence mechanism, which depends on timing features in Machine Learning (ML) models. The RCO attack significantly reduces the effectiveness of the RLV mechanism in terms of True Positive Rate (TPR), Precision, F1-score, and Cohen’s Kappa and increases the False Positive Rate (FPR). These results underscore the difficulties in achieving dependable ML accuracy in topology attack detection. Accordingly, we propose the DIS-Guard framework, designed to protect and improve the efficiency of discovery protocols within SDN controllers. This framework utilizes the mutual Transport Layer Security (mTLS) protocol to discover hosts proactively. Moreover, it employs a novel combination of a chaos-tent map and the proposed statistical method for link discovery. Through extensive evaluation, we illustrate DIS-Guard’s superior performance and security over the established Ryu (switches.py) controller and the RLV defence mechanism. Notably, DIS-Guard reduces host-to-host access delays, decreases LLDP packet transmission and reception significantly, and improves control channel efficiency. Collectively, these quantifiable benefits manifest the efficacy of DIS-Guard as a significantly optimized solution for SDN security and performance.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4000,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"DIS-Guard: Enhancing SDN resilience to topology and RCO attacks\",\"authors\":\"\",\"doi\":\"10.1016/j.comnet.2024.110723\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>SDN controllers employ discovery protocols with LLDP packets to discover the network topology; however, this approach is susceptible to topology attacks due to the static reuse of LLDP packets without proper origin verification or integrity checks. This paper proposes a novel form of topology attack called the Round-trip time Confusion Onslaught (RCO) attack. Our findings showcase the capability of the RCO attack to mislead the discovery service of SDN controllers and bypass the Real-time Link Verification (RLV) defence mechanism, which depends on timing features in Machine Learning (ML) models. The RCO attack significantly reduces the effectiveness of the RLV mechanism in terms of True Positive Rate (TPR), Precision, F1-score, and Cohen’s Kappa and increases the False Positive Rate (FPR). These results underscore the difficulties in achieving dependable ML accuracy in topology attack detection. Accordingly, we propose the DIS-Guard framework, designed to protect and improve the efficiency of discovery protocols within SDN controllers. This framework utilizes the mutual Transport Layer Security (mTLS) protocol to discover hosts proactively. Moreover, it employs a novel combination of a chaos-tent map and the proposed statistical method for link discovery. Through extensive evaluation, we illustrate DIS-Guard’s superior performance and security over the established Ryu (switches.py) controller and the RLV defence mechanism. Notably, DIS-Guard reduces host-to-host access delays, decreases LLDP packet transmission and reception significantly, and improves control channel efficiency. Collectively, these quantifiable benefits manifest the efficacy of DIS-Guard as a significantly optimized solution for SDN security and performance.</p></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":4.4000,\"publicationDate\":\"2024-08-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128624005553\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128624005553","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

摘要

SDN 控制器使用带有 LLDP 数据包的发现协议来发现网络拓扑;然而,由于 LLDP 数据包的静态重用没有适当的来源验证或完整性检查,这种方法很容易受到拓扑攻击。本文提出了一种新的拓扑攻击形式,称为 "往返时间混淆攻击(RCO)"。我们的研究结果表明,RCO 攻击能够误导 SDN 控制器的发现服务,并绕过实时链路验证(RLV)防御机制,该机制依赖于机器学习(ML)模型中的时序特征。RCO 攻击大大降低了 RLV 机制在真阳性率 (TPR)、精确度 (Precision)、F1 分数 (F1-score) 和 Cohen's Kappa 等方面的有效性,并增加了假阳性率 (FPR)。这些结果凸显了在拓扑攻击检测中实现可靠的 ML 准确性的困难。因此,我们提出了 DIS-Guard 框架,旨在保护和提高 SDN 控制器内发现协议的效率。该框架利用相互传输层安全(mTLS)协议主动发现主机。此外,它还采用了混沌帐篷图和拟议统计方法的新组合来发现链路。通过广泛的评估,我们证明 DIS-Guard 的性能和安全性优于现有的 Ryu (switches.py) 控制器和 RLV 防御机制。值得注意的是,DIS-Guard 减少了主机到主机的访问延迟,显著降低了 LLDP 数据包的收发量,并提高了控制信道的效率。总之,这些可量化的优势体现了 DIS-Guard 作为 SDN 安全和性能显著优化解决方案的功效。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
DIS-Guard: Enhancing SDN resilience to topology and RCO attacks

SDN controllers employ discovery protocols with LLDP packets to discover the network topology; however, this approach is susceptible to topology attacks due to the static reuse of LLDP packets without proper origin verification or integrity checks. This paper proposes a novel form of topology attack called the Round-trip time Confusion Onslaught (RCO) attack. Our findings showcase the capability of the RCO attack to mislead the discovery service of SDN controllers and bypass the Real-time Link Verification (RLV) defence mechanism, which depends on timing features in Machine Learning (ML) models. The RCO attack significantly reduces the effectiveness of the RLV mechanism in terms of True Positive Rate (TPR), Precision, F1-score, and Cohen’s Kappa and increases the False Positive Rate (FPR). These results underscore the difficulties in achieving dependable ML accuracy in topology attack detection. Accordingly, we propose the DIS-Guard framework, designed to protect and improve the efficiency of discovery protocols within SDN controllers. This framework utilizes the mutual Transport Layer Security (mTLS) protocol to discover hosts proactively. Moreover, it employs a novel combination of a chaos-tent map and the proposed statistical method for link discovery. Through extensive evaluation, we illustrate DIS-Guard’s superior performance and security over the established Ryu (switches.py) controller and the RLV defence mechanism. Notably, DIS-Guard reduces host-to-host access delays, decreases LLDP packet transmission and reception significantly, and improves control channel efficiency. Collectively, these quantifiable benefits manifest the efficacy of DIS-Guard as a significantly optimized solution for SDN security and performance.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Computer Networks
Computer Networks 工程技术-电信学
CiteScore
10.80
自引率
3.60%
发文量
434
审稿时长
8.6 months
期刊介绍: Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.
期刊最新文献
SD-MDN-TM: A traceback and mitigation integrated mechanism against DDoS attacks with IP spoofing On the aggregation of FIBs at ICN routers using routing strategy Protecting unauthenticated messages in LTE/5G mobile networks: A two-level Hierarchical Identity-Based Signature (HIBS) solution A two-step linear programming approach for repeater placement in large-scale quantum networks Network traffic prediction based on PSO-LightGBM-TM
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1