...
首页> 外文期刊>International journal of communication systems >TILAK: A token-based prevention approach for topology discovery threats in SDN
【24h】

TILAK: A token-based prevention approach for topology discovery threats in SDN

机译:TILAK:针对SDN中的拓扑发现威胁的基于令牌的预防方法

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Software-defined networks (SDNs) decouple the data plane from the control plane. Thus, it provides logically centralized visibility of the entire networking infrastructure to the controller. It enables the applications running on top of the control plane to innovate through network management and programmability. To envision the centralized control and visibility, the controller needs to discover the networking topology of the entire SDN infrastructure. However, discovering and maintaining a global view of the underlying network topology is a challenging task because of (i) frequently changing network topology caused by migration of the virtual machines in the data centers, mobile, end hosts and change in the number of data plane switches because of technical faults or network upgrade; (ii) lack of authentication mechanisms and scarcity in SDN standards; and (iii) availability of security solutions during topology discovery process. To this end, the aim of this paper is threefold. First, we investigate the working methodologies used to achieve global view by different SDN controllers, specifically, POX, Ryu, OpenDaylight, Floodlight, Beacon, ONOS, and HPEVAN. Second, we identify vulnerabilities that affect the topology discovery process in the above controller implementation. In particular, we provide a detailed analysis of the threats namely link layer discovery protocol (LLDP) poisoning, LLDP flooding, and LLDP replay attack concerning these controllers. Finally, to countermeasure the identified risks, we propose a novel mechanism called TILAK which generates random MAC destination addresses for LLDP packets and use this randomness to create a flow entry for the LLDP packets. It is a periodic process to prevent LLDP packet-based attacks that are caused only because of lack of verification of source authentication and integrity of LLDP packets. The implementation results for TILAK confirm that it covers targeted threats with lower resource penalty.
机译:软件定义的网络(SDN)将数据平面与控制平面分离。因此,它为控制器提供了整个网络基础结构的逻辑集中式可见性。它使运行在控制平面顶部的应用程序能够通过网络管理和可编程性进行创新。要设想集中控制和可见性,控制器需要发现整个SDN基础架构的网络拓扑。但是,发现和维护基础网络拓扑的全局视图是一项具有挑战性的任务,因为(i)由于数据中心,移动主机,终端主机中虚拟机的迁移以及数据平面数量的变化而导致的网络拓扑频繁变化由于技术故障或网络升级而切换; (ii)SDN标准缺乏认证机制和稀缺性; (iii)在拓扑发现过程中提供安全解决方案。为此,本文的目的是三重的。首先,我们研究了不同的SDN控制器(特别是POX,Ryu,OpenDaylight,Floodlight,Beacon,ONOS和HPEVAN)用于获得全局视图的工作方法。其次,我们确定在上述控制器实现中会影响拓扑发现过程的漏洞。特别是,我们提供了有关这些控制器的威胁的详细分析,即链路层发现协议(LLDP)中毒,LLDP泛洪和LLDP重播攻击。最后,为了对付确定的风险,我们提出了一种称为TILAK的新机制,该机制为LLDP数据包生成随机MAC目标地址,并使用此随机性为LLDP数据包创建流条目。这是一个定期过程,用于防止仅由于缺乏对源身份验证和LLDP数据包完整性的验证而导致的基于LLDP数据包的攻击。 TILAK的实施结果证实,它涵盖了具有较低资源损失的目标威胁。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号