Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/57059
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tupakula, Udaya | en |
dc.contributor.author | Varadharajan, Vijay | en |
dc.contributor.author | Karmakar, Kallol Krishna | en |
dc.date.accessioned | 2023-12-20T23:18:22Z | - |
dc.date.available | 2023-12-20T23:18:22Z | - |
dc.date.issued | 2020 | - |
dc.identifier.citation | Proceedings of the 2020 IEEE Conference on Network Softwarization : NetSoft 2020 : Bridging the gap between AI and network softwarization, p. 262-266, p. 262-266 | en |
dc.identifier.isbn | 9781728156842 | en |
dc.identifier.isbn | 9781728156859 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/57059 | - |
dc.description.abstract | <p>Software Defined Networking (SDN) is disruptive networking technology which adopts a centralised framework to facilitate fine-grained network management. However security in SDN is still in its infancy and there is need for significant work to deal with different attacks in SDN. In this paper we discuss some of the possible attacks on SDN switches and propose techniques for detecting the attacks on switches. We have developed a Switch Security Application (SSA)for SDN Controller which makes use of trusted computing technology and some additional components for detecting attacks on the switches. In particular TPM attestation is used to ensure that switches are in trusted state during boot time before configuring the flow rules on the switches. The additional components are used for storing and validating messages related to the flow rule configuration of the switches. The stored information is used for generating a trusted report on the expected flow rules in the switches and using this information for validating the flow rules that are actually enforced in the switches. If there is any variation to flow rules that are enforced in the switches compared to the expected flow rules by the SSA, then, the switch is considered to be under attack and an alert is raised to the SDN Administrator. The administrator can isolate the switch from network or make use of trusted report for restoring the flow rules in the switches. We will also present a prototype implementation of our technique.</p> | en |
dc.language | en | en |
dc.publisher | IEEE | en |
dc.relation.ispartof | Proceedings of the 2020 IEEE Conference on Network Softwarization : NetSoft 2020 : Bridging the gap between AI and network softwarization, p. 262-266 | en |
dc.title | Attack Detection on the Software Defined Networking Switches | en |
dc.type | Conference Publication | en |
dc.relation.conference | 2020 6th IEEE Conference on Network Softwarization (NetSoft) | en |
dc.identifier.doi | 10.1109/netsoft48620.2020.9165459 | en |
local.contributor.firstname | Udaya | en |
local.contributor.firstname | Vijay | en |
local.contributor.firstname | Kallol Krishna | en |
local.profile.school | School of Science & Technology | en |
local.profile.email | utupakul@une.edu.au | en |
local.output.category | E1 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.date.conference | 29th June - 3rd July, 2020 | en |
local.conference.place | Ghent, Belgium | en |
local.publisher.place | Piscataway, New Jersey, United States of America | en |
local.format.startpage | 262 | en |
local.format.endpage | 266 | en |
local.peerreviewed | Yes | en |
local.contributor.lastname | Tupakula | en |
local.contributor.lastname | Varadharajan | en |
local.contributor.lastname | Karmakar | en |
dc.identifier.staff | une-id:utupakul | en |
local.profile.orcid | 0000-0001-5048-9797 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/57059 | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | Attack Detection on the Software Defined Networking Switches | en |
local.output.categorydescription | E1 Refereed Scholarly Conference Publication | en |
local.conference.details | 2020 6th IEEE Conference on Network Softwarization (NetSoft), Ghent, Belgium, 29th June - 3rd July, 2020 | en |
local.search.author | Tupakula, Udaya | en |
local.search.author | Varadharajan, Vijay | en |
local.search.author | Karmakar, Kallol Krishna | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.conference.venue | Virtual Conference | en |
local.sensitive.cultural | No | en |
local.year.published | 2020 | en |
local.subject.for2020 | 460407 System and network security | en |
local.subject.seo2020 | 220405 Cybersecurity | en |
local.date.start | 2020-06-29 | - |
local.date.end | 2020-07-03 | - |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
Appears in Collections: | Conference Publication School of Science and Technology |
SCOPUSTM
Citations
4
checked on May 25, 2024
Page view(s)
196
checked on May 5, 2024
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.