Please use this identifier to cite or link to this item: https://hdl.handle.net/1959.11/57059
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTupakula, Udayaen
dc.contributor.authorVaradharajan, Vijayen
dc.contributor.authorKarmakar, Kallol Krishnaen
dc.date.accessioned2023-12-20T23:18:22Z-
dc.date.available2023-12-20T23:18:22Z-
dc.date.issued2020-
dc.identifier.citationProceedings of the 2020 IEEE Conference on Network Softwarization : NetSoft 2020 : Bridging the gap between AI and network softwarization, p. 262-266, p. 262-266en
dc.identifier.isbn9781728156842en
dc.identifier.isbn9781728156859en
dc.identifier.urihttps://hdl.handle.net/1959.11/57059-
dc.description.abstract<p>Software Defined Networking (SDN) is disruptive networking technology which adopts a centralised framework to facilitate fine-grained network management. However security in SDN is still in its infancy and there is need for significant work to deal with different attacks in SDN. In this paper we discuss some of the possible attacks on SDN switches and propose techniques for detecting the attacks on switches. We have developed a Switch Security Application (SSA)for SDN Controller which makes use of trusted computing technology and some additional components for detecting attacks on the switches. In particular TPM attestation is used to ensure that switches are in trusted state during boot time before configuring the flow rules on the switches. The additional components are used for storing and validating messages related to the flow rule configuration of the switches. The stored information is used for generating a trusted report on the expected flow rules in the switches and using this information for validating the flow rules that are actually enforced in the switches. If there is any variation to flow rules that are enforced in the switches compared to the expected flow rules by the SSA, then, the switch is considered to be under attack and an alert is raised to the SDN Administrator. The administrator can isolate the switch from network or make use of trusted report for restoring the flow rules in the switches. We will also present a prototype implementation of our technique.</p>en
dc.languageenen
dc.publisherIEEEen
dc.relation.ispartofProceedings of the 2020 IEEE Conference on Network Softwarization : NetSoft 2020 : Bridging the gap between AI and network softwarization, p. 262-266en
dc.titleAttack Detection on the Software Defined Networking Switchesen
dc.typeConference Publicationen
dc.relation.conference2020 6th IEEE Conference on Network Softwarization (NetSoft)en
dc.identifier.doi10.1109/netsoft48620.2020.9165459en
local.contributor.firstnameUdayaen
local.contributor.firstnameVijayen
local.contributor.firstnameKallol Krishnaen
local.profile.schoolSchool of Science & Technologyen
local.profile.emailutupakul@une.edu.auen
local.output.categoryE1en
local.record.placeauen
local.record.institutionUniversity of New Englanden
local.date.conference29th June - 3rd July, 2020en
local.conference.placeGhent, Belgiumen
local.publisher.placePiscataway, New Jersey, United States of Americaen
local.format.startpage262en
local.format.endpage266en
local.peerreviewedYesen
local.contributor.lastnameTupakulaen
local.contributor.lastnameVaradharajanen
local.contributor.lastnameKarmakaren
dc.identifier.staffune-id:utupakulen
local.profile.orcid0000-0001-5048-9797en
local.profile.roleauthoren
local.profile.roleauthoren
local.profile.roleauthoren
local.identifier.unepublicationidune:1959.11/57059en
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
local.title.maintitleAttack Detection on the Software Defined Networking Switchesen
local.output.categorydescriptionE1 Refereed Scholarly Conference Publicationen
local.conference.details2020 6th IEEE Conference on Network Softwarization (NetSoft), Ghent, Belgium, 29th June - 3rd July, 2020en
local.search.authorTupakula, Udayaen
local.search.authorVaradharajan, Vijayen
local.search.authorKarmakar, Kallol Krishnaen
local.uneassociationNoen
local.atsiresearchNoen
local.conference.venueVirtual Conferenceen
local.sensitive.culturalNoen
local.year.published2020en
local.subject.for2020460407 System and network securityen
local.subject.seo2020220405 Cybersecurityen
local.date.start2020-06-29-
local.date.end2020-07-03-
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
Appears in Collections:Conference Publication
School of Science and Technology
Show simple item record

SCOPUSTM   
Citations

4
checked on May 25, 2024

Page view(s)

196
checked on May 5, 2024
Google Media

Google ScholarTM

Check

Altmetric


Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.