How to detect a compromised SDN switch

Po Wen Chi, Chien Ting Kuo, Jing Wei Guo, Chin Laung Lei

Research output: Chapter in Book/Report/Conference proceedingConference contribution

61 Citations (Scopus)

Abstract

SDN is a concept of programmable networking. A network manager can process each network flow through software programs. There is a hypothesis that all switches are trusted and follow programmed commands to handle packets. That is, once a switch is compromised by an attacker and does not follow the order of the network manager, this will bring a huge network disaster. In this paper, we define some attack models through compromised switches and design a detection mechanism to find these compromised devices. We evaluate our mechanism and discuss some future works.

Original languageEnglish
Title of host publication1st IEEE Conference on Network Softwarization
Subtitle of host publicationSoftware-Defined Infrastructures for Networks, Clouds, IoT and Services, NETSOFT 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479978991
DOIs
Publication statusPublished - 2015 Jun 1
Externally publishedYes
Event1st IEEE Conference on Network Softwarization, NETSOFT 2015 - London, United Kingdom
Duration: 2015 Apr 132015 Apr 17

Publication series

Name1st IEEE Conference on Network Softwarization: Software-Defined Infrastructures for Networks, Clouds, IoT and Services, NETSOFT 2015

Conference

Conference1st IEEE Conference on Network Softwarization, NETSOFT 2015
Country/TerritoryUnited Kingdom
CityLondon
Period2015/04/132015/04/17

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Fingerprint

Dive into the research topics of 'How to detect a compromised SDN switch'. Together they form a unique fingerprint.

Cite this