TY - GEN
T1 - How to detect a compromised SDN switch
AU - Chi, Po Wen
AU - Kuo, Chien Ting
AU - Guo, Jing Wei
AU - Lei, Chin Laung
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/6/1
Y1 - 2015/6/1
N2 - SDN is a concept of programmable networking. A network manager can process each network flow through software programs. There is a hypothesis that all switches are trusted and follow programmed commands to handle packets. That is, once a switch is compromised by an attacker and does not follow the order of the network manager, this will bring a huge network disaster. In this paper, we define some attack models through compromised switches and design a detection mechanism to find these compromised devices. We evaluate our mechanism and discuss some future works.
AB - SDN is a concept of programmable networking. A network manager can process each network flow through software programs. There is a hypothesis that all switches are trusted and follow programmed commands to handle packets. That is, once a switch is compromised by an attacker and does not follow the order of the network manager, this will bring a huge network disaster. In this paper, we define some attack models through compromised switches and design a detection mechanism to find these compromised devices. We evaluate our mechanism and discuss some future works.
UR - http://www.scopus.com/inward/record.url?scp=84945292303&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84945292303&partnerID=8YFLogxK
U2 - 10.1109/NETSOFT.2015.7116184
DO - 10.1109/NETSOFT.2015.7116184
M3 - Conference contribution
AN - SCOPUS:84945292303
T3 - 1st IEEE Conference on Network Softwarization: Software-Defined Infrastructures for Networks, Clouds, IoT and Services, NETSOFT 2015
BT - 1st IEEE Conference on Network Softwarization
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 1st IEEE Conference on Network Softwarization, NETSOFT 2015
Y2 - 13 April 2015 through 17 April 2015
ER -