Suleman , Khan (2017) Forensic investigation of link fabrication attack in software defined networks / Suleman Khan. PhD thesis, University of Malaya.
PDF (The Candidate's Agreement) Restricted to Repository staff only Download (242Kb) | ||
| PDF (Thesis PhD) Download (3158Kb) | Preview |
Abstract
Software Defined Networking (SDN) is an emergent network architecture with a unique feature of decoupling an infrastructure plane from the control plane. SDN enables network-wide visibility to the applications running on top of the controller by executing a topology discovery module. However, the adversaries try to exploit the controller visibility due to its centralized control management of the entire network. The SDN faces topology vulnerabilities due to lack of security concern in its initial development of the architecture. Thus, the existing vulnerabilities in the controller attract the adversary to exploit SDN for various illegitimate reasons. For instance, the controller lacks an authentication mechanism to differentiate between legitimate and spoofed Link Layer Discovery Protocol (LLDP) packets. The LLDP packets are used by the topology discovery module to determine a link between the switches which further assists the controller to build the network topology. The legitimate network topology is an utmost important in SDN because adversaries can inject fake links between the switches to fabricate the network topology. The fabrication of fake links in the network topology is called Link Fabrication Attack (LFA). The LFA occurs due to malicious switches and hosts that spoof the LLDP packets to generate fake links between the switches. The fake links are used for numerous illegal reasons including eavesdropping, diverting legitimate traffic, and packet drops. Currently, the available techniques are available to detect fake links, but they fail to identify the real source of the attack. Thus, SDN requires having a forensic method which not only detects fake links but determines the real source of the fake links. Therefore, we proposed a forensic-based investigation method (FoR-Guard) to detect fake links as well as determine the real source of the LFA. The FoR-Guard is composed of three main phases namely trigger, Detection and Source Identification (DeSI), and validation phase. The trigger phase triggers an alarm message to the DeSI phase by observing the fake link generated between the switches. The trigger phase used Malicious Index Record (MIR) of the switches to trigger a message. The DeSI phase investigates to detect fake links between the switches by checking the Link Communication Direction (LCD) and MIR information of the respective link and switch respectively. Afterwards, a traceback mechanism is used to identify the cause of the attack by determining the malicious host connected to the switch. The validation phase verifies the true source of the attack by using probability and entropy measurements. Furthermore, the FoR-Guard is compared with state-of-the-art detection mechanism of LFA by controller processing time. It founds that by employing forensic-based investigation method (FoR-Guard) the processing time of the controller is reduced significantly. Results show that FoR-Guard reduces the controller processing time up to 30.03 microseconds as compared to 89.94 and 68.49 microseconds of TopoGuard and Sphinx for 10 switches, having 20 fake links out of 50 total numbers of links. Different experiments highlight that FoR-Guard utilize maximum 35 microseconds to detect up to 20 fake links in any network topology which is significant as compared to TopoGuard and Sphinx controller processing time. Hence, the FoR-Guard provides an efficient, comprehensive forensic-based solution for SDN.
Item Type: | Thesis (PhD) |
---|---|
Additional Information: | Thesis (PhD) – Faculty of Computer Science & Information Technology, University of Malaya, 2017. |
Uncontrolled Keywords: | Software Defined Networking (SDN); Link Layer Discovery Protocol (LLDP); Network topology; Link Fabrication Attack (LFA); Fake links |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software |
Divisions: | Faculty of Computer Science & Information Technology |
Depositing User: | Mr Mohd Safri Tahir |
Date Deposited: | 09 Sep 2020 02:21 |
Last Modified: | 09 Sep 2020 02:21 |
URI: | http://studentsrepo.um.edu.my/id/eprint/11729 |
Actions (For repository staff only : Login required)
View Item |