skip to main content
10.1145/2809826.2809833acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

FlowMon: Detecting Malicious Switches in Software-Defined Networks

Published:12 October 2015Publication History

ABSTRACT

Software-Defined Networking (SDN) introduces a new communication network management paradigm and has gained much attention recently. In SDN, a network controller overlooks and manages the entire network by configuring routing mechanisms for underlying switches. The switches report their status to the controller periodically, such as port statistics and flow statistics, according to their communication protocol. However, switches may contain vulnerabilities that can be exploited by attackers. A compromised switch may not only lose its normal functionality, but it may also maliciously paralyze the network by creating network congestions or packet loss. Therefore, it is important for the system to be able to detect and isolate malicious switches. In this work, we investigate a methodology for an SDN controller to detect compromised switches through real-time analysis of the periodically collected reports. Two types of malicious behavior of compromised switches are investigated: packet dropping and packet swapping. We proposed two anomaly detection algorithms to detect packet droppers and packet swappers. Our simulation results show that our proposed methods can effectively detect packet droppers and swappers. To the best of our knowledge, our work is the first to address malicious switches detection using statistics reports in SDN.

References

  1. The Open Networking Foundation. https://www.opennetworking.org/about.Google ScholarGoogle Scholar
  2. M. Aminian and F. Aminian. Neural-network based analog-circuit fault diagnosis using wavelet transform as preprocessor. Circuits and Systems II: Analog and Digital Signal Processing, IEEE Transactions on, 47(2):151--156, Feb 2000.Google ScholarGoogle Scholar
  3. S. R. Chowdhury, M. F. Bari, R. Ahmed, and R. Boutaba. PayLess: A Low Cost Network Monitoring Framework for Software Defined Networks. In Network Operations and Management Symposium (NOMS), 2014 IEEE, pages 1--9, May 2014.Google ScholarGoogle Scholar
  4. Cisco. Introduction to Cisco IOS NetFlow, 2012. http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-netflow/prod_white_paper0900aecd80406232.pdf(last accessed: July 4, 2015).Google ScholarGoogle Scholar
  5. X. Du, M.-Z. Wang, X. Zhang, and L. Zhu. Traffic-based Malicious Switch Detection in SDN. International Journal of Security and Its Applications, 8(5):119--130, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  6. M. Garcia, A. Bessani, I. Gashi, N. Neves, and R. Obelheiro. Analysis of operating system diversity for intrusion tolerance. Software: Practice and Experience, 44(6):735--770, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Isermann. Supervision, fault-detection and fault-diagnosis methods -- An introduction. Control Engineering Practice, 5(5):639--652, 1997.Google ScholarGoogle ScholarCross RefCross Ref
  8. R. Isermann. Fault-Diagnosis Systems: An Introduction from Fault Detection to Fault Tolerance. Springer Berlin Heidelberg, 2006.Google ScholarGoogle Scholar
  9. I. Katzela and M. Schwartz. Schemes for fault identification in communication networks. Networking, IEEE/ACM Transactions on, 3(6):753--764, Dec 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Kreutz, F. M. Ramos, and P. Verissimo. Towards Secure and Dependable Software-defined Networks. In Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, HotSDN '13, pages 55--60, New York, NY, USA, 2013. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. OpenFlow: Enabling Innovation in Campus Networks. SIGCOMM Comput. Commun. Rev., 38(2):69--74, Mar. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Neti, A. Somayaji, and M. E. Locasto. Software Diversity: Security, Entropy and Game Theory. In 7th USENIX Workshop on Hot Topics in Security, Berkeley, CA, 2012. USENIX. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Shin, V. Yegneswaran, P. Porras, and G. Gu. AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS '13, pages 413--424, New York, NY, USA, 2013. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Steinder and A. S. Sethi. Probabilistic fault localization in communication systems using belief networks. Networking, IEEE/ACM Transactions on, 12(5):809--822, Oct 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. The Open Networking Foundation. OpenFlow Switch Specification, 2013. https://www.opennetworking.org/images/stories/downloads/sdn-resources/onf-specifications/penflow/openflow-spec-v1.4.0.pdf (last accessed: July 4, 2015).Google ScholarGoogle Scholar
  16. L. Wei and C. Fung. FlowRanger: A Request Prioritizing Algorithm for Controller DoS Attacks in Software Defined Networks. In IEEE International Conference on Communications (ICC 2015). IEEE, 2015.Google ScholarGoogle Scholar

Index Terms

  1. FlowMon: Detecting Malicious Switches in Software-Defined Networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SafeConfig '15: Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense
        October 2015
        112 pages
        ISBN:9781450338219
        DOI:10.1145/2809826

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 October 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SafeConfig '15 Paper Acceptance Rate8of27submissions,30%Overall Acceptance Rate22of61submissions,36%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader