skip to main content
10.1145/3318216.3363374acmconferencesArticle/Chapter ViewAbstractPublication PagessecConference Proceedingsconference-collections
research-article

SDN-based edge computing security: detecting and mitigating flow rule attacks

Published:07 November 2019Publication History

ABSTRACT

Edge Computing and Software Defined Networking (SDN) are two emerging technologies that have increasingly become popular for implementing modern infrastructures. The former enables data computation to be performed at the edge of the network (of users) giving benefits over cloud computing when large amount of data is produced near the edge. The latter offers advantages of programmable and flexible network management over the traditional practice. Recent research has focused on how to utilize SDN paradigm to enhance Edge Computing. As more and more SDN-based Edge Computing systems are being developed, it is necessary to consider security issues especially those that are inherent from SDN. This paper addresses an important SDN specific security breach, namely a flow rule attack, where a network switch is compromised and its flow rule for data transmission routing is modified. This attack can potentially lead to many devastating consequences including disruption of network traffic and denial of services. The paper presents an approach to flow rule attack detection and lightweight mitigation techniques that can be performed by the SDN's controller. To evaluate our detection and mitigation mechanisms, the paper describes experiments on simulation that shows promising results.

References

  1. Baktir, Ahmet C., Ozgovde, A., and Ersoy, C., "How Can Edge Computing Benefit From Software-Defined Networking: A Survey, Use Cases, and Future Directions", IEEE Communications Surveys & Tutorials, Volume: 19(4), 2017.Google ScholarGoogle Scholar
  2. Baktir, Ahmet C., Ozgovde, A., and Ersoy, C., "Edge Computing: Vision and Challenges", IEEE Internet of Things Journal, Vol:3(5), Page(s): 637 -- 646, Oct. 2016.Google ScholarGoogle ScholarCross RefCross Ref
  3. Dhawan, M., Poddar, R., Mahajan, K., and Mann., V., "SPHINX: Detecting Security Attacks in Software-Defined Networks", 22nd Annual Network & Distributed System Security Conference (NDSS'15), 2015.Google ScholarGoogle ScholarCross RefCross Ref
  4. Fontes, R., Afzal, S., Brito, S., Santos, M., and Rothenberg, C., "Mininet-WiFi: Emulating software-defined wireless networks", 11th International conference on Network and Service Management (CNSM), 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Jagadeesan, N. A., and Krishnamachari, B., "Software-defined networking paradigms in wireless networks: A survey", ACM Computer Surveys, vol. 47, no. 2, p. 27, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Jero, S., X., Bu, Nita-Rotaru, C., Okhravi, H., Skowyra, R., and Fahmy, S., "BEADS: automated attack discovery in OpenFlow-based SDN systems", In RAID, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  7. Kreutz, D., Ramos, F., Verissimo, P., Rothenberg, C., Azodolmolky S., and Uhlig, S., "Software-defined networking: A comprehensive survey", in Proc. of the IEEE, Vol. 103(1), Page(s): 3--76, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  8. Lin, P.-C., Li, P.-C., and Nguyen, V. L., "Inferring openflow rules by active probing in software-defined networks", In Advanced Communication Technology (ICACT), IEEE 19th International Conference on, Page(s) 415--420., 2017.Google ScholarGoogle Scholar
  9. Scott-Hayward, S., Natarajan, S., and Sezer, S., "A survey of security in software defined networks", IEEE Communications Surveys & Tutorials, Vol: 18(1), Page(s):623--654, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Shaghaghi, A., Ali, Mohamed, K., Buyya, R., and Jha, S., "Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions", arXiv:1804.00262, 2018.Google ScholarGoogle Scholar
  11. Xiaomin, Li, Di, Li, Jiafu, Wan, Chengliang Liu, and Muhammad, Imran, "Adaptive Transmission Optimization in SDN-Based Industrial Internet of Things with Edge Computing", IEEE Internet of Things Journal, Vol: 5(3), Page(s):1351--1360, June 2018.Google ScholarGoogle ScholarCross RefCross Ref
  12. Yoon, C., Lee, S., Kang, H., Park, T., Shin, S., Yegneswaran, V., Porras, P., and Gu, G., "Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks", IEEE/ACM Transactions on Networking, Year: 2017, Vol: 25(6), Page(s): 3514 -- 3530.Google ScholarGoogle Scholar
  13. Zhou, Y., Chen, K., Zhang, J., Leng, J., and Tang, Y, "Exploiting the vulnerability of flow table overflow in software-defined network: Attack model, evaluation, and defense", Security and Communication Networks, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SEC '19: Proceedings of the 4th ACM/IEEE Symposium on Edge Computing
    November 2019
    455 pages
    ISBN:9781450367332
    DOI:10.1145/3318216

    Copyright © 2019 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 7 November 2019

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    SEC '19 Paper Acceptance Rate20of59submissions,34%Overall Acceptance Rate40of100submissions,40%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader