skip to main content
10.1145/3638837.3638844acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicnccConference Proceedingsconference-collections
research-article

VADSEC: A Lightweight Protection Scheme for Secure Topology Discovery in SDN

Published:07 March 2024Publication History

ABSTRACT

Over the past decade, Software-Defined Networking (SDN) has been a highly researched and popular field. One crucial aspect of any network, including SDNs, is the network discovery phase, also known as topology discovery. The security of the network is based on secure topology discovery, which includes protecting the hosts, switches, and associated links. This paper introduces a model called VADSec – Virtual Local Area Network (VLAN) and Active Directory (AD) based topology discovery, which aims to secure hosts and prevent host hijacking attacks. Our proposed technique utilizes VLANs to isolate traffic and identify any malicious or impersonating hosts. Furthermore, we use LDAP protocol to query Active Directory and verify the legitimacy of a specific MAC ID pertaining to a host. The results demonstrate that our approach can prevent impersonation/host-hijacking attacks and induce a secure topology discovery.

References

  1. Cerroni, Walter. "Network Softwarization Coming of Age: A Retrospective Look" IEEE International Conference on Network Softwarization, 27 June–1 July 2022, Milan, Italy.Google ScholarGoogle Scholar
  2. Nate Pleasant. Software-Defined Networking (SDN): Why your organization needs it. Retrieved April 6, 2023 from https://www.digi.com/blog/post/software-defined-networkingGoogle ScholarGoogle Scholar
  3. Shaji, Neena Susan, and Raja Muthalagu. "Survey on security aspects of distributed software-defined networking controllers in an enterprise SD-WLAN." Digital Communications and Networks (2023).Google ScholarGoogle Scholar
  4. Shirmarz, Alireza, and Ali Ghaffari. "Performance issues and solutions in SDN-based data center: a survey." The Journal of Supercomputing 76.10 (2020): 7545-7593.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Pfaff, Ben, "The design and implementation of open {vSwitch}." 12th USENIX symposium on networked systems design and implementation (NSDI 15). 2015.Google ScholarGoogle Scholar
  6. Timon Sloane. 2017. Overview. (June 2017). Retrieved September 6, 2022 from https://opennetworking.org/working-groups/overview/overview/Google ScholarGoogle Scholar
  7. Bui, Thanh, Markku Antikainen, and Tuomas Aura. "Analysis of topology poisoning attacks in software-defined networking." Secure IT Systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings 24. Springer International Publishing, 2019.Google ScholarGoogle Scholar
  8. Attar, Vahida Z., and Piyush Chandwadkar. "Network discovery protocol lldp and lldp-med." International Journal of Computer Applications 1.9 (2010): 93-97.Google ScholarGoogle ScholarCross RefCross Ref
  9. Khan, Suleman, "Topology discovery in software defined networks: Threats, taxonomy, and state-of-the-art." IEEE Communications Surveys & Tutorials 19.1 (2016): 303-324.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Pakzad, Farzaneh, "Efficient topology discovery in software-defined networks." 2014 8th international conference on signal processing and communication systems (ICSPCS). IEEE, 2014.Google ScholarGoogle Scholar
  11. Azzouni, Abdelhadi, "sOFTDP: Secure and efficient topology discovery protocol for SDN." arXiv preprint arXiv:1705.04527 (2017).Google ScholarGoogle Scholar
  12. Hong, S., Xu, L., Wang, H., & Gu, G. (2015, February). Poisoning network visibility in software-defined networks: New attacks and countermeasures. In Ndss (Vol. 15, pp. 8-11).Google ScholarGoogle Scholar
  13. Alharbi, Talal. "The (in) security of topology discovery in open-flow-based software-defined network." International Journal of Network Security & Its Applications (IJNSA) Vol 10 (2018).Google ScholarGoogle Scholar
  14. Dhawan, Mohan, "Sphinx: detecting security attacks in software-defined networks." Ndss. Vol. 15. 2015.Google ScholarGoogle Scholar
  15. Skowyra, Richard, "Effective topology tampering attacks and defenses in software-defined networks." 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2018.Google ScholarGoogle Scholar
  16. Jero, Samuel, "Identifier Binding Attacks and Defenses in {Software-Defined} Networks." 26th USENIX Security Symposium (USENIX Security 17). 2017.Google ScholarGoogle Scholar
  17. Marin, Eduard, Nicola Bucciol, and Mauro Conti. "An in-depth look into SDN topology discovery mechanisms: Novel attacks and practical countermeasures." Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2019.Google ScholarGoogle Scholar
  18. Ruixuan, Pan, "Research on the network access authentication technology of SDN based on 802.1 X." 2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). IEEE, 2020.Google ScholarGoogle Scholar
  19. Mininet: An Instant Virtual Network on Your Laptop (or Other PC) - Mininet. Retrieved January 8, 2023 from http://mininet.org/Google ScholarGoogle Scholar
  20. Manipulate Data Packets Using Scapy!. Retrieved March 8, 2023 from https://www.opensourceforu.com/2021/03/manipulate-data-packets-using-scapy/Google ScholarGoogle Scholar

Index Terms

  1. VADSEC: A Lightweight Protection Scheme for Secure Topology Discovery in SDN

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICNCC '23: Proceedings of the 2023 12th International Conference on Networks, Communication and Computing
          December 2023
          310 pages
          ISBN:9798400709265
          DOI:10.1145/3638837

          Copyright © 2023 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 7 March 2024

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited
        • Article Metrics

          • Downloads (Last 12 months)7
          • Downloads (Last 6 weeks)3

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format