Detection of topology poisoning by silent relay attacker in SDN

Shrivastava, Pragati and Agarwal, Annanay and Kataoka, Kotaro (2018) Detection of topology poisoning by silent relay attacker in SDN. In: 24th Annual International Conference on Mobile Computing and Networking, 29 October to 2nd November 2018, New Delhi.

Full text not available from this repository. (Request a copy)

Abstract

Topology Poisoning can be easily performed by injecting a fake link between SDN switches using a silent relay attack. This attack is difficult to detect because 1) the attacker is a passive man-in-the-middle to relay control messages between the compromised ports on SDN switches, and 2) such messages are genuine for the SDN switches and controller. This poster proposes Silent Relay Detector (SRD) that tailormakes the SDN control messages to be processed normally by authentic switches but to make the attacker malfunction. The SRD implementation and experiment reveal how the silent relay attack is detected and fake link injection is prohibited ingeniously.

[error in script]
IITH Creators:
IITH CreatorsORCiD
Kataoka, KotaroUNSPECIFIED
Item Type: Conference or Workshop Item (Paper)
Uncontrolled Keywords: Silent Relay Attack, Topology Discovery, Topology Poisoning
Subjects: Computer science
Divisions: Department of Computer Science & Engineering
Depositing User: Team Library
Date Deposited: 03 Dec 2018 10:52
Last Modified: 03 Dec 2018 10:52
URI: http://raiithold.iith.ac.in/id/eprint/4596
Publisher URL: http://doi.org/10.1145/3241539.3267763
Related URLs:

Actions (login required)

View Item View Item
Statistics for RAIITH ePrint 4596 Statistics for this ePrint Item