Login | Register

Verifying Network Topology in Software Defined Networks Using Stealthy Probing-based Verification (SPV)

Title:

Verifying Network Topology in Software Defined Networks Using Stealthy Probing-based Verification (SPV)

Alimohammadifar, Amir (2018) Verifying Network Topology in Software Defined Networks Using Stealthy Probing-based Verification (SPV). Masters thesis, Concordia University.

[thumbnail of Alimohammadifar_MASc_S2018.pdf]
Preview
Text (application/pdf)
Alimohammadifar_MASc_S2018.pdf - Accepted Version
Available under License Spectrum Terms of Access.
1MB

Abstract

Since a key advantage of Software Defined Networks (SDN) is providing a logically centralized view of the network topology, the correctness of such a view becomes critical for SDN applications to make the right management decisions. However, recently discovered vulnerabilities in OpenFlow Discovery Protocol (OFDP) show that malicious hosts and switches can poison the network view of the SDN controller and consequently lead to more severe security attacks, such as man-in-the-middle or denial of service. Several solutions have been proposed to address such topology poisoning attacks, but their scope is mostly limited to malicious hosts injecting or relaying fake Link Layer Discovery Protocol (LLDP) packets. In this work, we propose Stealthy Probing-based Verification (SPV), a novel stealthy probing-based approach, to significantly extend the scope of existing solutions. Specifically, SPV incrementally verifies legitimate links and detects fake links by sending probing packets. Such packets are sent in a stealthy manner to deceive malicious hosts or switches who may be trying to identify the probing attempts among normal traffic. To illustrate the feasibility of our approach, we implement SPV in an emulated SDN environment using Mininet and OpenDaylight. We further evaluate the applicability and the performance of SPV in a real SDN/cloud topology. We show that SPV can achieve a very low verification time (i.e., less than 120 milliseconds) in both real and emulated environments which makes SPV a scalable solution for large SDN networks.

Divisions:Concordia University > Gina Cody School of Engineering and Computer Science > Concordia Institute for Information Systems Engineering
Item Type:Thesis (Masters)
Authors:Alimohammadifar, Amir
Institution:Concordia University
Degree Name:M.A. Sc.
Program:Information Systems Security
Date:1 February 2018
Thesis Supervisor(s):Wang, Lingyu
Keywords:SDN security, OpenFlow topology discovery, topology poisoning, link verification, active probing
ID Code:983465
Deposited By: AMIR ALIMOHAMMADIFAR
Deposited On:11 Jun 2018 03:03
Last Modified:01 Sep 2018 00:01
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Research related to the current document (at the CORE website)
- Research related to the current document (at the CORE website)
Back to top Back to top