DocumentCode :
265675
Title :
Implications and detection of DoS attacks in OpenFlow-based networks
Author :
Hommes, Stefan ; State, Radu ; Engel, Thomas
Author_Institution :
SnT 4, Univ. of Luxembourg, Luxembourg, Luxembourg
fYear :
2014
fDate :
8-12 Dec. 2014
Firstpage :
537
Lastpage :
543
Abstract :
In this paper, we address the potential of centralised network monitoring based on Software-Defined Networking with OpenFlow. Due to the vulnerability of the flow table, which can store only a limited number of entries, we discuss and show the implications for a DoS attack on a testbed consisting of OpenFlow enabled network devices. Such an attack can be detected by analysing variations in the logical topology, using techniques from information theory that can run as a network service on the network controller.
Keywords :
computer network security; information theory; software defined networking; topology; DoS attack; OpenFlow enabled network devices; centralised network monitoring; flow table; information theory; logical topology; network controller; network service; software-defined networking; Computer crime; Monitoring; Network topology; Ports (Computers); Switches; Topology;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Communications Conference (GLOBECOM), 2014 IEEE
Conference_Location :
Austin, TX
Type :
conf
DOI :
10.1109/GLOCOM.2014.7036863
Filename :
7036863
Link To Document :
بازگشت