ArticlePDF Available

Self-healing topology for DDoS attack identification & discovery protocol in software-defined networks

Authors:

Abstract

Software defined networking is an emerging network architecture that separates the control plane from the data plane of network devices and places the control plane on one or more control servers capable of managing the rules traffic forwarding of all communication devices under your domain. This article describes the architecture, different modules, and event sequences of the HyPASS for real-time protection from address-forged attacks with proactive host discovery and address validation. Such attacks cause the wastage of network bandwidth, processing power, and network resources available to the user. We performed the latency, throughput, and attack prevention tests using POX & RYU controllers on the Mininet network simulator with and without HyPASS. The system performance is analyzed for accuracy and efficiency in four different SDN scenarios categorized as fully OpenFlow enabled and Hybrid. The proposed system discovers all the live hosts in the network, updates Host Table at the handshaking between controller and OpenFlow switches. Experiments show that the system prevented all the address-forged attacks by validating the source address in different SDN environments. It achieves a 99.99% filtering accuracy level in a fully OpenFlow-enabled setup.
Full Terms & Conditions of access and use can be found at
https://www.tandfonline.com/action/journalInformation?journalCode=tdmc20
Journal of Discrete Mathematical Sciences and
Cryptography
ISSN: (Print) (Online) Journal homepage: https://www.tandfonline.com/loi/tdmc20
Self-healing topology for DDoS attack
identification & discovery protocol in software-
defined networks
Gajanand Sharma, Himanshu Sharma, Rajneesh Pareek, Nidhi Gour, Ravi
Shanker Sharma & Ashutosh Kumar
To cite this article: Gajanand Sharma, Himanshu Sharma, Rajneesh Pareek, Nidhi Gour, Ravi
Shanker Sharma & Ashutosh Kumar (2021) Self-healing topology for DDoS attack identification &
discovery protocol in software-defined networks, Journal of Discrete Mathematical Sciences and
Cryptography, 24:8, 2221-2232, DOI: 10.1080/09720529.2021.2009192
To link to this article: https://doi.org/10.1080/09720529.2021.2009192
Published online: 27 Dec 2021.
Submit your article to this journal
Article views: 2
View related articles
View Crossmark data
©
Self-healing topology for DDoS attack identification & discovery
protocol in software-defined networks
Gajanand Sharma
Himanshu Sharma §
Rajneesh Pareek
Nidhi Gour @
Ravi Shanker Sharma #
Ashutosh Kumar *
Department of Computer Science & Engineering
JECRC University
Jaipur 303905
Rajasthan
India
Abstract
Software defined networking is an emerging network architecture that separates the
control plane from the data plane of network devices and places the control plane on one or
more control servers capable of managing the rules traffic forwarding of all communication
devices under your domain. This article describes the architecture, different modules, and
event sequences of the HyPASS for real-time protection from address-forged attacks with
proactive host discovery and address validation. Such attacks cause the wastage of network
bandwidth, processing power, and network resources available to the user. We performed
the latency, throughput, and attack prevention tests using POX & RYU controllers on the
Mininet network simulator with and without HyPASS. The system performance is analyzed
for accuracy and efficiency in four different SDN scenarios categorized as fully OpenFlow
enabled and Hybrid. The proposed system discovers all the live hosts in the network, updates
Host Table at the handshaking between controller and OpenFlow switches. Experiments
show that the system prevented all the address-forged attacks by validating the source
E-mail: gajanan.sharma@gmail.com
§ E-mail: himanshu.manu.sharma@gmail.com
E-mail: rajneeshpareekjaipur@gmail.com
@ E-mail: gournidhi165@gmail.com
# E-mail: er.ravishankarsharma@gmail.com
* E-mail: ashucse007@gmail.com (Corresponding Author)
Journal of Discrete Mathematical Sciences & Cr yptography
ISSN 0972-0529 (Print), ISSN 2169-0065 (Online)
Vol. 24 (2021), No. 8, pp. 2221–2232
DOI : 10.1080/09720529.2021.2009192
2222
G. SHARMA, H. SHARMA, R. PAREEK, N. GOUR, R. S. SHARMA AND A. KUMAR
address in different SDN environments. It achieves a 99.99% filtering accuracy level in a fully
OpenFlow-enabled setup.
Subject Classification: 17B15.
Keywords: SDN, Dos attack, Open flow, Accuracy, HyPASS. POX & RYU.
1. Introduction
A business campus environment is made up of a set of interconnected
buildings through guided and unguided transmission media that link the
communication devices of the network and allow the transport of user
traffic. In a traditional business campus, the control plane is distributed
among all the devices on the network and requires their coordination to
decide how to treat the packets that enter their ports. This distributed
nature of the control plane forces network administrators to configure all
network devices each time a new application or policy is added to the
network, slowing provisioning and scalability of services in high-device
environments. In an SDN environment [1], one or more controllers are
responsible for operating and managing network traffic from a central
logical node. The SDN controller instructs the SDN devices the rules to
apply to packets circulating on the network based on the policies of an
organization. The deployment of SDN networks requires the application
of best practices and design principles that satisfy the design requirements
of organizations.
The definition of SDN is ‘unmounting control and packet transmission
planes in the network.’ It enables networks, through application
programming interfaces (APIs), to connect directly to applications, to
improve application performance and security and to provide a flexible,
dynamic network architecture that can be modified if desired. It is likely
that SDN is utilized as the most common form of application deployment,
so that companies may deploy their applications faster and reduce total
deployment and running expenses. IT administrators employing SDN
can centrally control and provide their network services. SDN uses open
APIs to maintain network monitoring, a network paradigm that provides
programmatic administration and control, and optimization of network
resources. This network control is generated when SDN disconnects the
network set-up and traffic engineering and separates it from the basic
hardware infrastructure. This division enables OpenFlow [2] and other
open protocols to be used. These open protocols can access network
SELF-HEALING TOPOLOGY FOR DDOS ATTACK IDENTIFICATION
2223
switches and routers that employ proprietary, otherwise locked firmware
on the periphery of the network using globally Knowledgeable control
of software. SDN allows users to virtualize their hardware and work to
construct a computer network by dividing the network into distinct plans:
the control plane and the data plane and early SDN deployment.
1.1
Traditional Network
Traditional networks are composed of static and various fixed
functions in the form of switches routers and other networking devices.
These devices are limited to per- form only specific functions in which
they are coded. If anyone wishes to change or alter their root configuration,
they cannot do that because of inflexibility and there- fore it is causing a
hurdle in the innovation. Traditional networks are making use of dedicated
hardware. Basically, the intelligence of the network (code and traffic trans-
mission rules) along with the underlying network infrastructure used
is encapsulated within the dedicated hardware. Fig. 1 is showing the
architectural view of traditional networks. In this architecture, it can be
seen that various network switches are comprised of control plane and data
plane. It is very difficult to configure every networking
device from different
vendors having varied configurations. Traditional network devices
such as
Network Address Translation (NAT)[3], load balancer, firewalls, switches,
routers, etc. are a vendor-specific and perform only dedicated functions, the
code these devices carry is very complex and hard to reconfigure. As far as
concerned with the configuration of these devices it is usually done by the
corresponding network administrators whereas the different interfaces are
provided by the multiple vendors.
2. Literature review
The Objective of software-defined networks is based on the removal
of the control avion from the data plane of the network. By abstracting
application control, network operation may be optimized by establishing
a programmable network. The control plane and the data plane are both
located in the conventional networks within the network device itself,
and in this case, it is up to the control plane of each node to know what
measures to take upon receiving a specific data transmission flow. The
IoT [4] changes everyone’s lives with capabilities like as managing and
monitoring connected intelligent products. IoT applications encompass
a wide range of services including clever towns, houses, vehicles,
2224
G. SHARMA, H. SHARMA, R. PAREEK, N. GOUR, R. S. SHARMA AND A. KUMAR
manufacturing, e-health, smart systems. The popularity of these devices
is growing quickly and a substantial amount of data for processing and
analysis has been created. Thus, these gadgets are not only susceptible to
different hazards and safety concerns and thus worry themselves not only
with their acceptance in sensitive settings such as e-home, smart house,
etc., but also present risks for the growth of IoT in the future days. This
study analyzes the dangers, safety demands, issues and attack vectors
of IoT networks in detail. On the basis of research, a new paradigm is
given, integrated by software networked IoT architectural use (SDN).
This paper provides an overview of SDN and an exhaustive examination
of centralized and decentralized IoT deployment techniques based on
SDN. In order to give a comprehensive overview of SDSec technology, we
have created further IoT security solutions based on SDN. Moreover, the
literature emphasizes basic problems that are key barriers to integrating
all IoT stakeholders on a single platform and few findings concentrating
on a network-based IoT security solution. Finally, there are some future
research opportunities for SDN-based IoT security systems.
With the growth and complexity of networks, administrative and
management difficulties are increasing. Software-defined networks
(SDNs) offer a possible solution to tackle some of these problems. In
this paper, Author [5] proposes a policy-based security architecture to
protect end-to-end services over various SDN domains. We propose a
language mechanism for defining security policies relating to the supply
and communication of SDN services. We describe the policies and their
application in the implementation of security policies in a multi-domain
SDN in order to govern the flow of information. The defined fine-grained
security policies are shown using a number of attributes, such as user and
device/switch parameters, context information such as the location and
routing of data, services used by the SDN, and security attributes linked to
switch and control domains. The ability to lay down road and flow-based
safety standards for safe end-to-end services in SDNs is a fundamental
element of our architecture. We assess the performance properties of our
design and discuss how our architecture might combat security risks. This
study adds to the dynamic approach of security policy and the intelligent
distribution of security capabilities as a layer for service, which allows
flow-based security enforcement and the protection of a wide variety of
network devices against attacks.
SELF-HEALING TOPOLOGY FOR DDOS ATTACK IDENTIFICATION
2225
3. Proposed Work
3.1 Software-Defined Network
The new architecture of the Software-Defined Network (SDN) is in the
limelight. It has diminished the advantages of traditional networks. The
separation of the control plane from the data plane has produced multiple
advantages and research directions. With the help of SDN, it has opened
up many advantages and functionalities. Network administrators [8] and
developers can easily configure existing applications such as firewalls, load
balances, etc. No more dedicated hardware dependency is there now. To
diminish the vendor specificity SDN has made use of OpenFlow switches
[9] and with the help of the same code and configuration, one can easily
manage the whole network.
3.2 DDoS Attack in SDN
All three layers of SDN architecture are vulnerable to DDoS attacks
[10]. There are many attacking points in it as shown in Fig. 1. The
following are the target points in SDN networks. OpenFlow switches: In
SDN OpenFlow switches are used to forward the traffic from source to
destination. It maintains a flow table in which the entry of various network
packets resides. When a new packet arrives SDN switch checks the entry
of the newly arrived packet in its flow table if the entry if found it directly
Figure 1
DDoS Attack in SDN
2226
G. SHARMA, H. SHARMA, R. PAREEK, N. GOUR, R. S. SHARMA AND A. KUMAR
sends the packet to the defined destination on the other hand if the entry
is not found in the flow table of SDN switch it initiates the packet_in event
and sends a request to the SDN controller to determine the route of the
corresponding packet .
The memory size of these flow tables of SDN switches is limited
Ternary Content-Addressable Memory (TCAM). If in a case, DDoS attacks
happen and OpenFlow switches are flooded with the number of new
packet entries due to the limited size the transmission will be delayed and
hence causing a big concern for security.
3.3 Attack Models:
This section uses the host detection system proposed in as IDH-SDN
and modified it as per HyPASS design requirements. We offer a proactive
host detection module for SDN setup and use SARP messages with hashed
MAC addresses to detect hosts in the network [13].
Algorithm 1: Host Detector
Implementation at: Switch Feature Event & Port Status Event
Input: Switch ID, Switch Port ID, ip Range with event message
procedure HOSTDETECTOR
if SwitchFeature or PortStatusNew or PortStatus Modity then
for j=1 to ipRange do // perform for IP range
Generate SARP-Request messages with DstMAC = Broadcast
MAC address, SrcMAC = Hashed MAC, SrcIP= “0.0.0.0” // source
address of SARP request packet
end for // end of switch ports range
else if PortStatusDelete then
delete from HostTable with SwichID, SwitchPortID
FLOWENTRYMANAGER (SwichID, SwitchPortID, DELETE)
end if
end procedure
The procedure HOSTDETECTOR of Algorithm 1 offers the discovery
of hosts’ details by implementing at a SwitchFeature & PortStatus[14]
events and taking inputs Switch ID & Port, ipRange, and event message.
The output of the algorithm is the generation of SARP-request messages
into setup. It helps to detect the host whenever we add a new host or switch
port, or switch to the network. It also works at a change of status of the
SELF-HEALING TOPOLOGY FOR DDOS ATTACK IDENTIFICATION
2227
switch port. HostDetector removes host details from the HostTable when a
host is leaving the network.
4. Result & Analysis
IP Spoofing: In Fig.2 & 3, the attacker host 10.0.0.2 (H2) pretends to be
the host 10.0.0.1(H1) or 10.0.0.4 (H4) and conducts an IP spoofing attack
to victim host 10.0.0.3(H3). If the network does not have any anti-spoofing
measure deployed, the H1 attacker could harm both the H3 destination
host & the H1 pretending host. In Fig.2, the attacker host 10.0.0.3 (H3) is
connected with a legacy switch, and it uses IP of H1 (10.0.0.1) or H2 (10.0.0.2)
to conduct an attack on the victim host H4 (10.0.0.4). In this way, the attacker
initiates the DoS attacks and harms the network services. MAC Spoofing:
These are also known as ARP spoofing attacks. In Fig. 2 & 3, the attacker
Figure 2
Attacker with OpenFlow switch in Fully SDN Scenario
Figure 3
Attacker with Open Flow switch in Hybrid SDN Scenario
2228
G. SHARMA, H. SHARMA, R. PAREEK, N. GOUR, R. S. SHARMA AND A. KUMAR
host H2 (IP:10.0.0.2 & MAC:00:00:00:00:02) pretends to be the host H2
(IP:10.0.0.1 & MAC:00:00:00:00:02) and conducts an ARP Request attack to
victim host H3 (IP:10.0.0.3 & MAC:00:00:00:00:03). The H1 attacker could
generate huge traffic of such packets and harm both the H3 destination
host & the H1 pretending host [15].
In Fig.4, the attacker host H3 (IP:10.0.0.3 & MAC:00:00:00:00:03) uses
MAC & IP of H1 (IP:10.0.0.1 & MAC:00:00:00:00:02) and conducts an attack
on victim host H4
(IP:10.0.0.4 & MAC:00:00:00:00:04). In this way, the attacker
initiates the DoS attacks
and harms the network services. The attacker also
conducts attacks by replying falsely with their own MAC and IP to other
host’s ARP requests and tries to gain illegitimate access to the data packets
of two host’s connection. This type of attack is called Man in the Middle
(MitM).
Host Detection: During testing of HyPASS, it detects connected hosts
of a selected network scenario and records host details in the HostTable.
Table 1 shows the sample data of the recognized hosts. We have verified
the HostTable data with the output of Wireshark. The result indicates
that HyPASS is discovering all the hosts and updating the HostTable. The
Hybrid SDN network shown in Fig. 4 has S3 and S8 legacy switches. The S3
has three hosts, i.e., H7 to H9, and S8 has H22 to H24. The S3 & S9 legacy
switches are connected through S2 & S9 SDN switches, respectively. In
italics, Table 1 shows the HostTable entries of the hosts connected with
legacy switches.
Filtering Accuracy: We use Scapy to generate several types & quantum
of traffic along with a specific rate of address forging packets. The security
controls developed for SDN are applied directly on the OFSwitches but
not on legacy switches (non- SDN Switches). Fig. 5 shows the filtering
Figure 4
Attacker with the non-SDN switch in Hybrid SDN Scenario
SELF-HEALING TOPOLOGY FOR DDOS ATTACK IDENTIFICATION
2229
accuracy of the system with POX and RYU controllers using four network
scenarios. It indicates that HyPASS’s filtering accuracy is 99.99% with both
the controllers. These network scenarios have all the OFSwitches.
S3 and S8 are legacy switches in the ‘Hybrid’ network scenario. The
address forged attack filtering accuracy in such hybrid topologies varies
because the SDN security policies are not applicable on legacy switches.
The SDN controller does not control the host’s traffic connected with
the host’s legacy switch, which may be linked with the same switch. If
an attacker (ex. H7) and victim hosts (ex. H8 & H9) are connected with
the same legacy switch, HyPASS does not detect and filter such attacks.
However, the attacker or victim or both are connected with OFSwitch in
Table 1
Host Table Data Sample of Network Scenario 4: Hybrid.
OpenFlow
Switch ID
OpenFlow Switch
Port ID Host MAC Host IP
S1
2 00:00:00:00:00:01 10.0.0.1
3 00:00:00:00:00:02 10.0.0.2
4 00:00:00:00:00:03 10.0.0.3
S2 2 00:00:00:00:00:04 10.0.0.4
3 00:00:00:00:00:05 10.0.0.5
4 00:00:00:00:00:06 10.0.0.6
5 00:00:00:00:00:07 10.0.0.7
00:00:00:00:00:08 10.0.0.8
00:00:00:00:00:09 10.0.0.9
…. …. …. ….
…. …. …. ….
S9 5 00:00:00:00:00:16 10.0.0.22
00:00:00:00:00:17 10.0.0.23
00:00:00:00:00:18 10.0.0.24
2 00:00:00:00:00:19 10.0.0.25
3 00:00:00:00:00:1a 10.0.0.26
4 00:00:00:00:00:1b 10.0.0.27
S10
2 00:00:00:00:00:1c 10.0.0.28
3 00:00:00:00:00:1d 10.0.0.29
4 00:00:00:00:00:1e 10.0.0.30
2230
G. SHARMA, H. SHARMA, R. PAREEK, N. GOUR, R. S. SHARMA AND A. KUMAR
a hybrid topology, then our technique detects & filters address forged
packets. Fig. 5 shows that attacker/victim/both are connected with
OFSwitch, then filtering accuracy for ‘Hybrid’ topology is 99.99%. In other
cases, it depends on the number of hosts connected with the legacy switch
and the number of spoofed packets created by the attacker for the victim
hosts connected on the same switch. In this mix mode test, our system
achieves more than 80% filtering accuracy.
Conclusion
This research describes the main components of an SDN architecture
including hardware components, software and protocols and design
considerations for deploying SDN networks in the enterprise campus
environment. Enterprise campus networks are limited to a set of buildings
or floors of a building interconnected by Ethernet networks. The discovery
process of HyPASS works with static IP addressing methods. The system
extracts host details from DHCP-Request and stores them into the binding
HostTable. On receiving the DHCP-Ack, it updates the IP detail in the
HostTable of related MAC address and installs necessary flow entry with
host details for successive DHCP-Request, DHCP-Release & DHCP-Ack.
Result Show That shows that attacker/victim/both are connected with
OFSwitch, then filtering accuracy for ‘Hybrid’ topology is 99.99%. In other
cases, it depends on the number of hosts connected with the legacy switch
Figure 5
SDN Deployment & Flow Generation Ratio
SELF-HEALING TOPOLOGY FOR DDOS ATTACK IDENTIFICATION
2231
and the number of spoofed packets created by the attacker for the victim
hosts connected on the same switch. In this mix mode test, our system
achieves more than 80% filtering accuracy.
References
[1] G. Chen, G. Hu, Y. Jiang, and C. Zhang, “SAVSH: IP source address
validation for SDN hybrid networks,” in 2016 IEEE Symposium on
Computers and Communication (ISCC), 2016, pp. 409–414.
[2] C. Zhang et al., “Towards a SDN-Based Integrated Architecture for
Mitigating IP Spoofing Attack,IEEE Access, vol. 6, pp. 22764–22777,
2017.
[3] S. Deng, X. Gao, Z. Lu, and X. Gao, “Packet injection attack and its
defense in software-defined networks,” IEEE Trans. Inf. Forensics
Secur., vol. 13, no. 3, pp. 695–705, 2018.
[4] Arora, Amandeep Singh, Barkha Bahl, and Linesh Raja. “Diverse
real-time attack traffic forecasting for cloud platforms.Journal of
Discrete Mathematical Sciences and Cryptography 22.4 (2019): 541-555..
[5] A. S. Alshra’a and J. Seitz, “Using INSPECTOR Device to Stop Packet
Injection Attack in SDN,” IEEE Commun. Lett., vol. 23, no. 7, pp. 1174–
1177, 2019.
[6] B. Liu, J. Bi, and Y. Zhou, “Source address validation in software
defined networks,” in SIGCOMM 2016 - Proceedings of the 2016 ACM
Conference on Special Interest Group on Data Communication, 2016, no.
Dc, pp. 595–596.
[7] R. C. Meena, M. Nawal, and M. M. Bundele, “SIPAV-SDN: Source
internet protocol address validation for software defined network,”
Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 12, 2019.
[8] Kumar, Ankit, et al. “An improved quantum key distribution
protocol for verification.” Journal of Discrete Mathematical Sciences and
Cryptography 22.4 (2019): 491-498.
[9] P. Manzanares-Lopez, J. P. Muñoz-Gea, F. M. Delicado-Martinez, J.
Malgosa-Sanahuja, and A. F. De La Cruz, “Host discovery solution:
An enhancement of topology discovery in OpenFlow based SDN
networks,” in ICETE 2016 - Proceedings of the 13th International Joint
Conference on e-Business and Telecommunications, 2016, vol. 1, no. Icete,
pp. 80–88.
2232
G. SHARMA, H. SHARMA, R. PAREEK, N. GOUR, R. S. SHARMA AND A. KUMAR
[10] R. C. Meena, M. Nawal, and M. Bundele, “Instant detection of host in
SDN (IDH-SDN),” Int. J. Recent Technol. Eng., vol. 8, no. 3, pp. 5603–
5608, Sep. 2019.
[11] F. Pakzad, M. Portmann, W. L. Tan, and J. Indulska, “Efficient topology
discovery in OpenFlow-based Software Defined Networks,” Comput.
Commun., vol. 77, pp. 52–61, 2016.
[12] G. Tarnaras, E. Haleplidis, and S. Denazis, “SDN and ForCES based
optimal network topology discovery,” in 1st IEEE Conference on
Network Softwarization: Software-Defined Infrastructures for
Networks, Clouds, IoT and Services, NETSOFT 2015, 2015.
[13] L. Ochoa-Aday, C. Cervello-Pastor, and A. Fernandez-Fernandez,
“Self-healing topology discovery protocol for software-defined
networks, IEEE Commun. Lett., vol. 22, no. 5, pp. 1070–1073, 2018.
[14] Y. Jiménez, C. Cervelló-Pastor, and A. García, “Dynamic resource
discovery protocol for software defined networks,” IEEE Commun.
Lett., vol. 19, no. 5, pp. 743–746, 2015.
Article
A mobile ad hoc network (MANETs) is a collection of moving nodes that combine into a network with no predefined infrastructure. There are many types of attacks that could target MANETS, one among them is Distributed Denial of service attacks (DDoS). DDoS is defined as attacking routing functions and taking down the entire operation of the mobile ad hoc network. The two primary victims of DDoS attacks are the functions of routing and battery capacity. The DDoS attack can cause routing table overflow which in turn can potentially cause the infected node floods. The routing overflow is followed by creating a fake route packet to consume the available resources of the participating active nodes. This cause disrupts the normal functioning of legitimate routes. In recent years, different approaches are implemented to improve the security level of MANET. In this work, the Cuckoo Search Algorithm-based Modified Elman’s Neural Network (CSA - MENN) approaches have been proposed to overcome DDoS attacks. The CSA - MENN approaches consists of three-part which are Cuckoo search algorithm clustering area to enhance the route from source to destination, chaos theory module is used to detect the abnormal nodes, then the Modified Elman Neural Network (MENN) is employed to prevent a malicious node from sending data to the destination by determining node that consumed more resources. Packets could be lost or the victim could reset the path between the attacker and itself. CICIDS dataset has been used to test and evaluate the performance of the proposed approach based on the criteria of accuracy, packet loss, and jitter. The data set, CICIDS 2017, used in this article divides the data into 7 groups: 5 for training, 1 for validation, and 1 for generalization. In summary, approximately 71.4 percent of data is used for training and 28.6 percent for validation and generalization.
Article
There has never been a time when the volume and complexity of data travelling through modern networks have increased rapidly, but the Internet of Things has played a significant role in this rise. This will result in a significant increase in traffic directed to data centres for processing. This increase in traffic directly impacts the response time of IoT devices, which may be undesirable in sensitive environments such as hospitals. We want to look at a modern computing paradigm known as Edge Computing, which brings some of the analytical and processing resources, that cloud platforms now have, to the point where data is generated, reducing the amount of data generated. This information must be communicated to the network, and the system’s response time must be improved.
Article
Full-text available
To enhance the security choices in transmission of information over the web, various methods such as cryptography, steganography and digital watermarking have been developed. Visual cryptography has developed in the past decade as an entity that splits the information into two parts in order to complete integration. This system is also secured in a lesser quantity. In this paper a secret message multi-share method is used. In the proposed work input picture is divided into eight portions. The eight portions shares are encrypted before embedding the image in the patchwork image, photo sharing and the image retrieved is the same as the hidden starting image. Results show that the proposed method has optimized the optimal time by 8%, improved PSNR by 11% and lower overhead communication.
Research
Full-text available
SDN technology is becoming every day more popular and big data centers and organizational networks have started deploying for its advantages. Current development of SDN network relies on target host IP address of packet and OFSwitches ignores checking of source host IP. SDN has separated control planes and data planes and OpenFlow protocol enabled switches are used as packet forwarding devices. The SDN controller controls flow of data packet through forwarding devices and when these are turned on, do not have any control and defense. The devices are not able to handle packet arriving from connected host. In this case, data packets of hosts are sent to the controller forwarding device for inspection and control packet creation for data packet and setting up required matching entries in flow table of forwarding device for such type of data packets generated by the hosts. The attackers can generate packets with Spoofed source IP address and perform various types of attacks. In this research paper, we offer a scheme as Source IP Address Validation for Software Defined Network (SIPAV-SDN) to check packet's source host IP address by binding source host IP Address and MAC address with switch port. It maintains a HostTable at Controller for verification of source host IP and MAC with switch port and only forwards the packets which have valid sources host IP address. We also simulated SIPAV-SDN with hybrid SDN network and experiment results have shown that it achieved 100% packet filtering accuracy for IP spoofed TCP, UDP and ICMP packet attacks. We used python programming language for RYU controller in Mininet network emulator.
Research
Full-text available
SDN features are making it more popular day by day: centralized monitoring, control of network equipments, increased performance and flexibility in designing network policies as per organization requirements. The SDN controller deals with data & control plane separately. The SDN switches are simply data forwarding devices and controller decides control over forwarding data through them. Controller has a technique to identify the network switch and router nodes; but it does not identify the presence of hosts before they generated network traffic and is not able to create the packet forwarding rules, security policies. The objective of this paper is to detect connected host before they generate any traffic and store host details at controller level for future researches in area of development of new network tools, applications, optimizations techniques and security. Here, we propose Instant Detection of Host in SDN (IDH-SDN) to detect host before transmission of any data packet and store host details in a HostTable at controller level. In our experiment, various network topologies have been used to test host detection and data collection algorithm and results of all experiments verified with Wireshark network packet analyzer. The HostTable data may be used for various purposes such as development of new network tools, policies, security approaches in OpenFlow network.
Article
Full-text available
This letter presents the design of a self-healing protocol for automatic discovery and maintenance of the network topology in Software Defined Networks (SDN). The proposed protocol integrates two enhanced features (i.e. layer 2 topology discovery and autonomic fault recovery) in a unified mechanism. This novel approach is validated through simulation experiments using OMNET++. Obtained results show that our protocol discovers and recovers the control topology efficiently in terms of time and message load over a wide range of generated networks.
Article
Full-text available
Current Internet packet delivery only relies on packet’s destination IP address and forwarding devices neglect the validation of packet’s IP source address, it makes attackers can leverage this flaw to launch attacks with forged IP source address so as to meet their vicious purposes and avoid to be tracked. In order to mitigate this threat and enhance Internet accountability, many solutions have been proposed either from the intra-domain or the inter-domain aspects. However, most of them faced with some issues hard to cope with, e.g., low filtering rates, high deployment cost. And most importantly, few of them can cover both intra-domain and inter-domain areas at the same time. With the central control and edge response pattern, the novel network architecture of Software Defined Networking (SDN) possess whole network intelligence and distribute control rules directly to edged SDN switches, which brings a good opportunity to solve the IP spoofing problem. By taking advantage of SDN, in this paper, we propose an SDN-based Integrated IP Source Address Validation Architecture (ISAVA) which can cover both intra- and inter-domain areas and effectively lower SDN devices deployment cost, while achieve desirable control granularities in the meantime. Specifically, within Autonomous System (AS), ISAVA relies on an SDN incremental deployment scheme which can achieve IP prefix (subnet)-level validation granularity with minimum SDN devices deployment. While among ASes, ISAVA sets up border server and establishes a vouch mechanism between allied ASes for signing outbound packets so as to achieve AS-level validation granularity. Finally, conducted experiments confirm that ISAVA intra-domain scheme can get beyond 90% filtering rates with only 10% deployment in average, while the inter-domain scheme can get high filtering rates with low system cost and less storage usage.
Article
Full-text available
Software-Defined Networking (SDNs) are novel networking architectures that decouple the network control and forwarding functions from the data plane. Unlike traditional networking, the control logic of SDNs is implemented in a logically centralized controller which provides a global network view and open programming interface to the applications. While SDNs have become a hot topic among both academia and industry in recent years, little attention has been paid on the security aspect. In this paper, we introduce a novel attack, namely packet injection attack, in SDNs. By maliciously injecting manipulated packets into SDNs, attackers can affect the services and networking applications in the control plane, and largely consume the resources in the data plane. The consequences could be the disruption of applications built on the top of the topology manager service and Rest API, as well as a huge consumption of network resources such as the bandwidth of the OpenFlow channel. To defend against the packet injection attack, we present PacketChecker, a lightweight extension module on SDN controllers to effectively detect and mitigate the flooding of falsified packets. We implement a prototype of PacketChecker in Floodlight controller and conduct experiments to evaluate the efficiency of the defense mechanism. The evaluation shows that the PacketChecker module can effectively mitigate the attack with a minor overhead to the SDN controller.
Article
Rapidly mounting Distributed Denial of Service bouts is a fatal menace to cloud platforms. Automatic exposure and mitigation techniques are primary defense mechanisms. Identification of attack activities from legitimate network traffic by conventional network traffic monitoring systems are based on statistics. Conventional machine learning techniques are limited with current representational models. In this paper we propose a comparative analysis of hybrid deep learning algorithms and model development for prediction of diverse real-time distributed denial of service attacks. Hybrid deep learning algorithm is a quite effective way of detection and prevention. In this paper, algorithms of machine learning have been evaluated for performance and detection accuracies. We also compare machine learning and deep learning technology used to build forecast on time series ddos data. DDOS data will be provided to produce a forecasting model for prediction of denial of service attacks. This forecast model will be compared with our hybrid model to identify optimal deep learning model for real-time attack traffic detection and mitigation.
Article
Facts say that practical cryptographic systems are now within the range. Quantum cryptography generally gives the solution which uses the various methods of polarization to leave the transmitted data undisturbed. In this work we try to improve the data security by increase the key size shared between parties involved used in quantum cryptography. Quantum cryptography uses storing the split particles involved and then measuring them and creating what they use, eliminating the problem of unsafe storage.
Article
The Software-Defined Network (SDNs) architecture can easily be attacked by a malicious user in order to prevent an acceptable level of service. Therefore, SDN security is a hot research topic to improve the SDN architecture and to protect the service level of the SDN components. In this paper, the INSPECTOR is a hardware device added to the SDN architecture to protect a compromised controller from a packet injection attack by verifying the authentication of Packet-In Messages accessing network resources. With simulations, we show that this INSPECTOR device efficiently stops the attack and enhances the controller performance under malicious attack.