Affiliation:
1. School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin 541004, China
Abstract
SDN is a modern internet architecture that has transformed the traditional internet structure in recent years. By segregating the control and data planes of the network, SDN facilitates centralized management, scalability, dynamism, and programmability. However, this very feature makes SDN controllers vulnerable to cyber attacks, which can cause network-wide crashes, unlike conventional networks. One of the most stealthy attacks that SDN controllers face is the relay link forgery attack in topology deception attacks. Such an attack can result in erroneous overall views for SDN controllers, leading to network functionality breakdowns and even crashes. In this article, we introduce the Relay Link Forgery Attack detection model based on the Transformer deep learning model for the first time. The model (RLFAT) detects relay link forgery attacks by extracting features from network flows received by SDN controllers. A dataset of network flows received by SDN controllers from a large number of SDN networks with different topologies was collected. Finally, the Relay-based Link Forgery Attack detection model was trained on this dataset, and its performance was evaluated using accuracy, recall, F1 score, and AUC metrics. For better validation, comparative experiments were conducted with some common deep learning models. The experimental results show that our proposed model (RLFAT) has good performance in detecting RLFA and outperforms other models.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference31 articles.
1. Software-Defined Networking: A Comprehensive Survey;Kreutz;Proc. IEEE,2014
2. A method of OpenFlow-based real-time conflict detection and resolution for SDN access control policies;Wang;Chin. J. Comput.,2015
3. Research on SDN Topology Attack and Its Defense Mechanism;Lu;J. South China Univ. Technol. (Nat. Sci. Ed.),2020
4. Comparative Analysis of Control Plane Security of SDN and Conventional Networks;Abdou;IEEE Commun. Surv. Tutor.,2018
5. Hong, S., Xu, L., Wang, H., and Gu, G. (2015, January 8–11). Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures. Proceedings of the Network & Distributed System Security Symposium, San Diego, CA, USA.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献