DocumentCode
265675
Title
Implications and detection of DoS attacks in OpenFlow-based networks
Author
Hommes, Stefan ; State, Radu ; Engel, Thomas
Author_Institution
SnT 4, Univ. of Luxembourg, Luxembourg, Luxembourg
fYear
2014
fDate
8-12 Dec. 2014
Firstpage
537
Lastpage
543
Abstract
In this paper, we address the potential of centralised network monitoring based on Software-Defined Networking with OpenFlow. Due to the vulnerability of the flow table, which can store only a limited number of entries, we discuss and show the implications for a DoS attack on a testbed consisting of OpenFlow enabled network devices. Such an attack can be detected by analysing variations in the logical topology, using techniques from information theory that can run as a network service on the network controller.
Keywords
computer network security; information theory; software defined networking; topology; DoS attack; OpenFlow enabled network devices; centralised network monitoring; flow table; information theory; logical topology; network controller; network service; software-defined networking; Computer crime; Monitoring; Network topology; Ports (Computers); Switches; Topology;
fLanguage
English
Publisher
ieee
Conference_Titel
Global Communications Conference (GLOBECOM), 2014 IEEE
Conference_Location
Austin, TX
Type
conf
DOI
10.1109/GLOCOM.2014.7036863
Filename
7036863
Link To Document