• DocumentCode
    265675
  • Title

    Implications and detection of DoS attacks in OpenFlow-based networks

  • Author

    Hommes, Stefan ; State, Radu ; Engel, Thomas

  • Author_Institution
    SnT 4, Univ. of Luxembourg, Luxembourg, Luxembourg
  • fYear
    2014
  • fDate
    8-12 Dec. 2014
  • Firstpage
    537
  • Lastpage
    543
  • Abstract
    In this paper, we address the potential of centralised network monitoring based on Software-Defined Networking with OpenFlow. Due to the vulnerability of the flow table, which can store only a limited number of entries, we discuss and show the implications for a DoS attack on a testbed consisting of OpenFlow enabled network devices. Such an attack can be detected by analysing variations in the logical topology, using techniques from information theory that can run as a network service on the network controller.
  • Keywords
    computer network security; information theory; software defined networking; topology; DoS attack; OpenFlow enabled network devices; centralised network monitoring; flow table; information theory; logical topology; network controller; network service; software-defined networking; Computer crime; Monitoring; Network topology; Ports (Computers); Switches; Topology;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Global Communications Conference (GLOBECOM), 2014 IEEE
  • Conference_Location
    Austin, TX
  • Type

    conf

  • DOI
    10.1109/GLOCOM.2014.7036863
  • Filename
    7036863