skip to main content
10.1145/3050220.3050225acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Piggybacking Network Functions on SDN Reactive Routing: A Feasibility Study

Published:03 April 2017Publication History

ABSTRACT

This paper explores the potential of enabling SDN security and monitoring services by piggybacking on SDN reactive routing. As a case study, we implement and evaluate a piggybacking based intrusion prevention system called SDN-Defense. Our study of university WiFi traffic traces reveals that up to 73% of malicious flows can be detected by inspecting just the first three packets of a flow, and 90% of malicious flows from the first four packets. Using such empirical insights, we propose to forward the first K packets of each new flow to an augmented SDN controller for security inspection, where K is a dynamically configurable parameter. We characterize the cost-benefit trade-offs of SDN-Defense using real wireless traces and discuss potential scalability issues. Finally, we discuss other applications which can be enhanced by using our proposed piggybacking approach.

References

  1. Barefoot networks: https://www.barefootnetworks.com/technology/.Google ScholarGoogle Scholar
  2. Cbench: an OpenFlow controller benchmarker. https://github.com/mininet/oflops/tree/master/cbench.Google ScholarGoogle Scholar
  3. Netronome: https://www.netronome.com.Google ScholarGoogle Scholar
  4. Pox: https://github.com/noxrepo/pox.Google ScholarGoogle Scholar
  5. Snort: https://snort.org.Google ScholarGoogle Scholar
  6. L Bernaille, R Teixeira, and K Salamatian. Early application identification. In Proceedings of the 2006 ACM CoNEXT conference, page 6. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Bernaille et al. Traffic classification on the fly. ACM SIGCOMM Computer Communication Review, 36(2):23--26, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Giotis et al. Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on sdn environments. Computer Networks, 62:122--136, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Le et al. Traffic dispersion graph based anomaly detection. In Proceedings of the Second Symposium on Information and Communication Technology, pages 36--41. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Liao et al. Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1):16--24, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Xing et al. Sdnips: Enabling software-defined networking based intrusion prevention system in clouds. In 10th International Conference on Network and Service Management (CNSM) and Workshop, pages 308--311. IEEE, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  12. Yoon et al. Enabling security functions with sdn: A feasibility study. Computer Networks, 85:19--35, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C Liu, A Raghuramu, C-N Chuah, and B Krishnamurthy. Piggybacking network functions on sdn reactive routing: A feasibility study. https://www.dropbox.com/s/5gi0toqqkd89lt4/piggybacking-network-functions-v10.pdf?dl=0, 2016.Google ScholarGoogle Scholar
  14. S Mehdi, J Khalid, and S Khayam. Revisiting traffic anomaly detection using software defined networking. In Recent Advances in Intrusion Detection, pages 161--180. Springer, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A Papadogiannakis, M Polychronakis, and E Markatos. Improving the accuracy of network intrusion detection systems under load using selective packet discarding. In Proceedings of the Third European Workshop on System Security, pages 15--21. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Y. Wang, C. Orapinpatipat, H. Gharakheili, et al. Telescope: Flow-level Video Telemetry using SDN. In Proc. of EWSDN, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  1. Piggybacking Network Functions on SDN Reactive Routing: A Feasibility Study

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SOSR '17: Proceedings of the Symposium on SDN Research
      April 2017
      211 pages
      ISBN:9781450349475
      DOI:10.1145/3050220

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 April 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate7of43submissions,16%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader