Efficient Forwarding Anomaly Detection in Software-Defined Networks
نویسندگان
چکیده
Data centers, the critical infrastructure underpinning Cloud computing, often employ Software-Defined Networks (SDN) to manage cluster, wide-area and enterprise networks. As network forwarding in SDN is dynamically programmed by controllers, it crucial ensure that controller intent correctly translated into underlying rules. Therefore, detecting locating anomalies a fundamental problem production Existing research proposals, roughly categorized probing-based, packet piggybacking-based, flow statistics analysis-based, either impose significant overhead or do not provide sufficient coverage for certain anomalies. In this article, we propose ${\sf FADE}$ , controllable passive measuring scheme simultaneously deliver detection efficiency accuracy. first analyzes entire topology rules, then computes minimal set of flows can cover all For each selected flow, decides optimal number monitoring positions on its path (much less than total hops), installs dedicated rules collect statistics. controls installation expiration these along with unique labels, guarantee accuracy collected statistics, based which algorithmically whether anomaly detected, if so further locates anomaly. On top iFADE}$ (a more scalable version ) optimize usage deployment measurement achieves over 40 percent rule reduction compared . We implement prototype both about 12000 lines code evaluate extensively. The experiment results demonstrate (i)}$ are accurate, e.g., they achieve 95 true positive rate 99 negative detection; (ii)}$ lightweight, reduce control messages state-of-the-art 50 90 percent, respectively.
منابع مشابه
Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks
Software-defined networking (SDN) is a new paradigm that allows developing more flexible network applications. SDN controller, which represents a centralized controlling point, is responsible for running various network applications as well as maintaining different network services and functionalities. Choosing an efficient intrusion detection system helps in reducing the overhead of the runnin...
متن کاملComputing backup forwarding rules in Software-Defined Networks
The past century of telecommunications has shown that failures in networks are prevalent. Although much has been done to prevent failures, network nodes and links are bound to fail eventually. Failure recovery processes are therefore needed. Failure recovery is mainly influenced by (1) detection of the failure, and (2) circumvention of the detected failure. However, especially in SDNs where con...
متن کاملRevisiting Traffic Anomaly Detection Using Software Defined Networking
Despite their exponential growth, home and small office/home office networks continue to be poorly managed. Consequently, security of hosts in most home networks is easily compromised and these hosts are in turn used for largescale malicious activities without the home users’ knowledge. We argue that the advent of Software Defined Networking (SDN) provides a unique opportunity to effectively de...
متن کاملPrivacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks
Monday December 7 08:00-09:00 Registration (3rd Floor Grand Ballroom, GRAND GONGDA JIANGUO HOTEL of Beijing University of Technology) 09:00-09:15 Open remarks 09:15-10:05 Keynote 1 Robert Deng (Singapore Management University) 10:05-10:55 Keynote 2 Wenchang Shi (Renmin University) 10:55-11:15 Tea & Coffee Break 11:15-12:05 Keynote 3 Rob Spiger (Microsoft) 12:05-13:30 Lunch 13:30-15:00 Session 1...
متن کاملDesign an Efficient Community-based Message Forwarding Method in Mobile Social Networks
Mobile social networks (MSNs) are a special type of Delay tolerant networks (DTNs) in which mobile devices communicate opportunistically to each other. One of the most challenging issues in Mobile Social Networks (MSNs) is to design an efficient message forwarding scheme that has a high performance in terms of delivery ratio, latency and communication cost. There are two different approaches fo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Parallel and Distributed Systems
سال: 2021
ISSN: ['1045-9219', '1558-2183', '2161-9883']
DOI: https://doi.org/10.1109/tpds.2021.3068135