Detection as a service: An SDN application

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

19 Citations (Scopus)

Abstract

In a cloud computing environment, future networks will most probably utilize network functions virtualization (NFV) which is a network architecture concept that proposes virtualizing network node functions into 'building blocks' or entities that may be operationally connected or linked together to provide services. However, applying these mechanisms brings security challenges. Due to the programmability of software defined networking (SDN), if attackers gain access to an SDN controller, then the whole network may be exploited by the attackers. The attackers may change forwarding paths and pass malicious traffic to infect the SDN enabled network. To detect the security attacks and malicious traffic early enough and to protect the network, centralized monitoring and intrusion detection system (IDS) monitoring may be used for enhancing SDN, NFV and OpenFlow security. If the network traffic is analysed and the anomalies are detected, the SDN controller may be used to block such traffic from passing through the network by flow control, i.e. forwarding paths in a switch. IDS and intrusion prevention system (IPS) may be deployed at the gateway node to detect a security intrusion. Thus, the data traffic originated from a subscriber passes through each network element until the traffic reaches the gateway node. Such traffic may attack the network elements and may also cause a denial of service (DoS) attack in the network. IDS devices are designed to handle network traffic in real time, yet the cost and high processing time is a challenge for handling the traffic load. Combining dynamicity and programmability of SDN together with traffic filtering of IDS, enables a scalable, redundant and reliable anomaly detection for mobile network operators. In this study, we propose an architecture that combines IDS with programmability features of SDN for detection and mitigation of malicious traffic. Mitigation will be performed by SDN controller using flow control techniques. The proposed architecture can be applied to an SDN enabled mobile network with two different approaches for improved performance in terms of computation power.

Original languageEnglish
Title of host publication19th International Conference on Advanced Communications Technology: Opening Era of Smart Society, ICACT 2017 - Proceeding
PublisherIEEE
Pages285-290
Number of pages6
ISBN (Electronic)9788996865094
DOIs
Publication statusPublished - 29 Mar 2017
MoE publication typeA4 Article in a conference publication
EventInternational Conference on Advanced Communications Technology - Pyeongchang, Korea, Republic of
Duration: 19 Feb 201722 Feb 2017
Conference number: 19

Conference

ConferenceInternational Conference on Advanced Communications Technology
Abbreviated titleICACT
Country/TerritoryKorea, Republic of
CityPyeongchang
Period19/02/201722/02/2017

Keywords

  • Anomaly detection
  • Cloud
  • Controller
  • DaaS
  • IDS
  • OpenFlow
  • SDN
  • Security

Fingerprint

Dive into the research topics of 'Detection as a service: An SDN application'. Together they form a unique fingerprint.

Cite this