Skip to main content
Erschienen in: International Journal of Information Security 2/2021

02.05.2020 | Regular Contribution

An SDN approach to detect targeted attacks in P2P fully connected overlays

verfasst von: Cristóbal Medina-López, L. G. Casado, Vicente González-Ruiz, Yuansong Qiao

Erschienen in: International Journal of Information Security | Ausgabe 2/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Pollution attacks are one of the major concerns facing P2P networks. They have a tremendous impact on push-based fully connected overlays, in which each peer receives an exclusive chunk from the source and is also the only one responsible for relaying it to the rest of the peers. In this study, we propose a novel technique to identify and expel malicious peers which involves using trusted peers, software-defined networking (SDN) and proactive moving target defense. Experiments to obtain the accuracy and effectiveness of the implemented methods, as well as an analysis of the performance concerns, were carried out through simulation using a Mininet network emulator. The experiments demonstrate the feasibility of our proposal, which provides high rates of detection, not only in pure SDN environments but also in mixed ones.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
TPs are able to verify whether a message is legitimate or missing, and they will report any bad behavior if necessary.
 
2
The full version of the code is available as open source at https://​github.​com/​P2PSP/​SDN-P2P.
 
3
In this discussion, the ports of the EPs have been ignored for the sake of simplicity.
 
Literatur
1.
Zurück zum Zitat Selcuk, A.A., Uzun, E., Pariente, M.R.: A reputation-based trust management system for p2p networks. In: IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004, pp. 251–258. IEEE (2004) Selcuk, A.A., Uzun, E., Pariente, M.R.: A reputation-based trust management system for p2p networks. In: IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004, pp. 251–258. IEEE (2004)
2.
Zurück zum Zitat Marti, S., Garcia-Molina, H.: Limited reputation sharing in p2p systems. In: Proceedings of the 5th ACM Conference on Electronic Commerce, pp. 91–101. ACM (2004) Marti, S., Garcia-Molina, H.: Limited reputation sharing in p2p systems. In: Proceedings of the 5th ACM Conference on Electronic Commerce, pp. 91–101. ACM (2004)
3.
Zurück zum Zitat Su, X., Dhaliwal, S.K.: Incentive mechanisms in p2p media streaming systems. IEEE Internet Comput. 14(5), 74–81 (2010)CrossRef Su, X., Dhaliwal, S.K.: Incentive mechanisms in p2p media streaming systems. IEEE Internet Comput. 14(5), 74–81 (2010)CrossRef
4.
Zurück zum Zitat Wang, E.K., Li, Y., Ye, Y., Yiu, S.M., Hui, L.C.K.: A dynamic trust framework for opportunistic mobile social networks. IEEE Trans. Netw. Serv. Manag. 15(1), 319–329 (2018)CrossRef Wang, E.K., Li, Y., Ye, Y., Yiu, S.M., Hui, L.C.K.: A dynamic trust framework for opportunistic mobile social networks. IEEE Trans. Netw. Serv. Manag. 15(1), 319–329 (2018)CrossRef
5.
Zurück zum Zitat Medina-López, C., González-Ruiz, V., Casado, L.G.: On mitigating pollution and free-riding attacks by shamir’s secret sharing in fully connected p2p systems. In: 2017 13th International on Wireless Communications and Mobile Computing Conference (IWCMC), pp. 711–716. IEEE (2017) Medina-López, C., González-Ruiz, V., Casado, L.G.: On mitigating pollution and free-riding attacks by shamir’s secret sharing in fully connected p2p systems. In: 2017 13th International on Wireless Communications and Mobile Computing Conference (IWCMC), pp. 711–716. IEEE (2017)
6.
Zurück zum Zitat Medina-López, C., Shakirov, I., Casado, L.G., González-Ruiz, V.: On pollution attacks in fully connected P2P networks using trusted peers. In: Intelligent Systems Design and Applications, pp. 144–153, Springer, Cham, Porto (2017) Medina-López, C., Shakirov, I., Casado, L.G., González-Ruiz, V.: On pollution attacks in fully connected P2P networks using trusted peers. In: Intelligent Systems Design and Applications, pp. 144–153, Springer, Cham, Porto (2017)
8.
Zurück zum Zitat Yang, S., Jin, H., Li, B., Liao, X.: A modeling framework of content pollution in peer-to-peer video streaming systems. Comput. Netw. 53(15), 2703–2715 (2009)CrossRef Yang, S., Jin, H., Li, B., Liao, X.: A modeling framework of content pollution in peer-to-peer video streaming systems. Comput. Netw. 53(15), 2703–2715 (2009)CrossRef
9.
Zurück zum Zitat Markowitch, O., Roggeman, Y.: Probabilistic non-repudiation without trusted third party. Second Conf. Secur. Commun. Netw. 99, 25–36 (1999) Markowitch, O., Roggeman, Y.: Probabilistic non-repudiation without trusted third party. Second Conf. Secur. Commun. Netw. 99, 25–36 (1999)
10.
Zurück zum Zitat Wang, C., Lu, Z.: Cyber deception: overview and the road ahead. IEEE Secur. Priv. 16(2), 80–85 (2018)CrossRef Wang, C., Lu, Z.: Cyber deception: overview and the road ahead. IEEE Secur. Priv. 16(2), 80–85 (2018)CrossRef
11.
Zurück zum Zitat Albanese, M., Huang, D.: MTD 2018: 5th ACM workshop on moving target defense (MTD). In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS ’18, pp. 2175–2176. ACM (2018) Albanese, M., Huang, D.: MTD 2018: 5th ACM workshop on moving target defense (MTD). In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS ’18, pp. 2175–2176. ACM (2018)
12.
Zurück zum Zitat Zheng, J., Namin, A.S.: A survey on the moving target defense strategies: an architectural perspective. J. Comput. Sci. Technol. 34(1), 207–233 (2019)CrossRef Zheng, J., Namin, A.S.: A survey on the moving target defense strategies: an architectural perspective. J. Comput. Sci. Technol. 34(1), 207–233 (2019)CrossRef
13.
Zurück zum Zitat Zhou, X., Lu, Y., Wang, Y., Yan, X.: Overview on moving target network defense. In: 2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC), pp. 821–827 (2018) Zhou, X., Lu, Y., Wang, Y., Yan, X.: Overview on moving target network defense. In: 2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC), pp. 821–827 (2018)
14.
Zurück zum Zitat Antonatos, S., Akritidis, P., Markatos, E.P., Anagnostakis, K.G.: Defending against hitlist worms using network address space randomization. Comput. Netw. 51(12), 3471–3490 (2007)CrossRef Antonatos, S., Akritidis, P., Markatos, E.P., Anagnostakis, K.G.: Defending against hitlist worms using network address space randomization. Comput. Netw. 51(12), 3471–3490 (2007)CrossRef
15.
Zurück zum Zitat Jafarian, J.H., Al-Shaer, E., Duan, Q.: Openflow random host mutation: transparent moving target defense using software defined networking. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, pp. 127–132. ACM (2012) Jafarian, J.H., Al-Shaer, E., Duan, Q.: Openflow random host mutation: transparent moving target defense using software defined networking. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, pp. 127–132. ACM (2012)
16.
Zurück zum Zitat Cai, G., Wang, B., Wang, X., Yuan, Y., Li, S.: An introduction to network address shuffling. In: 2016 18th International Conference on Advanced Communication Technology (ICACT), pp. 185–190. IEEE (2016) Cai, G., Wang, B., Wang, X., Yuan, Y., Li, S.: An introduction to network address shuffling. In: 2016 18th International Conference on Advanced Communication Technology (ICACT), pp. 185–190. IEEE (2016)
18.
Zurück zum Zitat McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: Openflow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69–74 (2008)CrossRef McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: Openflow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69–74 (2008)CrossRef
19.
Zurück zum Zitat Green, M., MacFarland, D.C., Smestad, D.R., Shue, C.A.: Characterizing network-based moving target defenses. In: Proceedings of the Second ACM Workshop on Moving Target Defense, pp. 31–35. ACM (2015) Green, M., MacFarland, D.C., Smestad, D.R., Shue, C.A.: Characterizing network-based moving target defenses. In: Proceedings of the Second ACM Workshop on Moving Target Defense, pp. 31–35. ACM (2015)
20.
Zurück zum Zitat MacFarland, D.C., Shue, C.A.: The sdn shuffle: creating a moving-target defense using host-based software-defined networking. In: Proceedings of the Second ACM Workshop on Moving Target Defense, pp. 37–41. ACM (2015) MacFarland, D.C., Shue, C.A.: The sdn shuffle: creating a moving-target defense using host-based software-defined networking. In: Proceedings of the Second ACM Workshop on Moving Target Defense, pp. 37–41. ACM (2015)
21.
Zurück zum Zitat Pfaff, B., Lantz, B., Heller, B., Barker, C., Beckmann, C., Cohn, D., Talayco, D., Erickson, D., McDysan, D., Ward, D., et al.: Openflow switch specification v1.3.1 (2012) Pfaff, B., Lantz, B., Heller, B., Barker, C., Beckmann, C., Cohn, D., Talayco, D., Erickson, D., McDysan, D., Ward, D., et al.: Openflow switch specification v1.3.1 (2012)
22.
Zurück zum Zitat Killi, B.P.R., Rao, S.V.: Capacitated next controller placement in software defined networks. IEEE Trans. Netw. Serv. Manag. 14(3), 514–527 (2017)CrossRef Killi, B.P.R., Rao, S.V.: Capacitated next controller placement in software defined networks. IEEE Trans. Netw. Serv. Manag. 14(3), 514–527 (2017)CrossRef
23.
Zurück zum Zitat Lantz, B., Heller, B., McKeown, N.: A network in a laptop: rapid prototyping for software-defined networks. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, Hotnets-IX, pp. 19:1–19:6. ACM, New York (2010) Lantz, B., Heller, B., McKeown, N.: A network in a laptop: rapid prototyping for software-defined networks. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, Hotnets-IX, pp. 19:1–19:6. ACM, New York (2010)
24.
Zurück zum Zitat Carroll, T.E., Crouse, M., Fulp, E.W., Berenhaut, K.S.: Analysis of network address shuffling as a moving target defense. In: 2014 IEEE International Conference on Communications (ICC), pp. 701–706. IEEE (2014) Carroll, T.E., Crouse, M., Fulp, E.W., Berenhaut, K.S.: Analysis of network address shuffling as a moving target defense. In: 2014 IEEE International Conference on Communications (ICC), pp. 701–706. IEEE (2014)
Metadaten
Titel
An SDN approach to detect targeted attacks in P2P fully connected overlays
verfasst von
Cristóbal Medina-López
L. G. Casado
Vicente González-Ruiz
Yuansong Qiao
Publikationsdatum
02.05.2020
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 2/2021
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-020-00499-3

Weitere Artikel der Ausgabe 2/2021

International Journal of Information Security 2/2021 Zur Ausgabe

Premium Partner