Skip to main content
Top
Published in: The Journal of Supercomputing 14/2023

18-04-2023

A two-phase detection method against APT attack on flow table management in SDN

Authors: Xinfeng He, Shuchao Sun

Published in: The Journal of Supercomputing | Issue 14/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Long-term occupation of flow table can occur in the management mechanism of software-defined networking (SDN), which is a prerequisite for APT attacks. The task of detecting such APT attacks in existent research is mainly undertaken by the controller, which results in high computation overhead. To address this problem, a two-phase detection method for APT attacks on flow table management (TMAF) is proposed in this paper. Firstly, the suspicious flow entries are pre-detected in the SDN switch according to the periodicity of the packet. Secondly, the five-dimensional features of suspicious flow entries are selected according to the characteristics of packets in load and frequency, and then the B-P neural network on the controller for further analysis. Experiments show that TMAF reduces the controller’s load and improves the detection efficiency and accuracy compared to existing works. Additionally, the potential risk of APT attacks can be reduced to a certain extent.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Banitalebi Dehkordi A, Soltanaghaei M, Boroujeni FZ (2021) The ddos attacks detection through machine learning and statistical methods in sdn. J Supercomput 77(3):2383–2415CrossRef Banitalebi Dehkordi A, Soltanaghaei M, Boroujeni FZ (2021) The ddos attacks detection through machine learning and statistical methods in sdn. J Supercomput 77(3):2383–2415CrossRef
2.
go back to reference Cui Y, Qian Q, Guo C, Shen G, Tian Y, Xing H, Yan L (2021) Towards ddos detection mechanisms in software-defined networking. J Netw Comput Appl 190:103156CrossRef Cui Y, Qian Q, Guo C, Shen G, Tian Y, Xing H, Yan L (2021) Towards ddos detection mechanisms in software-defined networking. J Netw Comput Appl 190:103156CrossRef
3.
go back to reference Shengxu X, Changyou X, Guomin Z, Lihua S, Guyu H (2021) Survey of openflow switch flow table overflow mitigation techniques. J Comput Res Dev 58(7):1544–1562 Shengxu X, Changyou X, Guomin Z, Lihua S, Guyu H (2021) Survey of openflow switch flow table overflow mitigation techniques. J Comput Res Dev 58(7):1544–1562
4.
go back to reference Li X, Huang Y (2019) A flow table with two-stage timeout mechanism for sdn switches, 1804–1809. IEEE Li X, Huang Y (2019) A flow table with two-stage timeout mechanism for sdn switches, 1804–1809. IEEE
5.
go back to reference Cao J, Xu M, Li Q, Sun K, Yang Y, Zheng J (2017) Disrupting sdn via the data plane: a low-rate flow table overflow attack. Springer, Berlin, pp 356–376 Cao J, Xu M, Li Q, Sun K, Yang Y, Zheng J (2017) Disrupting sdn via the data plane: a low-rate flow table overflow attack. Springer, Berlin, pp 356–376
6.
go back to reference Zhijun W, Qing X, Jingjie W, Meng Y, Liang L (2020) Low-rate ddos attack detection based on factorization machine in software defined network. IEEE Access 8:17404–17418CrossRef Zhijun W, Qing X, Jingjie W, Meng Y, Liang L (2020) Low-rate ddos attack detection based on factorization machine in software defined network. IEEE Access 8:17404–17418CrossRef
7.
go back to reference Chen X, Hua Q, Zhu Y, Wang Y, Ge L (2019) Research on low-rate ddos attack of sdn network in cloud environment. Tongxin Xuebao 40(6):210–222 Chen X, Hua Q, Zhu Y, Wang Y, Ge L (2019) Research on low-rate ddos attack of sdn network in cloud environment. Tongxin Xuebao 40(6):210–222
8.
go back to reference Pascoal TA, Dantas YG, Fonseca IE, Nigam V (2017) Slow tcam exhaustion ddos attack. In: IFIP International Conference on ICT Systems Security and Privacy Protection, pp 17–31. Springer Pascoal TA, Dantas YG, Fonseca IE, Nigam V (2017) Slow tcam exhaustion ddos attack. In: IFIP International Conference on ICT Systems Security and Privacy Protection, pp 17–31. Springer
9.
go back to reference Phan TV, Gias TR, Islam ST, Huong TT, Thanh NH, Bauschert T (2019) Q-mind: defeating stealthy dos attacks in sdn with a machine-learning based defense framework. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp 1–6. IEEE Phan TV, Gias TR, Islam ST, Huong TT, Thanh NH, Bauschert T (2019) Q-mind: defeating stealthy dos attacks in sdn with a machine-learning based defense framework. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp 1–6. IEEE
10.
go back to reference Xie S, Xing C, Zhang G, Zhao J (2021) A table overflow ldos attack defending mechanism in software-defined networks. Secur Commun Netw 2021 Xie S, Xing C, Zhang G, Zhao J (2021) A table overflow ldos attack defending mechanism in software-defined networks. Secur Commun Netw 2021
11.
go back to reference Yu Z, Xiaoming P, Qingzhong L, Junkuo C, Ziqiang L (2017) Apt attacks and defenses. J Tsinghua Univ (Science and Technology) 57(11):1127–1133 Yu Z, Xiaoming P, Qingzhong L, Junkuo C, Ziqiang L (2017) Apt attacks and defenses. J Tsinghua Univ (Science and Technology) 57(11):1127–1133
12.
go back to reference Joloudari JH, Haderbadi M, Mashmool A, GhasemiGol M, Band SS, Mosavi A (2020) Early detection of the advanced persistent threat attack using performance analysis of deep learning. IEEE Access 8:186125–186137CrossRef Joloudari JH, Haderbadi M, Mashmool A, GhasemiGol M, Band SS, Mosavi A (2020) Early detection of the advanced persistent threat attack using performance analysis of deep learning. IEEE Access 8:186125–186137CrossRef
13.
go back to reference Fu T, Lu Y, Zhen W (2019) Apt attack situation assessment model based on optimized bp neural network. In: 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp 2108–2111. IEEE Fu T, Lu Y, Zhen W (2019) Apt attack situation assessment model based on optimized bp neural network. In: 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp 2108–2111. IEEE
14.
go back to reference Do Xuan C, Dao MH (2021) A novel approach for apt attack detection based on combined deep learning model. Neural Comput Appl 33:13251–13264CrossRef Do Xuan C, Dao MH (2021) A novel approach for apt attack detection based on combined deep learning model. Neural Comput Appl 33:13251–13264CrossRef
15.
go back to reference Shan-Shan J, Ya-Bin X (2017) The apt detection method in sdn. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), pp 1240–1245. IEEE Shan-Shan J, Ya-Bin X (2017) The apt detection method in sdn. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), pp 1240–1245. IEEE
16.
go back to reference Shan-Shan J, Ya-Bin X (2018) The apt detection method based on attack tree for sdn. In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, pp 116–121 Shan-Shan J, Ya-Bin X (2018) The apt detection method based on attack tree for sdn. In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, pp 116–121
17.
go back to reference Snow NA, Dasari VR, Geerhart BE (2018) Openflow experimenter labels for encoding adaptive network functions. In: 2018 IEEE 39th Sarnoff Symposium, pp 1–5. IEEE Snow NA, Dasari VR, Geerhart BE (2018) Openflow experimenter labels for encoding adaptive network functions. In: 2018 IEEE 39th Sarnoff Symposium, pp 1–5. IEEE
21.
go back to reference Liu Z, He Y, Wang W, Zhang B (2019) Ddos attack detection scheme based on entropy and pso-bp neural network in sdn. China Commun 16(7):144–155CrossRef Liu Z, He Y, Wang W, Zhang B (2019) Ddos attack detection scheme based on entropy and pso-bp neural network in sdn. China Commun 16(7):144–155CrossRef
22.
go back to reference Pascoal TA, Fonseca IE, Nigam V (2020) Slow denial-of-service attacks on software defined networks. Comput Netw 173:107223CrossRef Pascoal TA, Fonseca IE, Nigam V (2020) Slow denial-of-service attacks on software defined networks. Comput Netw 173:107223CrossRef
23.
go back to reference El Sayed MS, Le-Khac N-A, Azer MA, Jurcut AD (2022) A flow-based anomaly detection approach with feature selection method against ddos attacks in sdns. IEEE Trans Cognitive Commun Netw 8(4):1862–1880CrossRef El Sayed MS, Le-Khac N-A, Azer MA, Jurcut AD (2022) A flow-based anomaly detection approach with feature selection method against ddos attacks in sdns. IEEE Trans Cognitive Commun Netw 8(4):1862–1880CrossRef
Metadata
Title
A two-phase detection method against APT attack on flow table management in SDN
Authors
Xinfeng He
Shuchao Sun
Publication date
18-04-2023
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 14/2023
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05281-5

Other articles of this Issue 14/2023

The Journal of Supercomputing 14/2023 Go to the issue

Premium Partner