Skip to main content
Erschienen in: Cluster Computing 4/2021

01.06.2021

A novel mechanism to handle address spoofing attacks in SDN based IoT

verfasst von: Hamza Aldabbas, Rashid Amin

Erschienen in: Cluster Computing | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) is a network of devices (servers, sensors, nodes, and so on) used to conduct tasks like health monitoring, production monitoring, business transactions, etc. In IoT, the traditional networking paradigm in which the control and data planes are vertically integrated is utilized to link various types of networks. Software Defined Networking (SDN) is a relatively new concept that separates the control plane from the data plane, making network management and maintenance easier. In SDN, network operators prioritise the security of the overall system. The most severe attacks on systems target the Address Resolution Protocol (ARP), which then frequently act as a springboard for more complicated attacks. This paper proposes a secure SDN-based IoT architecture to manage and reduce ARP spoofing attacks by deploying a new machine near the SDN controller to handle address resolution questions. To examine address spoofing threats, we move ARP traffic to this new machine. This module works in tandem with the controller, gathering topology data and ARP requests in order to detect potential attack conditions. The ARP data is analyzed using custom methods. According to simulation results, the proposed technique increases network throughput, improves attack detection and mitigation time by 35% over existing techniques.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125–1142 (2017)CrossRef Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125–1142 (2017)CrossRef
2.
Zurück zum Zitat Ding, W., Yan, Z., Deng, R.H.: A survey on future internet security architectures. IEEE Access 4, 4374–4393 (2016)CrossRef Ding, W., Yan, Z., Deng, R.H.: A survey on future internet security architectures. IEEE Access 4, 4374–4393 (2016)CrossRef
3.
Zurück zum Zitat Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36, 42–57 (2013)CrossRef Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36, 42–57 (2013)CrossRef
4.
Zurück zum Zitat Jain, J., Pal, P.R.: A recent study over cyber security and its elements. Int. J. 8, 791–793 (2017) Jain, J., Pal, P.R.: A recent study over cyber security and its elements. Int. J. 8, 791–793 (2017)
5.
Zurück zum Zitat Yang, Y., et al.: A survey on security and privacy issues in internet-of-things. IEEE Internet of Things J. 4(5), 1250–1258 (2017)CrossRef Yang, Y., et al.: A survey on security and privacy issues in internet-of-things. IEEE Internet of Things J. 4(5), 1250–1258 (2017)CrossRef
6.
Zurück zum Zitat Amin, R., Reisslein, M., Shah, N.: Hybrid SDN networks: a survey of existing approaches. IEEE Commun.Surv. Tutor. 20(4), 3259–3306 (2018)CrossRef Amin, R., Reisslein, M., Shah, N.: Hybrid SDN networks: a survey of existing approaches. IEEE Commun.Surv. Tutor. 20(4), 3259–3306 (2018)CrossRef
9.
Zurück zum Zitat Bera, S., Misra, S., Vasilakos, A.V.: Software-defined networking for internet of things: a survey. IEEE Internet Things J. 4(6), 1994–2008 (2017)CrossRef Bera, S., Misra, S., Vasilakos, A.V.: Software-defined networking for internet of things: a survey. IEEE Internet Things J. 4(6), 1994–2008 (2017)CrossRef
10.
Zurück zum Zitat S. Shin and G. Gu, "Attacking software-defined networks: A first feasibility study," In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, 2013, pp. 165–166. S. Shin and G. Gu, "Attacking software-defined networks: A first feasibility study," In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, 2013, pp. 165–166.
11.
Zurück zum Zitat Shafi, Q. and Basit, A., 2019, January. DDoS Botnet Prevention using Blockchain in Software Defined Internet of Things. In 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST) (pp. 624–628). IEEE. Shafi, Q. and Basit, A., 2019, January. DDoS Botnet Prevention using Blockchain in Software Defined Internet of Things. In 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST) (pp. 624–628). IEEE.
12.
Zurück zum Zitat Cox, H., Clark, R. J., Owen, H. L. 2016. Leveraging sdn for arp security. In SoutheastCon, 2016, pp. 1-8. Cox, H., Clark, R. J., Owen, H. L. 2016. Leveraging sdn for arp security. In SoutheastCon, 2016, pp. 1-8.
13.
Zurück zum Zitat Shimanaka, Toru, S., Ryusuke Masuoka, R., Hay, B. 2019. Cyber deception architecture: covert attack reconnaissance using a safe SDN approach. In Proceedings of the 52nd Hawaii International Conference on System Sciences. Shimanaka, Toru, S., Ryusuke Masuoka, R., Hay, B. 2019. Cyber deception architecture: covert attack reconnaissance using a safe SDN approach. In Proceedings of the 52nd Hawaii International Conference on System Sciences.
14.
Zurück zum Zitat Riahi, A., Natalizio, E., Challal, Y., Mitton, N., Iera, A. 2014. A systemic and cognitive approach for IoT security. In 2014 International Conference on Computing, Networking and Communications (ICNC), pp. 183-188 Riahi, A., Natalizio, E., Challal, Y., Mitton, N., Iera, A. 2014. A systemic and cognitive approach for IoT security. In 2014 International Conference on Computing, Networking and Communications (ICNC), pp. 183-188
15.
Zurück zum Zitat Minoli, D., Sohraby, K., Kouns, J. 2017. IoT security (IoTSec) considerations, requirements, and architectures. In 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1006–1007 Minoli, D., Sohraby, K., Kouns, J. 2017. IoT security (IoTSec) considerations, requirements, and architectures. In 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1006–1007
16.
Zurück zum Zitat Mukherjee, B., Neupane, R. L., Calyam, P. 2017. End-to-End IoT security middleware for cloud-fog communication. In 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 151–156 Mukherjee, B., Neupane, R. L., Calyam, P. 2017. End-to-End IoT security middleware for cloud-fog communication. In 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 151–156
17.
Zurück zum Zitat Gaona-García, P., Montenegro-Marin, C., Prieto, J.D., Nieto, Y.V.: Analysis of security mechanisms based on clusters IoT environments. Int. J. Interact. Multimed. Artif. Intell. 4, 55 (2017) Gaona-García, P., Montenegro-Marin, C., Prieto, J.D., Nieto, Y.V.: Analysis of security mechanisms based on clusters IoT environments. Int. J. Interact. Multimed. Artif. Intell. 4, 55 (2017)
18.
Zurück zum Zitat Hu, K., Houbing, Lu., Wang, Xu., Li, F., Wang, X., Geng, T., Yang, H., Liu, S., Han, L., Jin, Ge.: A front-end electronics prototype based on gigabit ethernet for the ATLAS small-strip thin gap chamber. IEEE Trans. Nucl. Sci. 64(6), 1232–1237 (2017)CrossRef Hu, K., Houbing, Lu., Wang, Xu., Li, F., Wang, X., Geng, T., Yang, H., Liu, S., Han, L., Jin, Ge.: A front-end electronics prototype based on gigabit ethernet for the ATLAS small-strip thin gap chamber. IEEE Trans. Nucl. Sci. 64(6), 1232–1237 (2017)CrossRef
19.
Zurück zum Zitat Nguyen, T.G., Phan, T.V., Nguyen, B.T., So-In, C., Baig, Z.A., Sanguanpong, S.: Search: a collaborative and intelligent nids architecture for sdn-based cloud IoT networks. IEEE Access 7, 107678–107694 (2019)CrossRef Nguyen, T.G., Phan, T.V., Nguyen, B.T., So-In, C., Baig, Z.A., Sanguanpong, S.: Search: a collaborative and intelligent nids architecture for sdn-based cloud IoT networks. IEEE Access 7, 107678–107694 (2019)CrossRef
22.
Zurück zum Zitat Latah, M., Toker, L.: Minimizing false positive rate for DoS attack detection: a hybrid SDN-based approach. ICT Exp. 6(2), 125–127 (2020)CrossRef Latah, M., Toker, L.: Minimizing false positive rate for DoS attack detection: a hybrid SDN-based approach. ICT Exp. 6(2), 125–127 (2020)CrossRef
23.
Zurück zum Zitat Sood, K., Yu, S., Xiang, Y.: Software-defined wireless networking opportunities and challenges for internet-of-things: a review. IEEE Internet Things J. 3, 453–463 (2016)CrossRef Sood, K., Yu, S., Xiang, Y.: Software-defined wireless networking opportunities and challenges for internet-of-things: a review. IEEE Internet Things J. 3, 453–463 (2016)CrossRef
24.
Zurück zum Zitat Salman, O., Elhajj, I., Chehab, A., Kayssi, A.: IoT survey: an SDN and fog computing perspective. Comput. Netw. 143, 221–246 (2018)CrossRef Salman, O., Elhajj, I., Chehab, A., Kayssi, A.: IoT survey: an SDN and fog computing perspective. Comput. Netw. 143, 221–246 (2018)CrossRef
25.
Zurück zum Zitat Xie, J., et al.: A survey of machine learning techniques applied to software defined networking (SDN): research issues and challenges. IEEE Commun. Surv. Tutor. 21(1), 393–430 (2019)CrossRef Xie, J., et al.: A survey of machine learning techniques applied to software defined networking (SDN): research issues and challenges. IEEE Commun. Surv. Tutor. 21(1), 393–430 (2019)CrossRef
26.
Zurück zum Zitat Xu, Y., et al.: Efficient DDoS detection based on K-FKNN in software defined networks. IEEE Access 7, 160536–160545 (2019)CrossRef Xu, Y., et al.: Efficient DDoS detection based on K-FKNN in software defined networks. IEEE Access 7, 160536–160545 (2019)CrossRef
27.
Zurück zum Zitat Ubaid, F., Amin, R., Ubaid, F.B., Iqbal, M.M.: Mitigating address spoofing attacks in hybrid Sdn. Int. J. Adv. Comput. Sci. Appl. 8, 562–570 (2017) Ubaid, F., Amin, R., Ubaid, F.B., Iqbal, M.M.: Mitigating address spoofing attacks in hybrid Sdn. Int. J. Adv. Comput. Sci. Appl. 8, 562–570 (2017)
28.
Zurück zum Zitat L Wang, Q Li, Y Jiang, J Wu. 2016. Towards mitigating link flooding attack via incremental SDN deployment. In 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 397–402 L Wang, Q Li, Y Jiang, J Wu. 2016. Towards mitigating link flooding attack via incremental SDN deployment. In 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 397–402
29.
Zurück zum Zitat Baig, Z.A., Sanguanpong, S., Firdous, S.N., Nguyen, T.G., So-In, C.: Averaged dependence estimators for DoS attack detection in IoT networks. Future Gener. Comput. Syst. 102, 198–209 (2020)CrossRef Baig, Z.A., Sanguanpong, S., Firdous, S.N., Nguyen, T.G., So-In, C.: Averaged dependence estimators for DoS attack detection in IoT networks. Future Gener. Comput. Syst. 102, 198–209 (2020)CrossRef
30.
Zurück zum Zitat Ilyas, Q., Khondoker, R.: Security analysis of floodlight, zeroSDN, beacon and POX SDN controllers. In: Khondoker, R. (ed.) SDN and NFV Security, pp. 85–98. Springer, Cham (2018)CrossRef Ilyas, Q., Khondoker, R.: Security analysis of floodlight, zeroSDN, beacon and POX SDN controllers. In: Khondoker, R. (ed.) SDN and NFV Security, pp. 85–98. Springer, Cham (2018)CrossRef
Metadaten
Titel
A novel mechanism to handle address spoofing attacks in SDN based IoT
verfasst von
Hamza Aldabbas
Rashid Amin
Publikationsdatum
01.06.2021
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 4/2021
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-021-03309-0

Weitere Artikel der Ausgabe 4/2021

Cluster Computing 4/2021 Zur Ausgabe

Premium Partner