2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2017
DOI: 10.1109/dsn.2017.59
|View full text |Cite
|
Sign up to set email alerts
|

ATTAIN: An Attack Injection Framework for Software-Defined Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(15 citation statements)
references
References 12 publications
0
15
0
Order By: Relevance
“…Researchers have provided a few automated analysis and test frameworks [45], [46], [47], [48] to find potential vulnerabilities in SDN applications and other components. SHIELD [45] provides an automated framework to efficiently conduct static analysis of SDN applications, which requires source codes of applications and well-defined malicious behavior to find malicious applications.…”
Section: Related Workmentioning
confidence: 99%
“…Researchers have provided a few automated analysis and test frameworks [45], [46], [47], [48] to find potential vulnerabilities in SDN applications and other components. SHIELD [45] provides an automated framework to efficiently conduct static analysis of SDN applications, which requires source codes of applications and well-defined malicious behavior to find malicious applications.…”
Section: Related Workmentioning
confidence: 99%
“…While the latter can be easily solved by owning virtual machines in the infrastructure, the former requires to be able to alter nodes configuration. This has been proven possible in [8], [9], [10]. Precisely, the attacker is able to spoof the identity of the network hypervisor, and thus is able to inject malicious flow rules inside the nodes to create the data exfiltration path.…”
Section: Problem Statementmentioning
confidence: 99%
“…In scenario b) the higher the detection rate the higher the reward of node 3, the secondary source of attacks. The steadiness in the evolution of each node shows that the performance of the detection is not a major factor in determining which b f bc p ca γ [30,40] [ 10,20,30,40] [0.5,0.6,0.7,0.8,0.9] 10 0.9 10,10,10,5,5,5] TABLE I: Parameters summary nodes are best suited for the monitoring. We formulate some hypotheses in Section VIII.…”
Section: Use Casementioning
confidence: 99%
“…Van Woudenberg et al [16] and Jeong et al [17] use optical fault injection and power supply disturbances, respectively, on protected smart cards to identify and exploit security vulnerabilities to recover secret keys and access decrypted data. Ujcich et al [7] use the ATTAIN framework, Fonseca et al [6] use the VAIT tool and Antunes et al [18] and Neves et al [8] use the AJECT tool to perform attack injection to identify vulnerabilities. ATTAIN is developed to inject attacks on software-defined networking (SDN) architectures; VAIT is used to evaluate web security mechanisms; and AJECT is developed to inject attacks on network-related servers, specifically IMAP servers, where it uses a specification of the server's communication protocol and predefined test case generation algorithms to automatically generate attacks.…”
Section: B Related Workmentioning
confidence: 99%
“…Several attack injection tools and frameworks have been proposed in the past [4], [5], [6], [7], [8], which all target the system either in later parts of the system's development process or even after deployment of the system. However, the attack injection framework proposed in this paper simulates cybersecurity attacks in early development phases of systems; thus it is suitable for model-based design and development of, e.g., automotive embedded systems [9].…”
Section: Introductionmentioning
confidence: 99%