2017
DOI: 10.1007/978-3-319-66332-6_14
|View full text |Cite
|
Sign up to set email alerts
|

BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 34 publications
(31 citation statements)
references
References 26 publications
0
31
0
Order By: Relevance
“…Researchers have provided a few automated analysis and test frameworks [45], [46], [47], [48] to find potential vulnerabilities in SDN applications and other components. SHIELD [45] provides an automated framework to efficiently conduct static analysis of SDN applications, which requires source codes of applications and well-defined malicious behavior to find malicious applications.…”
Section: Related Workmentioning
confidence: 99%
“…Researchers have provided a few automated analysis and test frameworks [45], [46], [47], [48] to find potential vulnerabilities in SDN applications and other components. SHIELD [45] provides an automated framework to efficiently conduct static analysis of SDN applications, which requires source codes of applications and well-defined malicious behavior to find malicious applications.…”
Section: Related Workmentioning
confidence: 99%
“…Defenses to date, such as control plane causality tracking [59], [62], trusted data plane identities [26], and timingbased link fabrication prevention [57], are useful in preventing specific classes of attacks but are not designed for vulnerability discovery because they track specific execution traces as they occur rather than all possible execution traces prior to runtime. Current SDN vulnerability tools, such as BEADS [25] and DELTA [34], rely on fuzzing techniques that do not easily capture complex event-based vulnerabilities.…”
Section: B Sdn Security Challengesmentioning
confidence: 99%
“…DELTA [34], BEADS [25], and STS [55] use fuzzing to generate data plane inputs, but the space of potential inputs is complex for large and complex event-driven controllers. NICE [11] models basic control plane semantics (e.g., flow rule installation ordering) and uses the generated state space to perform concrete symbolic (i.e., concolic) execution to find bugs; however, even for simple single apps, the approach does not scale well.…”
Section: Event-driven Architecturesmentioning
confidence: 99%
See 1 more Smart Citation
“…The output of our method is a Malicious Tenant List. A response module can manage and quarantine malicious tenants in the entire network by changing the flow table strategy . Figure depicts the steps and Figure illustrates the components of the proposed approach.…”
Section: Proposed Educational Approachmentioning
confidence: 99%