2023
DOI: 10.1109/tnsm.2023.3270339
|View full text |Cite
|
Sign up to set email alerts
|

FTMaster: A Detection and Mitigation System of Low-Rate Flow Table Overflow Attacks via SDN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 47 publications
0
3
0
Order By: Relevance
“…In the overflow phase, the attacker aims to overflow the flow table covertly. The research conducted in [23] and [24] indicates a certain correlation between stealthiness and the growth trends of packet-in messages and flow entries. Specifically, when there is a significant increase in the number of packet-in messages or a more pronounced growth trend in flow entries, the stealthiness of the attack becomes lower.…”
Section: B Alfo Modelmentioning
confidence: 94%
See 2 more Smart Citations
“…In the overflow phase, the attacker aims to overflow the flow table covertly. The research conducted in [23] and [24] indicates a certain correlation between stealthiness and the growth trends of packet-in messages and flow entries. Specifically, when there is a significant increase in the number of packet-in messages or a more pronounced growth trend in flow entries, the stealthiness of the attack becomes lower.…”
Section: B Alfo Modelmentioning
confidence: 94%
“…In this paper, the capacity of the flow table is set to 1500, with a default idle timeout of 10 seconds [24]. To generate background traffic, we use the Tcpreplay tool [40] on host h8 to replay the IMC-10 data center network trace [41] dataset.…”
Section: Figure 7 Experimental Topologymentioning
confidence: 99%
See 1 more Smart Citation
“…According to [21], the ML/DL for intrusion detection/prevention system still has several problems to solve. For instance, [22,23] showed either not enough performance or remarkable accuracy with a high false positive ratio. Since ML/DL-based techniques in the research area tend to take eviction mechanisms against the attack flow rules, a high false positive ratio is fatal.…”
Section: Bandwidthmentioning
confidence: 99%
“…[120], [121], [122], [123], [124], [125], [126], [127], [128], [129], [130], [131], [132], [133], [134], [135], [136], [137], [138], [139], [140], [141], [142], [143], [144], [145], [146], [147], [148], [149], [150], [151], [152], [153], [154], [155], [156], [157], [158] Privacy and Security (42 papers ∼ 25.3%) CCS 13 7.8 %…”
Section: Publication Venuesmentioning
confidence: 99%