2018
DOI: 10.4108/eai.13-7-2018.155168
|View full text |Cite
|
Sign up to set email alerts
|

Kernel-Space Intrusion Detection Using Software-Defined Networking

Abstract: Software-Defined Networking (SDN) has encountered serious Denial of Service (DoS) attacks. However, existing approaches cannot sufficiently address the serious attacks in the real world because they often present significant overhead and they require long detection and mitigation time. In this paper, we propose a lightweight kernel-level intrusion detection and prevention framework called KernelDetect, which leverages modular string searching and filtering mechanisms with SDN techniques. In KernelDetect, we su… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…To secure SDN environments, all of the potential security threats need to be anticipated before adversaries exploit their vulnerabilities [198], [258]. Moreover, an efficient threat mitigation model has to consider looking at SDN from the attacker's perspective to highlight potential threats/anomalies on SDN at the architectural level, regardless of whether these threats can be successfully carried out.…”
Section: ) Threat Anticipationmentioning
confidence: 99%
“…To secure SDN environments, all of the potential security threats need to be anticipated before adversaries exploit their vulnerabilities [198], [258]. Moreover, an efficient threat mitigation model has to consider looking at SDN from the attacker's perspective to highlight potential threats/anomalies on SDN at the architectural level, regardless of whether these threats can be successfully carried out.…”
Section: ) Threat Anticipationmentioning
confidence: 99%
“…However, the solution is based on statistic aggregation, which renders it impractical as data-tocontrol layer saturation attacks may exploit micro-flows. Ker-nelDetect [21,27] suggested a lightweight kernel space-based IDPS using modular string searching and filtering approaches to address DoS threats. AVANT-GUARD [28] presented a solution to alleviate the impact of saturation attacks using flow alteration management in OF devices.…”
Section: Related Workmentioning
confidence: 99%
“…7 SDN eases programmability by adopting programmable interfaces to insert and push forwarding rules in SDN switches (e.g., Open vSwitch). 23 In order for us to best leverage the SDN capabilities, the delicate holistic view of flows must be contributory to any networking-enabled application (e.g., traffic engineering, 7 QoS-aware flow routing, 24,25 and flow inspection 6,26 ). Nowadays, cybersecurity in both industry and academia is faced with a dramatically growing set of impedance factors (e.g., threat actors).…”
Section: Integration Of Sdnmentioning
confidence: 99%