2020
DOI: 10.1371/journal.pone.0232574
|View full text |Cite
|
Sign up to set email alerts
|

Mechanism to prevent the abuse of IPv6 fragmentation in OpenFlow networks

Abstract: OpenFlow makes a network highly flexible and fast-evolving by separating control and data planes. The control plane thus becomes responsive to changes in topology and load balancing requirements. OpenFlow also offers a new approach to handle security threats accurately and responsively. Therefore, it is used as an innovative firewall that acts as a first-hop security to protect networks against malicious users. However, the firewall provided by OpenFlow suffers from Internet protocol version 6 (IPv6) fragmenta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…In order to successfully carry out cyber-attacks on SECS/GEM communications, it is important to eavesdrop and capture the packets while in transit and then modify them to launch attacks such as DoS attack, replay attack, and FDIA. For this purpose, the Python-based Scapy tool is used to capture, modify, and transmit forged packets to the target entity [26]. The attacks were repeated 30 times for each attack scenario, and results were measured for each process.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…In order to successfully carry out cyber-attacks on SECS/GEM communications, it is important to eavesdrop and capture the packets while in transit and then modify them to launch attacks such as DoS attack, replay attack, and FDIA. For this purpose, the Python-based Scapy tool is used to capture, modify, and transmit forged packets to the target entity [26]. The attacks were repeated 30 times for each attack scenario, and results were measured for each process.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…The SDN controller is responsible for forwarding processing rules of the flows in the network by installing flow entries onto the OpenFlow-enabled switches [37]. The OpenFlow specification permits network switches to operate in proactive or reactive mode.…”
Section: Openflow Forwarding Processmentioning
confidence: 99%
“…Therefore, this is also an indication that the three popular routers were prone to extension header vulnerabilities [21] up to now and the network administrator needs to address these vulnerabilities [22] and fix them before these malformed packets reach their targeted destinations [23]. Security features mitigating this kind of adversary must be implemented during the deployment of IPv6 network [24], [25].…”
Section: Routing Header 0 (Rh0) Attackmentioning
confidence: 99%