Skip to main content

Abstract

The Internet of Everything (IoE) and 5G are two initiatives that have embraced Software-Defined Networking (SDN), a model that is intensely changing communications systems. Even though SDN has been around for more than 20 years, it is still improving, and the technology industry is placing more and more demands on SDN networks to make them more creative, adaptable, and reliable. Unfortunately, there is an enormous security flaw in the SDN architecture’s components that might be used by intruders to execute critical attacks which disrupt the components and their operations. SDN networks have several benefits for managing infrastructure and predicting development. The supply of services was made easier with centralized control, which offers a comprehensive and in-depth perspective of the network. Due to the enormous advantages, SDN is deployed in several applications instead of traditional network architecture. As far as large-scale applications are concerned, there is a huge demand to implement strong security strategies in information allotment and resources across different platforms. Even though several recent research works are recently concentrated on finding the limitations of SDN architecture components, types of security attacks, and possible solutions to overcome the limitations. SDN has encountered several security issues like man-in-the-middle attacks, host hijacking ARP poisoning, and saturation attacks. This research work mainly focuses on control plane attacks that affect the total operations of network devices, including switches and the SDN controller. It was also identified that these attacks have a huge impact on the network components of SDN environments. Experimental results provide a detailed analysis of control plane attacks and their impact on the SDN networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jiménez, M.B., Fernández, D., Rivadeneira, J.E., Bellido, L., Cárdenas, A.: A survey of the main security issues and solutions for the SDN architecture. IEEE Access 9, 122016–122038 (2021)

    Article  Google Scholar 

  2. Feamster, N., Rexford, J., Zegura, E.: The road to SDN: an intellectual history of programmable networks. ACM Comput. Commun. Rev. 44(2), 87–98 (2014)

    Article  Google Scholar 

  3. Cox, J.H., Chung, J., Donovan, S., Ivey, J., Clark, R.J., Riley, G., et al.: Advancing software-defined networks: a survey. IEEE Access 5, 25487–25526 (2017)

    Article  Google Scholar 

  4. Thyagaturu, A.S., Mercian, A., McGarry, M.P., Reisslein, M., Kellerer, W.: Software defined optical networks (SDONs): a comprehensive survey. IEEE Commun. Surveys Tuts. 18(4), 2738–2786 (2016)

    Article  Google Scholar 

  5. Lv, Z., Kumar, N.: Software defined solutions for sensors in 6G/IoE. Comput. Commun. 153, 42–47 (2020)

    Google Scholar 

  6. Ahmad, I., Namal, S., Ylianttila, M., Gurtov, A.: Security in software defined networks: a survey. IEEE Commun. Surv. Tuts. 17(4), 2317–2346 (2015)

    Google Scholar 

  7. Sood, K., Karmakar, K.K., Yu, S., Varadharajan, V., Pokhrel, S.R., Xiang, Y.: Alleviating heterogeneity in SDN-IoT networks to maintain QoS and enhance security. IEEE Internet Things J. 7(7), 5964–5975 (2020)

    Google Scholar 

  8. Sallam, A., Refaey, A., Shami, A.: On the security of SDN: a completed secure and scalable framework using the software-defined perimeter. IEEE Access 7, 146577–146587 (2019)

    Google Scholar 

  9. Derhab, A., Guerroumi, M., Gumaei, A., Maglaras, L., Ferrag, M.A., Mukherjee, M., Khan, F.A.: Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security. Sensors 19(14), 3119 (2019)

    Article  Google Scholar 

  10. Abdou, A., van Oorschot, P.C., Wan, T.: Comparative analysis of control plane security of SDN and conventional networks. IEEE Commun. Surv. Tuts. 20(4), 3542–3559 (2018)

    Google Scholar 

  11. Liu, Z., Campbell, R., Mickunas, M.: Active security support for active networks. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 33(4), 432–445 (2003)

    Google Scholar 

  12. Paolucci, F., Civerchia, F., Sgambelluri, A., Giorgetti, A., Cugini, F., Castoldi, P.: P4 edge node enabling stateful traffic engineering and cyber security. IEEE/OSA J. Opt. Commun. Netw. 11(1), A84–A95 (2019)

    Article  Google Scholar 

  13. Scott-Hayward, S., Natarajan, S., Sezer, S.: A survey of security in software defined networks. IEEE Commun. Surveys Tuts. 18(1), 623–654 (2016)

    Article  Google Scholar 

  14. Giotis, K., Argyropoulos, C., Androulidakis, G., Kalogeras, D., Maglaris, V.: Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput. Netw. 62(5), 122–136 (2014)

    Article  Google Scholar 

  15. Su, Z., Wang, T., Xia, Y., Hamdi, M.: FlowCover: low-cost flow monitoring scheme in software defined networks. Proc. IEEE Global Commun. Conf. (GLOBECOM), 1956–1961 (2014)

    Google Scholar 

  16. Taniguchi, Y., Tsutsumi, H., Iguchi, N., Watanabe, K.: Design and evaluation of a proxy-based monitoring system for openflow networks. Sci. World J. (2016)

    Google Scholar 

  17. Hyder, M.F., Ismail, M.A.: Securing control and data planes from reconnaissance attacks using distributed shadow controllers, reactive and proactive approaches. IEEE Access 9, 21881–21894 (2021)

    Article  Google Scholar 

  18. Chang, S.-Y., Park, Y., Ashok Babu, B.B.: Fast IP hopping randomization to secure hop-by-hop access in SDN. IEEE Trans. Netw. Serv. Manage. 16(1), 308–320 (2019)

    Google Scholar 

  19. Achleitner, S., Porta, T.F.L., McDaniel, P., Sugrim, S., Krishnamurthy, S.V., Chadha, R.: Deceiving network reconnaissance using SDN-based virtual topologies. IEEE Trans. Netw. Service Manage. 14(4), 1098–1112 (2017)

    Article  Google Scholar 

  20. Saraswat, S., Agarwal, V., Gupta, H.P., Mishra, R., Gupta, A., Dutta, T.: Challenges and solutions in software defined networking: a survey. J. Netw. Comput. Appl. 141, 23–58 (2019)

    Article  Google Scholar 

  21. Nagarathna, R., Shalinie, S.M.: SLAMHHA: a supervised learning approach to mitigate host location hijacking attack on SDN controllers. In: Proceedings 4th International Conference Signal Process, Communications Network (ICSCN), pp. 1–7 (2017)

    Google Scholar 

  22. Li, Y., Qin, Y., Zhang, P., Herzberg, A.: SDN-enabled cyber-physical security in networked microgrids. IEEE Trans. Sustain. Energy 10(3), 1613–1622 (2019)

    Google Scholar 

  23. Brooks, M., Yang, B.: A man-in-the-middle attack against OpenDay- Light SDN controller. In: Proceedings 4th annual ACM conference resistance information technology (RIIT), pp. 45–49 (2019)

    Google Scholar 

  24. Pradhan, A., Mathew, R.: Solutions to vulnerabilities and threats in software de_ned networking (SDN). Proc. Comput. Sci. 171, 2581–2589 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Sundaravadivazhagan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, M.A., Muthusamy, S., Ashik, M., Karthikeyan, R., Sundaravadivazhagan, B. (2023). The Impact of Control Plane Attacks in Software Defined Networks Environments. In: Iwendi, C., Boulouard, Z., Kryvinska, N. (eds) Proceedings of ICACTCE'23 — The International Conference on Advances in Communication Technology and Computer Engineering. ICACTCE 2023. Lecture Notes in Networks and Systems, vol 735. Springer, Cham. https://doi.org/10.1007/978-3-031-37164-6_5

Download citation

Publish with us

Policies and ethics