Skip to main content

Malicious Packet Injection on Software-Defined Networking as a Strategy to Improve Security

  • Conference paper
  • First Online:
Proceedings of Seventh International Congress on Information and Communication Technology

Abstract

Software-defined networking (SDN) technology is an approach to cloud computing that facilitates network management and enables programmability and efficient network configuration to improve network performance and monitoring. SDN has recently attracted a lot of interest given its cyber-attack resiliency through the use of controllers which helps network engineers and administrators to administer the network remotely. However, there is a need to investigate its resilience against attacks and hardened the technology to provide a secure network environment. In this paper, we examine the effects of security attacks by using an SDN penetration tool called SDN penetration tool to inject attacks into the SDN controller which, in our case, is the floodlight controller. We focused on three attacks: the Address Resolution Protocol Spoofing, man-in-the-middle, and distributed denial-of-service attacks. The simulations were run on Mininet, and the penetration tool enabled the observation of the effects of the attacks using throughput and the round-trip time metrics. The results show that the controller is vulnerable to the three attacks and that the attacks do affect the normal operation of the network since they degraded the throughput and increased the delivery time of packets which increases the round-trip time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Benjamin U, Uttam T, William S (2017) ATTAIN: an attack injection framework for software-defined networking. In: International conference on dependable systems and networks (DSN), Denver, CO, USA

    Google Scholar 

  2. Bruschi D, Ornaghi A, Rosti E (2003) S-ARP: a secure address resolution protocol. In: 19th annual computer security applications conference, Las Vegas, NV, USA

    Google Scholar 

  3. Mishra A, Gupta N, Gupta BB (2021) Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommun Syst 47:47–67

    Google Scholar 

  4. Gadze JD, Bamfo-Asante AA, Agyemang JO, Nunoo-Mensah H, Opare KA (2021) An investigation into the application of deep learning in the detection and mitigation of DDOS attack on SDN controllers. Technologies 9(14):1–22

    Google Scholar 

  5. Li H, Yang C, Wang L, Ansari N, Tang D, Huang X, Xu Z, Hu D (2021) A cooperative defense framework against application-level DDoS attacks on mobile edge computing services. IEEE Trans Mobile Comput:1–17

    Google Scholar 

  6. Ana SM, Pablo S-G, Enrique C-P, Zeeshan P, Jose MAC, Wang Q (2019) Autonomic protection of multi-tenant 5G mobile networks against UDP flooding DDoS attacks. J Netw Comput Appl 145:1084–8045

    Google Scholar 

  7. Sungjin Y, Ashok KD, Youngho P (2021) Comments on “ALAM: anonymous lightweight authentication mechanism for SDN enabled smart homes.” IEEE Access 9:49154–49159

    Article  Google Scholar 

  8. Waseem I, Haider A, Pan D, Jiafu W, Bilal R, Yawar A, Imran R (2021) ALAM: anonymous lightweight authentication mechanism for SDN-enabled smart homes. IEEE Internet Things J 8(12):9622–9633

    Article  Google Scholar 

  9. Abdelsalam A, El-Sisi A, Reddy V (2015) Mitigating ARP spoofing attacks in software-defined networks. In: ICCTA 2015, Alexandria, Egypt

    Google Scholar 

  10. Christoph M. XArp—advanced ARP spoofing detection [online]. Available http://www.securityfocus.com/tools/6908

  11. arpwatch, Lawrence Berkeley National Laboratory, Aug 2009 [online]. Available ftp://ftp.ee.lbl.gov/arpwatch.tar.gz. Accessed 19 Oct 2018

  12. Anti netcut version 2.0 [online]. Available http://www.tools4free.net. Accessed 19 Oct 2018

  13. Ali A. NoCut 1.001a [online]

    Google Scholar 

  14. ColorSoft, AntiARP [online]. Available http://www.antiarp.com/English/e_index.html. Accessed 19 Oct 2018

  15. Ryan W, Robert C (2013) An SDN approach: quality of service using big switch’s floodlight open-source controller. Asia-Pacific Adv Netw 35:14–19

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Semaka Sekgoari Mapunya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ralekgokgo, M.T., Velempini, M., Mapunya, S.S. (2023). Malicious Packet Injection on Software-Defined Networking as a Strategy to Improve Security. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Proceedings of Seventh International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems, vol 465. Springer, Singapore. https://doi.org/10.1007/978-981-19-2397-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-2397-5_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-2396-8

  • Online ISBN: 978-981-19-2397-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics