SDN-based edge computing security: Detecting and mitigating flow rule attacks

Sonali Sen Bardya, Rattikorn Hewett

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Edge Computing and Software Defined Networking (SDN) are two emerging technologies that have increasingly become popular for implementing modern infrastructures. The former enables data computation to be performed at the edge of the network (of users) giving benefits over cloud computing when large amount of data is produced near the edge. The latter offers advantages of programmable and flexible network management over the traditional practice. Recent research has focused on how to utilize SDN paradigm to enhance Edge Computing. As more and more SDN-based Edge Computing systems are being developed, it is necessary to consider security issues especially those that are inherent from SDN. This paper addresses an important SDN specific security breach, namely a flow rule attack, where a network switch is compromised and its flow rule for data transmission routing is modified. This attack can potentially lead to many devastating consequences including disruption of network traffic and denial of services. The paper presents an approach to flow rule attack detection and lightweight mitigation techniques that can be performed by the SDNs controller. To evaluate our detection and mitigation mechanisms, the paper describes experiments on simulation that shows promising results.

Original languageEnglish
Title of host publicationProceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019
PublisherAssociation for Computing Machinery, Inc
Pages364-370
Number of pages7
ISBN (Electronic)9781450367332
DOIs
StatePublished - Nov 7 2019
Event4th ACM/IEEE Symposium on Edge Computing, SEC 2019 - Arlington, United States
Duration: Nov 7 2019Nov 9 2019

Publication series

NameProceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019

Conference

Conference4th ACM/IEEE Symposium on Edge Computing, SEC 2019
CountryUnited States
CityArlington
Period11/7/1911/9/19

Keywords

  • Flow rule attacks
  • SDN security
  • SDN-based edge computing
  • Software-Defined Networking

Fingerprint Dive into the research topics of 'SDN-based edge computing security: Detecting and mitigating flow rule attacks'. Together they form a unique fingerprint.

Cite this