
Research Article
Topology Validator - Defense Against Topology Poisoning Attack in SDN
@INPROCEEDINGS{10.1007/978-3-030-91424-0_15, author={Abhay Kumar and Sandeep Shukla}, title={Topology Validator - Defense Against Topology Poisoning Attack in SDN}, proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Systems. 17th EAI International Conference, QShine 2021, Virtual Event, November 29--30, 2021, Proceedings}, proceedings_a={QSHINE}, year={2021}, month={11}, keywords={Software Defined Network SDN SDN security Topology attack}, doi={10.1007/978-3-030-91424-0_15} }
- Abhay Kumar
Sandeep Shukla
Year: 2021
Topology Validator - Defense Against Topology Poisoning Attack in SDN
QSHINE
Springer
DOI: 10.1007/978-3-030-91424-0_15
Abstract
SDN controller in the SDN (Software Defined Network) environment needs to know the topology of the whole network under its control to ensure successful delivery and routing of packets to their respective destinations and paths. SDN Controller uses OFDP to learn the topology, for which it uses a variant of LLDP packets used in the legacy network. The current implementations of OFDP in popular SDN controllers suffer mainly two categories of attacks, namely Topology Poisoning by LLDP packet injection and Topology Poisoning by LLDP packet relay. Several solutions have been proposed to deal with these two categories of attacks. Our study found that, while most of these proposed solutions successfully prevented the LLDP packet injection-based attack, none could defend the relay-based attack with promising accuracy. In this paper, we have proposed a solution, namely Topology Validator, along with its implementation as a module of FloodLight SDN controller, which, apart from preventing LLDP injection-based attack, was also able to detect and thwart the LLDP relay-based attack successfully.