HoneyNet for mitigating link flooding attacks on software-defined networks링크 플러딩 공격 완화를 위한 소프트웨어 정의 네트워크 기반 허니넷

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 792
  • Download : 0
Over the past years, Link Flooding Attacks(LFAs) have been introduced as new network threats. LFAs are indirect DDoS attacks that selectively flood intermediate links, while legacy DDoS attacks directly aim at end points. As a result, a wide area is isolated from the Internet. In the legacy network, mitigating LFAs is a challenge since an attacker can successfully construct a link map that contains entire network topology via traceroute. Some previous works have been proposed, but, they are ex-post countermeasures that react after LFAs are occurred. In this paper, we present HoneyNet that prelocates nodes that have problematic links, by computing static and dynamic property on Software-defined Networks(SDNs). And HoneyNet deploys Honey Topology which is fake topology on the located nodes, to make the attacker believe that the topology has bottleneck links. \honeynet also forces the attacker to misbuild the link map by reactively routing traceroute packets into the honey topology.
Advisors
Shin, Seungwonresearcher신승원researcher
Description
한국과학기술원 :정보보호대학원,
Publisher
한국과학기술원
Issue Date
2017
Identifier
325007
Language
eng
Description

학위논문(석사) - 한국과학기술원 : 정보보호대학원, 2017.2,[i, 23 p. :]

Keywords

Distributed Denial of Service(DDoS); Link Flooding Attacks(LFAs); Software-defined Networks(SDNs); Graph Theory; Network Security; 분산 서비스 공격; 링크 플러딩 공격; 소프트웨어 정의 네트워크; 그래프이론; 네트워크 보안

URI
http://hdl.handle.net/10203/243496
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=675495&flag=dissertation
Appears in Collection
IS-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0