Afficher la notice abrégée
dc.contributor.author |
Anass Sebbar |
|
dc.contributor.author |
Mohammed Boulmalf |
|
dc.contributor.author |
Mohamed Dafir Ech-Cherif El Kettani |
|
dc.contributor.author |
Youssef Badd |
|
dc.date.accessioned |
2019-06-09T10:15:51Z |
|
dc.date.available |
2019-06-09T10:15:51Z |
|
dc.date.issued |
2018-10-21 |
|
dc.identifier.uri |
http://e-biblio.univ-mosta.dz/handle/123456789/10701 |
|
dc.description.abstract |
Software Defined Security Networking is a new
method to reduce risks while ensuring maximum protection for
users and networks. It offers automated and usable intelligence to
preserve the security of the systems. However, we have a variety of
threats targeted to the plane and interface of SDN. In this paper,
we present different attacks in Software Defined Networking
(SDN) layers and interfaces, proposing two scenarios in order
to describe the methodology of Man In The Middle (MITM)
attack in different controllers like OpenDayLight (ODL), Open
Network Operating System (ONOS) and RYU. We focus on the
ODL controller which is the subject of this study. Commonly
investigated types of vulnerabilities on SDN controller. The
simulation results indicate that the attackers can control easily
the SDN Controller, and communication between control layer
and infrastructure layer is not secure. This result shows that ODL
is vulnerable with respect to MITM attack. In this research, many
recommendation and solutions measure to prevent and detect
MITM attack is presented. |
en_US |
dc.publisher |
2018 IEEE 5th International Congress on Information Science and Technology (CiSt) |
en_US |
dc.subject |
Controller |
en_US |
dc.subject |
ODL |
en_US |
dc.subject |
ONOS |
en_US |
dc.subject |
Ryu |
en_US |
dc.subject |
Mininet |
en_US |
dc.subject |
MITM |
en_US |
dc.title |
Detection MITM Attack in Multi-SDN Controller |
en_US |
dc.type |
Article |
en_US |
Fichier(s) constituant ce document
Ce document figure dans la(les) collection(s) suivante(s)
Afficher la notice abrégée