Open Access Open Access  Restricted Access Subscription Access

Detection of Fake Request and Response using Certificates Information and IP Address of SDN

Lal Babu Yadav, Vivek Srivastava, Ravi Shankar Pandey

Abstract


Data communication in network facilitates access of the content stored at the remote servers using the IP address. In SDN (software-defined networking), these communications are monitored centrally to be out in network operation. The attackers can change the IP address and block the communication to authenticate services or certified IP address authorities generate security certificate to the remote servers. Attackers are also able to modify the host address of the certificate which again creates failure network operations. These attacks create unnecessary overload at the switches/controller side in SDN. In this study, we have proposed a model for stopping the malicious IPs at the switch/controller level to reduce the load of the controller. For finding the actual attacker, in this formal model, we have considered to ascertain the certificate and IP address. We have used one observer which records IP address and certificate of the request/responses. These requests and responses are converted in LTS (Long Term Support). These LTSes are merged for finding the malicious attacker location. We have demonstrated our proposal with examples.

Keywords: SDN, LTS, security requirements, certificate authority, IP address

Cite this Article Lal Babu Yadav, Vivek Srivastava, Ravi Shankar Pandey. Detection of Fake Request and Response using Certificates Information and IP Address of SDN. Journal of Network Security. 2020; 8(1): 1–10p.


Full Text:

PDF

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517