Attacking and defending network operating system in software-defined networking소프트웨어 정의 네트워크 운영 체제 공격 및 방어

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 679
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKang, Brent ByungHoon-
dc.contributor.advisor강병훈-
dc.contributor.authorNoh, Jiseong-
dc.contributor.author노지성-
dc.date.accessioned2017-03-29T02:41:10Z-
dc.date.available2017-03-29T02:41:10Z-
dc.date.issued2014-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=657510&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/221938-
dc.description학위논문(석사) - 한국과학기술원 : 정보보호대학원, 2014.8 ,[v, 43 p. :]-
dc.description.abstractThe advancement of Software Defined Networking (SDN) redefines traditional computer networking architecture. The role of control plane of SDN is so important that it is called network operating system. However, research on robustness or security issues of network operating system has been overlooked. In this thesis, we report three main issues on network operating system. First, we find vulnerabilities that can be exploited by malicious or buggy applications running on a network operating system. We have identified four major attack vectors that could undermine its operations: Denial of service, Global data manipulation, Control plane poisoning, and System shell execution. We also demonstrate real attacks on the widely used network operating systems without significant effort. Second, we present a method to address the attacks. We analyze network applications running on top of network operating systems, identify their behavioral features, and extract permission set for each network application. With the method, we introduce a permission based malicious network application detector, which examines the permission of each application and prevents its executions without permission. Our system shows almost no performance overhead. Third, we propose a way of security enhanced future network OS with our application analysis results. The results suggest i) separation of internal data among applications, ii) separation of privileges between network OS and user applications, iii) authentication mechanism to access internal database and management channel.-
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectSoftware Defined Networking-
dc.subjectNetwork Operating System-
dc.subjectNetwork Security-
dc.subject소프트웨어 정의 네트워크-
dc.subject네트워크 운영 체제-
dc.subject네트워크 보안-
dc.titleAttacking and defending network operating system in software-defined networking-
dc.title.alternative소프트웨어 정의 네트워크 운영 체제 공격 및 방어-
dc.typeThesis(Master)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :정보보호대학원,-
Appears in Collection
IS-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0