Detection of Fake Request and Response using Certificates Information and IP Address of SDN

  • Vivek Srivastava 1Department of Computer Science & Engineering, Birla Institute of Technology, Mesra-Ranchi, India Department of Computer Science & Engineering, Birla Institute of Technology, Mesra-Ranchi, India
  • Lal Babu Yadav Department of Computer Science & Engineering, Birla Institute of Technology, Mesra-Ranchi, India Department of Computer Science & Engineering, Birla Institute of Technology, Mesra-Ranchi, India
  • Dr. Ravi Shankar Pandey Department of Computer Science & Engineering, Birla Institute of Technology, Mesra-Ranchi, India Department of Computer Science & Engineering, Birla Institute of Technology, Mesra-Ranchi, India
Keywords: SDN, LTS, Security Requirements, Certificate Authority.

Abstract

Data communication in network facilitates access of the content stored at the remote servers using the IP address. In SDN
these communications are monitored centrally to be out in network operation. The attackers can change the IP address and
disturb the communication to authenticate services or IP address certificate authorities are generated security certificate to the
remote servers. Attackers also able to modify the host address of the certificate which again creates failure network
operations. These attacks create unnecessary overload at the switches/controller side in SDN.
In this paper, we have proposed a model for stopping the malicious IP's at the switch/controller level to reduce the load of the
controller. For finding the actual attacker, In this formal model, we have considered the ascertain of certificate and IP address.
We have considered one observer which records the certificate and IP address of the request/responses. These request and
response are converted in LTS. These LTSes are merged for finding the malicious attacker location. We have demonstrated
our proposal with the examples.

Published
2022-11-03