Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Tunnel enabled programmable switches obfuscate network topology to defend against link flooding reconnaissance in software defined networking

Full metadata record
DC Field Value Language
dc.contributor.author이연준-
dc.date.accessioned2025-10-14T02:00:34Z-
dc.date.available2025-10-14T02:00:34Z-
dc.date.issued2025-10-
dc.identifier.issn2045-2322-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/126665-
dc.description.abstractRecently, Software-Defined Networking (SDN) has emerged as an increasingly popular network paradigm due to its virtualization capabilities and flexibility. However, its robustness in link connectivity is threatened by Link Flooding Attacks (LFAs). To launch LFAs, adversaries use probing tools to infer network topologies and identify target links with bottlenecks. Thus, protecting SDN topologies against disclosure is crucial to ensure system security and preserve infrastructure functionality. We propose TEPS (Tunnel-Enabled Programmable Switches), a proactive defense system that dynamically obfuscates network topologies to defend against adversarial reconnaissance in SDN. TEPS generates false topologies by leveraging the flexibility of emerging programmable switches to construct customized tunnels and manipulate probing packets using the P4 language. This prevents adversaries from obtaining accurate knowledge of network topologies, making it difficult to reconstruct the true topologies. Furthermore, TEPS counters Round-Trip Time (RTT)-based fingerprinting attacks by dynamically adjusting packet delays and routing traffic to conceal RTT variations. Our evaluation demonstrates that TEPS effectively reduces the distribution of link importance in network topologies compared to the latest proactive defense method, thereby concealing bottlenecks and disrupting adversarial topology reconnaissance, including thwarting RTT-based fingerprinting attempts. Furthermore, by leveraging the capabilities of P4 switches, TEPS introduces minimal network overhead, with at most a 3% reduction in throughput and a 9.57% increase in resource utilization, showing practical feasibility under real-world operational constraints. By implementing TEPS, network administrators can enhance the security of their SDN infrastructures against LFAs and maintain robust connectivity through a lightweight approach.-
dc.format.extent18-
dc.language영어-
dc.language.isoENG-
dc.publisherNATURE PORTFOLIO-
dc.titleTunnel enabled programmable switches obfuscate network topology to defend against link flooding reconnaissance in software defined networking-
dc.typeArticle-
dc.publisher.location영국-
dc.identifier.doi10.1038/s41598-025-19566-7-
dc.identifier.bibliographicCitationSCIENTIFIC REPORTS, v.15, pp 1 - 18-
dc.citation.titleSCIENTIFIC REPORTS-
dc.citation.volume15-
dc.citation.startPage1-
dc.citation.endPage18-
dc.type.docType정기학술지(Article(Perspective Article포함))-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Yeon joon photo

Lee, Yeon joon
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE