A taxonomy for software-defined networking, man-in-the-middle attacks
dc.contributor.advisor | McEachen, John | |
dc.contributor.advisor | Beverly, Rob | |
dc.contributor.author | Fischer, Briana D. | |
dc.contributor.author | Lato, Anita M. | |
dc.date | Sep-16 | |
dc.date.accessioned | 2016-11-02T17:18:28Z | |
dc.date.available | 2016-11-02T17:18:28Z | |
dc.date.issued | 2016-09 | |
dc.identifier.uri | http://hdl.handle.net/10945/50541 | |
dc.description.abstract | In contrast to traditional networks, Software Defined Networking (SDN) allows the programming of network functions via an Application Programming Interface (API). The ability to implement the APIs in software is advantageous for traffic manipulation in SDN. With automated logic being programmed into a centralized component of the SDN, network operators are presented with new and scalable methods for traffic manipulation. Enterprises and Internet Service Providers of all sizes can implement these techniques to great effect. Of particular concern are large state-owned providers. A motivation for this thesis came from a case study on China's Great Cannon and how the operators redirect benign traffic via content injection. In a technically similar fashion, we implemented targeted redirection on a software-defined network. Our experimentation demonstrates how an owner of the network can use man-in-the-middle (MiTM) techniques to redirect the traffic of unknowing users. To enable these techniques we wrote a MiTM application to redirect targeted users to a malicious server. Within a multi-switch test bed, our experimental results show that forcing our MiTM application to pass the injected response packet on a directed path to the switch closest to the targeted destination reduces the overall response time. In addition to testing for a route that would reduce overall HTTP response times, we illustrate the technical requirements of the attack in our MiTM taxonomy. | en_US |
dc.description.uri | http://archive.org/details/ataxonomyforsoft1094550541 | |
dc.publisher | Monterey, California: Naval Postgraduate School | en_US |
dc.rights | This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. | en_US |
dc.title | A taxonomy for software-defined networking, man-in-the-middle attacks | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Computer Science | |
dc.subject.author | software-defined networking | en_US |
dc.subject.author | man in the middle | en_US |
dc.subject.author | iframe injection | en_US |
dc.subject.author | openflow | en_US |
dc.subject.author | Ryu | en_US |
dc.subject.author | mininet | en_US |
dc.description.service | Civilian, Department of Defense | en_US |
dc.description.service | Civilian, Department of Defense | en_US |
etd.thesisdegree.name | Master of Science in Computer Science | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Computer Science | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works.