@inproceedings{e86781e53a0d4e5c869e83e7b148456a,
title = "Controlling your neighbour{\textquoteright}s bandwidth for fun and for profit",
abstract = "We carry out a systematic study of the attack-resilience of flow-rule replacement strategies for switch caches in Software-Defined Networks. Flow Rules are inserted into the switch at the request of the network hosts to direct traffic- replacing older rules when the switch flow table is full. Malicious hosts can leverage the flow rule replacement strategy to launch cache flushing attacks. This results in substantially reducing the network throughput of their neighbours forcing their traffic to slow down dramatically. We describe and evaluate the attack on the First-In-First-Out strategy- the defacto SDN flow-rule replacement strategy.",
keywords = "bandwidth, network security, attack resiliences, malicious host, network hosts",
author = "Jonathan Weekes and Shishir Nagaraja",
year = "2017",
month = jan,
day = "1",
doi = "10.1007/978-3-319-71075-4_23",
language = "English",
isbn = "9783319710747",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer-Verlag",
pages = "214--223",
editor = "Frank Stajano and Bruce Christianson and Vashek Matyas and Jonathan Anderson",
booktitle = "Security Protocols XXV - 25th International Workshop, Revised Selected Papers",
note = "25th International Workshop on Security Protocols, 2017 ; Conference date: 20-03-2017 Through 22-03-2017",
}