• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Chen, X. (Chen, X..) [1] | Liu, H. (Liu, H..) [2] | Huang, Q. (Huang, Q..) [3] | Zhang, D. (Zhang, D..) [4] (Scholars:张栋) | Zhou, H. (Zhou, H..) [5] | Wu, C. (Wu, C..) [6] | Liu, X. (Liu, X..) [7] | Khan, M.K. (Khan, M.K..) [8]

Indexed by:

Scopus

Abstract:

Due to limited memory usage and provably high accuracy, sketches running on programmable switches have been commonly used by the literature for network measurement. However, their vulnerabilities are still largely unknown and neglected, which is highly concerning given the increasing popularity of network measurement. In this paper, we identify the Stalker attacks, where attackers aim to degrade the accuracy of sketches running on programmable switches. More precisely, attackers tamper with some sketch operations during sketch deployment atop programmable switches. At runtime, the tampered sketch will record highly inaccurate flow data, which degrades measurement accuracy. We implement Stalker attacks on Tofino switches. The results indicate that Stalker attacks significantly drop the accuracy of network management applications, e.g., reducing the F1 score of heavy hitter detection to zero. However, our analysis indicates that none of existing methods can detect Stalker attacks since they can hardly verify the correctness of sketch operations. Finally, we analyze potential defense mechanisms and identify challenges to enable further research in this context. IEEE

Keyword:

attacks Computer science Control systems Electronic mail Error analysis Hash functions Indexes Programmable switches Runtime sketches

Community:

  • [ 1 ] [Chen X.]College of Computer Science and Technology, Zhejiang University, China
  • [ 2 ] [Liu H.]College of Computer Science and Technology, Zhejiang University, China
  • [ 3 ] [Huang Q.]Peking University, China
  • [ 4 ] [Zhang D.]College of Computer Science and Big Data, Fuzhou University, China
  • [ 5 ] [Zhou H.]College of Control Science and Engineering, Zhejiang University, China
  • [ 6 ] [Wu C.]College of Computer Science and Technology, Zhejiang University, China
  • [ 7 ] [Liu X.]College of Information Engineering (College of Artificial Intelligence), Yangzhou University, China
  • [ 8 ] [Khan M.K.]Center of Excellence in Information Assurance (CoEIA), King Saud University, Saudi Arabia

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Information Forensics and Security

ISSN: 1556-6013

Year: 2023

Volume: 18

Page: 1-1

6 . 3

JCR@2023

6 . 3 0 0

JCR@2023

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 1

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:99/10067056
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1