Securing Software-Defined Network Topology Discovery: A Comprehensive Review of Attack Detection

Authors

  • Jayesh Chaudhary
  • Jaydeep Barad
  • Bhavesh Patel

DOI:

https://doi.org/10.22399/ijcesen.3194

Keywords:

Deep Learning, Machine Learning, Software-Defined Network, Topology Discovery

Abstract

Software-Defined Network (SDN) has altered interconnected system operation by dividing data layer and control layers, which allows flexible, efficient, and programmable network configurations. To protect the integrity of geospatial data, centralized control, and transformational architecture of SDN is required. SDN controller service topology discovery is important for network services which can be susceptible to malicious activities. This Paper thoroughly examines the current attack detection methods during the topology discovery process. It reviews several topology discovery threats consisting of host location hijacking, topology poisoning, and link spoofing attacks. This paper summarizes valuable scopes, challenges, and future research scope, which can be a strong foundation for the development of a strong and resilient detection system to secure SDN networks against attacks done during topology discovery process.

References

[1] Shrivastava, P., & Kataoka, K. (2021). Topology poisoning attacks and prevention in hybrid software-defined networks. IEEE Transactions on Network and Service Management, 19(1), 510–523. https://doi.org/10.1109/TNSM.2021.3122491.

[2] Chuang, H. M., Liu, F., & Tsai, C. H. (2022). Early detection of abnormal attacks in software defined networking using machine learning approaches. Symmetry, 14(6), 1178. https://doi.org/10.3390/sym14061178.

[3] Smyth, D., Scott-Hayward, S., Cionca, V., McSweeney, S., & O’Shea, D. (2023). SECAP switch—Defeating topology poisoning attacks using P4 data planes. Journal of Network and Systems Management,31(1),28. https://doi.org/10.1007/s10922-023-09663-5.

[4] Soltani, S., Shojafar, M., Mostafaei, H., Pooranian, Z., & Tafazolli, R. (2021, October). Link latency attack in software-defined networks. In 2021 17th International Conference on Network and Service Management (CNSM) (pp. 187–193). IEEE. https://doi.org/10.23919/CNSM52442.2021.9615533.

[5] Zhang, T., & Wang, Y. (2023). RLFAT: A transformer-based relay link forged attack detection mechanism in SDN. Electronics, 12(10), 2247. https://doi.org/10.3390/electronics12102247.

[6] Joseph, K., Eyobu, O. S., Kasyoka, P., & Oyana, T. J. (2022). A Link Fabrication Attack Mitigation Approach (LiFAMA) for Software Defined Networks. Electronics, 11(10), 1581. https://doi.org/10.3390/electronics11101581.

[7] Wazirali, R., Ahmad, R., & Alhiyari, S. (2021). SDN-OpenFlow topology discovery: An overview of performance issues. Applied Sciences, 11(15), 6999. https://doi.org/10.3390/app11156999.

[8] Huang, X., Shi, P., Liu, Y., & Xu, F. (2020). Towards trusted and efficient SDN topology discovery: A lightweight topology verification scheme. Computer Networks, 170, 107119. https://doi.org/10.1016/j.comnet.2020.107119.

[9] Li-Der, C., Chien-Chang, L., Meng-Sheng, L., Kai-Cheng, C., Tu, H. H., Sen, S., & Tsai, W. H. (2020). Behavior anomaly detection in SDN control plane: A case study of topology discovery attacks. Wireless Communications and Mobile Computing, 2020, 1–13. https://doi.org/10.1155/2020/8898738.

[10] Baidya, S. S., & Hewett, R. (2020). Link discovery attacks in software-defined networks: Topology poisoning and impact analysis. Journal of Communications, 15(8), 596–606. https://doi.org/10.12720/jcm.15.8.596-606.

[11] Ochoa-Aday, L., Cervelló-Pastor, C., & Fernández-Fernández, A. (2019). eTDP: Enhanced topology discovery protocol for software-defined networks. IEEE Access, 7, 23471–23487. https://doi.org/10.1109/ACCESS.2019.2899653.

[12] Nehra, A., Tripathi, M., Gaur, M., Babu, B., & Lal, C. (2018). SLDP: A secure and lightweight link discovery protocol for software defined networking. Computer Networks, 150, 225–239. https://doi.org/10.1016/j.comnet.2018.12.014.

[13]Bui, T., Antikainen, M., & Aura, T. (2019). Analysis of topology poisoning attacks in software-defined networking. In Secure IT Systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings (Vol. 11875, pp. 87–102). Springer. https://doi.org/10.1007/978-3-030-35055-0_6.

[14] Xiang, S., Zhu, H., Wu, X., Xiao, L., Bonsangue, M., Xie, W., & Zhang, L. (2020). Modeling and verifying the topology discovery mechanism of OpenFlow controllers in software-defined networks using process algebra. Science of Computer Programming, 187, 102343. https://doi.org/10.1016/j.scico.2019.102343

[15] Nehra, A., Tripathi, M., Gaur, M., Babu, B., & Lal, C. (2018). TILAK: A token‐based prevention approach for topology discovery threats in SDN. International Journal of Communication Systems, 32(1), e3781. https://doi.org/10.1002/dac.3781

[16] Kong, D., Li, Q., Chen, J., Wang, J., Wang, Y., & Liu, Y. (2023). Combination attacks and defenses on SDN topology discovery. IEEE/ACM Transactions on Networking, 31(2), 904–919. https://doi.org/10.1109/TNET.2022.3203561

[17] Soltani, S., Shojafar, M., Mostafaei, H., & Tafazolli, R. (2023). Real-time link verification in software-defined networks. IEEE Transactions on Network and Service Management, 20(3), 3596–3611. https://doi.org/10.1109/TNSM.2023.3238691.

[18] Alharbi, T., Portmann, M., & Pakzad, F. (2015). The (in)security of topology discovery in software defined networks. In 2015 IEEE 40th Conference on Local Computer Networks (LCN) (pp. 502–505). IEEE. https://doi.org/10.1109/LCN.2015.7366363.

[19] Zhao, X., Yao, L., & Wu, G. (2017). ESLD: An efficient and secure link discovery scheme for software-defined networking. International Journal of Communication Systems, 31(3), e3552. https://doi.org/10.1002/dac.3552.

[20] Ravi, N., Shalinie, S. M., & Jose Theres, D. D. (2020). BALANCE: Link flooding attack detection and mitigation via hybrid-SDN. IEEE Transactions on Network and Service Management, 17(3), 1715–1729. https://doi.org/10.1109/TNSM.2020.2997734.

[21] Dhawan, M., Poddar, R., Mahajan, K., & Mann, V. (2015). SPHINX: Detecting security attacks in software-defined networks. In Proceedings of the 2015 Network and Distributed System Security Symposium (NDSS). https://doi.org/10.14722/ndss.2015.23064.

[22] Nguyen, T.-H., & Yoo, M. (2017). A hybrid prevention method for eavesdropping attack by link spoofing in software-defined Internet of Things controllers. International Journal of Distributed Sensor Networks, 13(1), 1–11. https://doi.org/10.1177/1550147716682731.

[23] Bereziński, P., Jasiul, B., & Szpyrka, M. (2015). An entropy-based network anomaly detection method. Entropy, 17(4), 2367–2408. https://doi.org/10.3390/e17042367.

[24] Varadharajan, V., Karmakar, K., Tupakula, U., & Hitchens, M. (2019). A policy-based security architecture for software-defined networks. IEEE Transactions on Information Forensics and Security, 14(4), 897–912. https://doi.org/10.1109/TIFS.2018.2868220.

[25] Ali, S. T., Sivaraman, V., Radford, A., & Jha, S. (2015). A survey of securing networks using software defined networking. IEEE Transactions on Reliability, 64(3), 1086–1097. https://doi.org/10.1109/TR.2015.2421391.

[26] Deng, S., Gao, X., Lu, Z., & Gao, X. (2018). Packet injection attack and its defense in software-defined networks. IEEE Transactions on Information Forensics and Security, 13(3), 695–705. https://doi.org/10.1109/TIFS.2017.2765506.

[27]G Nithya, R, P. K., V. Dineshbabu, P. Umamaheswari, & T, K. (2025). Exploring the Synergy Between Neuro-Inspired Algorithms and Quantum Computing in Machine Learning. International Journal of Computational and Experimental Science and Engineering, 11(3). https://doi.org/10.22399/ijcesen.2484

[28]Kumari, S. (2025). Machine Learning Applications in Cryptocurrency: Detection, Prediction, and Behavioral Analysis of Bitcoin Market and Scam Activities in the USA. International Journal of Sustainable Science and Technology, 1(1). https://doi.org/10.22399/ijsusat.8

[29]Sivananda Hanumanthu, & Gaddikoppula Anil Kumar. (2025). Deep Learning Models with Transfer Learning and Ensemble for Enhancing Cybersecurity in IoT Use Cases. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.1037

[30]Chui, K. T. (2025). Artificial Intelligence in Energy Sustainability: Predicting, Analyzing, and Optimizing Consumption Trends. International Journal of Sustainable Science and Technology, 1(1). https://doi.org/10.22399/ijsusat.1

[31]Johnsymol Joy, & Mercy Paul Selvan. (2025). An efficient hybrid Deep Learning-Machine Learning method for diagnosing neurodegenerative disorders. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.701

[32]Olola, T. M., & Olatunde, T. I. (2025). Artificial Intelligence in Financial and Supply Chain Optimization: Predictive Analytics for Business Growth and Market Stability in The USA. International Journal of Applied Sciences and Radiation Research, 2(1). https://doi.org/10.22399/ijasrar.18

[33]R. Sundar, M. Ganesan, M.A. Anju, M. Ishwarya Niranjana, & T. Surya. (2025). A Context-Aware Content Recommendation Engine for Personalized Learning using Hybrid Reinforcement Learning Technique. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.912

[34]A, N. N., G. Siva, K. Kasiniya, S. Uma, & T, K. (2025). Optimizing Hybrid AI Models with Reinforcement Learning for Complex Problem Solving. International Journal of Computational and Experimental Science and Engineering, 11(3). https://doi.org/10.22399/ijcesen.2483

[35]Ibeh, C. V., & Adegbola, A. (2025). AI and Machine Learning for Sustainable Energy: Predictive Modelling, Optimization and Socioeconomic Impact In The USA. International Journal of Applied Sciences and Radiation Research, 2(1). https://doi.org/10.22399/ijasrar.19

Downloads

Published

2025-07-02

How to Cite

Jayesh Chaudhary, Jaydeep Barad, & Bhavesh Patel. (2025). Securing Software-Defined Network Topology Discovery: A Comprehensive Review of Attack Detection. International Journal of Computational and Experimental Science and Engineering, 11(3). https://doi.org/10.22399/ijcesen.3194

Issue

Section

Research Article