rDefender: A Lightweight and Robust Defense Against Flow Table Overflow Attacks in SDN

被引:1
|
作者
Kong, Dezhang [1 ,2 ]
Chen, Xiang [1 ,2 ]
Wu, Chunming [1 ,2 ]
Shen, Yi [1 ]
Zhou, Zhengyan [1 ,2 ]
Cheng, Qiumei [1 ]
Liu, Xuan [3 ]
Yang, Mingliang [4 ]
Qiu, Yubing [4 ]
Zhang, Dong [5 ]
Khan, Muhammad Khurram [6 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310058, Peoples R China
[2] Quan Cheng Lab, Jinan 250103, Peoples R China
[3] Yangzhou Univ, Coll Informat Engn, Coll Artificial Intelligence, Yangzhou 225009, Peoples R China
[4] Alibaba Cloud, Hangzhou 311121, Peoples R China
[5] Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350002, Peoples R China
[6] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11421, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Software-defined networking; table overflow attacks; security; RATE DDOS ATTACK;
D O I
10.1109/TIFS.2024.3472477
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The flow table is a critical component of Software-Defined Networking (SDN). However, flow tables' limited capacity makes them highly vulnerable to flow table overflow attacks (FTOAs). Due to the low attack cost and highly flexible attack forms, it is hard to eradicate FTOAs. This paper addresses three unsolved problems for table security and proposes a robust defense accordingly. First, we reveal that the existing defenses with fixed defense speeds will cause severe packet loss when handling diverse traffic. We prove that deleting multiple rules can efficiently solve this problem and give a rigorous derivation to calculate the suitable deletion number according to the environment. Second, we illustrate that abnormal table occupancy squeezing is a constant characteristic of FTOAs regardless of attack forms. It can be used to identify attacked ports accurately in different scenarios. Third, we mathematically prove that random deletion can guarantee the continuous decrease of malicious flow rules after confirming attacked ports. It achieves fast speed and robust effectiveness in different environments. Based on these findings, we design rDefender, a robust and lightweight defense prototype. We evaluate its effect by designing diverse, powerful attacks and using real-world datasets and topology. The results demonstrate that it achieves the best overall performance compared to six existing mainstream defenses, providing stable security for switch flow tables.
引用
收藏
页码:9436 / 9451
页数:16
相关论文
共 50 条
  • [41] NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference Attacks
    Xu, Nuo
    Wang, Binghui
    Ran, Ran
    Wen, Wujie
    Venkitasubramaniam, Parv
    PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, 2022, : 669 - 683
  • [42] Setting Malicious Flow Entries Against SDN Operations: Attacks and Countermeasures
    Lin, Cheng-Hsu
    Li, Chi-Yu
    Wang, Kuochen
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 205 - 212
  • [43] POAGuard: A Defense Mechanism Against Preemptive Table Overflow Attack in Software-Defined Networks
    Liu, Yuming
    Wang, Yong
    Feng, Hao
    IEEE ACCESS, 2023, 11 : 123659 - 123676
  • [44] RoseAgg: Robust Defense Against Targeted Collusion Attacks in Federated Learning
    Yang, He
    Xi, Wei
    Shen, Yuhao
    Wu, Canhui
    Zhao, Jizhong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2951 - 2966
  • [45] Robust Defense Strategy Against Cyber Physical Attacks In Networked Microgrids
    Poursmaeil, Babak
    Ravadanegh, Sajad Najafi
    34TH INTERNATIONAL POWER SYSTEM CONFERENCE (PSC2019), 2019, : 709 - 715
  • [46] ROLDEF: RObust Layered DEFense for Intrusion Detection Against Adversarial Attacks
    Gungor, Onat
    Rosing, Tajana
    Alcsanli, Bans
    2024 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2024,
  • [47] Embedded TaintTracker: Lightweight Run-Time Tracking of Taint Data against Buffer Overflow Attacks
    Lai, Yuan-Cheng
    Lin, Ying-Dar
    Wu, Fan-Cheng
    Huang, Tze-Yau
    Lin, Frank C.
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2129 - 2138
  • [48] Collaborative Defense Against Hybrid Network Attacks by SDN Controllers and P4 Switches
    Wang, You-Chiun
    Su, Pin-Yu
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 1480 - 1495
  • [49] SDNShield: NFV-Based Defense Framework Against DDoS Attacks on SDN Control Plane
    Chen, Kuan-Yin
    Liu, Sen
    Xu, Yang
    Siddhrau, Ishant Kumar
    Zhou, Siyu
    Guo, Zehua
    Chao, H. Jonathan
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (01) : 1 - 17
  • [50] Research on Detection and Mitigation Methods of Adaptive Flow Table Overflow Attacks in Software-Defined Networks
    Zeng, Ying
    Wang, Yong
    Liu, Yuming
    IEEE ACCESS, 2024, 12 : 48830 - 48845