FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks

被引:203
|
作者
Wang, Haopei [1 ]
Xu, Lei [1 ]
Gu, Guofei [1 ]
机构
[1] Texas A&M Univ, SUCCESS Lab, College Stn, TX 77843 USA
基金
美国国家科学基金会;
关键词
Software-Defined Networking (SDN); Security; Denial-of-Service Attack;
D O I
10.1109/DSN.2015.27
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper addresses one serious SDN-specific attack, i.e., data-to-control plane saturation attack, which overloads the infrastructure of SDN networks. In this attack, an attacker can produce a large amount of table-miss packet_in messages to consume resources in both control plane and data plane. To mitigate this security threat, we introduce an efficient, lightweight and protocol-independent defense framework for SDN networks. Our solution, called FLOODGUARD, contains two new techniques/modules: proactive flow rule analyzer and packet migration. To preserve network policy enforcement, proactive flow rule analyzer dynamically derives proactive flow rules by reasoning the runtime logic of the SDN/OpenFlow controller and its applications. To protect the controller from being overloaded, packet migration temporarily caches the flooding packets and submits them to the OpenFlow controller using rate limit and round-robin scheduling. We evaluate FLOODGUARD through a prototype implementation tested in both software and hardware environments. The results show that FLOODGUARD is effective with adding only minor overhead into the entire SDN/OpenFlow infrastructure.
引用
收藏
页码:239 / 250
页数:12
相关论文
共 50 条
  • [21] A Table Overflow LDoS Attack Defending Mechanism in Software-Defined Networks
    Xie, Shengxu
    Xing, Changyou
    Zhang, Guomin
    Zhao, Jinlong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [22] Defending Against Flow Table Overloading Attack in Software-Defined Networks
    Yuan, Bin
    Zou, Deqing
    Yu, Shui
    Jin, Hai
    Qiang, Weizhong
    Shen, Jinan
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 12 (02) : 231 - 246
  • [23] Topology Poisoning Attacks and Prevention in Hybrid Software-Defined Networks
    Shrivastava, Pragati
    Kataoka, Kotaro
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (01): : 510 - 523
  • [24] Languages for Software-Defined Networks
    Foster, Nate
    Guha, Arjun
    Reitblatt, Mark
    Story, Alec
    Freedman, Michael J.
    Katta, Naga Praveen
    Monsanto, Christopher
    Reich, Joshua
    Rexford, Jennifer
    Schlesinger, Cole
    Walker, David
    Harrison, Major Robert
    IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (02) : 128 - 134
  • [25] Status of address spoofing attack prevention techniques in software-defined networking (SDN)
    Meena, Ramesh Chand
    Meena, Keshav
    Kumar, Ankit
    Gupta, Mukesh
    Kumar, Santosh
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (08): : 2341 - 2351
  • [26] On the Fingerprinting of Software-Defined Networks
    Cui, Heng
    Karame, Ghassan O.
    Klaedtke, Felix
    Bifulco, Roberto
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2160 - 2173
  • [27] On the Security of Software-Defined Networks
    Prasad, Abhinandan S.
    Koll, David
    Fu, Xiaoming
    2015 FOURTH EUROPEAN WORKSHOP ON SOFTWARE DEFINED NETWORKS - EWSDN 2015, 2015, : 105 - 106
  • [28] Abstractions for Software-Defined Networks
    Casado, Martin
    Foster, Nate
    Guha, Arjun
    COMMUNICATIONS OF THE ACM, 2014, 57 (10) : 86 - 95
  • [29] Software-Defined Access Networks
    Elbers, Joerg-Peter
    Grobe, Klaus
    Magee, Anthony
    2014 EUROPEAN CONFERENCE ON OPTICAL COMMUNICATION (ECOC), 2014,
  • [30] Fingerprinting Software-defined Networks
    Bifulco, Roberto
    Cui, Heng
    Karame, Ghassan O.
    Klaedtke, Felix
    2015 IEEE 23RD INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2015, : 453 - 459