NFV-GUARD: Mitigating Flow Table-Overflow Attacks in SDN Using NFV

被引:7
|
作者
Soylu, Mustafa [1 ]
Guillen, Luis [2 ]
Izumi, Satoru [3 ]
Abe, Toru [1 ,4 ]
Suganuma, Takuo [1 ,4 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi, Japan
[2] Tohoku Univ, Res Inst Elect Commun RIEC, Sendai, Miyagi, Japan
[3] Sendai Coll, Natl Inst Technol, Sendai, Miyagi, Japan
[4] Tohoku Univ, Cybersci Ctr, Sendai, Miyagi, Japan
关键词
SDN; NFV; Table Overflow;
D O I
10.1109/NetSoft51509.2021.9492584
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software Defined Networking (SDN) has recently drawn attention by changing the network control paradigm. SDN devices handle the network traffic based on entries stored in their flow table. However, due to the flow table's limited size, attacks such as DDoS can cause the table to overflow. Some of the current table overflow mitigation methods distribute flow entries to other network devices on the physical infrastructure, which might not be effective in small to medium-sized private networks. Therefore, this research proposes a method to mitigate table overflow attacks on SDN by dynamically filtering attackers using Network Function Virtualization (NFV). Preliminary results show that the proposed approach can effectively mitigate table overflow attacks without relying on network infrastructure.
引用
收藏
页码:263 / 267
页数:5
相关论文
共 50 条
  • [21] Mobility Management in AP Using SDN-NFV Technologies
    Gilani, Syed Mushhad M.
    Jin, Wenqiang
    Hong, Tang
    Zhao, Guofeng
    Xu, Chuan
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2018, 423 : 3 - 12
  • [22] Mobile Networks Disaster Recovery Using SDN-NFV
    Volvach, Ievgen
    Globa, Larysa
    2016 International Conference Radio Electronics & Info Communications (UkrMiCo), 2016,
  • [23] OpenFlow Flow Table Overflow Attacks and Countermeasures
    Qian, Ying
    You, Wanqing
    Qian, Kai
    2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), 2016, : 205 - 209
  • [24] IPv6 DoS Attacks Detection Using Machine Learning Enhanced IDS in SDN/NFV Environment
    Tseng, Chia-Wei
    Wu, Li-Fan
    Hsu, Shih-Chun
    Yu, Sheng-Wang
    APNOMS 2020: 2020 21ST ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2020, : 263 - 266
  • [25] Using a Flexibility Measure for Network Design Space Analysis of SDN and NFV
    Kellerer, Wolfgang
    Basta, Arsany
    Blenk, Andreas
    2016 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2016,
  • [26] FTMaster: A Detection and Mitigation System of Low-Rate Flow Table Overflow Attacks via SDN
    Tang, Dan
    Gao, Chenjun
    Liang, Wei
    Zhang, Jiliang
    Li, Keqin
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (04): : 5073 - 5084
  • [27] Mobility management in IEEE 802.11 WLAN using SDN/NFV technologies
    Syed Mushhad M. Gilani
    Tang Hong
    Wenqiang Jin
    Guofeng Zhao
    H. Meng Heang
    Chuan Xu
    EURASIP Journal on Wireless Communications and Networking, 2017
  • [28] A Survey of Network Virtualization Techniques for Internet of Things Using SDN and NFV
    Alam, Iqbal
    Sharif, Kashif
    Li, Fan
    Latif, Zohaib
    Karim, M. M.
    Biswas, Sujit
    Nour, Boubakr
    Wang, Yu
    ACM COMPUTING SURVEYS, 2020, 53 (02)
  • [29] Traffic-aware dynamic controller placement in SDN using NFV
    G. Ramya
    R. Manoharan
    The Journal of Supercomputing, 2023, 79 : 2082 - 2107
  • [30] An Effective Lightweight Intrusion Detection System with Blockchain to Mitigate Attacks in SDN/NFV Enabled Cloud
    Abdulqadder, Ihsan H.
    Zhou, Shijie
    Aziz, Israa T.
    Zou, Deqing
    Deng, Xianjun
    Akber, Syed Muhammad Abrar
    2021 6TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2021,