DDoS attacks on data plane of software-defined network: are they possible?

被引:7
|
作者
Wu, Xiaotong [1 ]
Liu, Meng [1 ]
Dou, Wanchun [1 ]
Yu, Shui [2 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Jiangsu, Peoples R China
[2] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
基金
美国国家科学基金会;
关键词
software-defined network; flooding DDoS; stealthy DDoS; DDoS detection; SECURITY;
D O I
10.1002/sec.1709
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With software-defined networking (SDN) becoming the leading technology for large-scale networks, it is definitely expected that SDN will suffer various types of distributed denial-of-service (DDoS) attacks because of its centralized control logic. However, almost all of existing works concentrate on the controller overloading DDoS attacks, while vulnerabilities exposed by data plane of SDN for DDoS attacks are largely ignored. In this paper, we firstly investigate a flow rule flooding DDoS attack. By thoroughly analyzing the flow table size and miss rate, we find that attackers are able to inflict significant performance degradation over the system with limited volume of attack resource. We then prove that it is possible for attackers to maximize the performance degradation and minimize the attack rate at the same time. Besides the flooding DDoS attack, we also study a novel DDoS attack targeting data plane of SDN. By utilizing the entry lifetime management mechanism of flow tables, this attack almost never exhibits an intensive controller access behavior. It flies under the radar by inflicting non-notable performance impact on the system, while it creates heavy long-term financial burden on the target application. Finally, we present a potential countermeasure for this stealthy DDoS attack. Through extensive experiments, we conclude that DDoS attacks targeting data plane are possible. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:5444 / 5459
页数:16
相关论文
共 50 条
  • [31] Early Detection of DDoS Attacks Against Software Defined Network Controllers
    Seyed Mohammad Mousavi
    Marc St-Hilaire
    Journal of Network and Systems Management, 2018, 26 : 573 - 591
  • [32] DDoS protection with stateful software-defined networking
    Rebecchi, Filippo
    Boite, Julien
    Nardin, Pierre-Alexis
    Bouet, Mathieu
    Conan, Vania
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2019, 29 (01)
  • [34] On Generality of the Data Plane and Scalability of the Control Plane in Software-Defined Networking
    Zuo Qingyun
    Chen Ming
    Ding Ke
    Xu Bo
    CHINA COMMUNICATIONS, 2014, 11 (02) : 55 - 64
  • [35] Extended data plane architecture for in-network security services in software-defined networks
    Kim, Jinwoo
    Kim, Yeonkeun
    Yegneswaran, Vinod
    Porras, Phillip
    Shin, Seungwon
    Park, Taejune
    COMPUTERS & SECURITY, 2023, 124
  • [36] Online Load Balancing for Distributed Control Plane in Software-Defined Data Center Network
    Zhang, Shaojun
    Lan, Julong
    Sun, Penghao
    Jiang, Yiming
    IEEE ACCESS, 2018, 6 : 18184 - 18191
  • [37] Virtual Network Mapping for Multi-Domain Data Plane in Software-Defined Networks
    Zhou, Boyang
    Gao, Wen
    Zhao, Shanshan
    Lu, Xinjia
    Du, Zhong
    Wu, Chunming
    Yang, Qiang
    2014 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS (VITAE), 2014,
  • [38] Development of Software-Defined Mesh Network Emulator Testbed for DDoS Defence Study
    Sirijaroensombat, Sumeth
    Nangsue, Phaderm
    Aswakul, Chaodit
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 468 - 472
  • [39] Misreporting Attacks in Software-Defined Networking
    Burke, Quinn
    McDaniel, Patrick
    La Porta, Thomas
    Yu, Mingli
    He, Ting
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT I, 2020, 335 : 276 - 296
  • [40] A Machine Learning Framework for Prevention of Software-Defined Networking controller from DDoS Attacks and dimensionality reduction of big data
    Ali, Jehad
    Roh, Byeong-hee
    Lee, Byungkyu
    Oh, Jimyung
    Adil, Muhammad
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 515 - 519