Ayman M. Bahaa-Eldin, Ebada Essam-Eldin ElDessouky, H. Dağ
{"title":"Protecting openflow switches against denial of service attacks","authors":"Ayman M. Bahaa-Eldin, Ebada Essam-Eldin ElDessouky, H. Dağ","doi":"10.1109/ICCES.2017.8275355","DOIUrl":null,"url":null,"abstract":"This paper presents a novel approach to protect Openflow switches against a type of Denial of Service (DoS) attacks. Openflow switches are the core of Software Defined Networks (SDN) and they are very flexible, programmable, and can be used for several functionalities within a network. As the control algorithm of the switch is implemented on a separate computer (Controller), this software can be implemented on any part of the network packet including Layers 2, 3, and 4 headers. Therefore, an Openflow switch can work as a conventional switch, a router or a firewall. The open design of Openflow makes it vulnerable to several types of DoS attacks. One of those attacks is to overwhelm the switch flow table with entities larger than its buffer making legitimate packets unable to traverse the switch. The proposed approach depends on a Sandbox like model, where a second switch and controller is implemented and all new packets with no matching rules are forwarded to the Sandbox. The Sandbox clone is monitored and controlled, so a forwarding rule is always created on the Sandbox switch and transferred only to the working switch when it is classified as a normal rule. Otherwise, a cleanup operation is executed periodically on the sandbox switch to remove malicious rules. Rules are classified based on the statistics entries already existing in Openflow switches flow table. The proposed approach is simple and does not need any extra memory or modifications in the switches. It is proven to mitigate this type of DoS attacks.","PeriodicalId":170532,"journal":{"name":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 12th International Conference on Computer Engineering and Systems (ICCES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES.2017.8275355","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
This paper presents a novel approach to protect Openflow switches against a type of Denial of Service (DoS) attacks. Openflow switches are the core of Software Defined Networks (SDN) and they are very flexible, programmable, and can be used for several functionalities within a network. As the control algorithm of the switch is implemented on a separate computer (Controller), this software can be implemented on any part of the network packet including Layers 2, 3, and 4 headers. Therefore, an Openflow switch can work as a conventional switch, a router or a firewall. The open design of Openflow makes it vulnerable to several types of DoS attacks. One of those attacks is to overwhelm the switch flow table with entities larger than its buffer making legitimate packets unable to traverse the switch. The proposed approach depends on a Sandbox like model, where a second switch and controller is implemented and all new packets with no matching rules are forwarded to the Sandbox. The Sandbox clone is monitored and controlled, so a forwarding rule is always created on the Sandbox switch and transferred only to the working switch when it is classified as a normal rule. Otherwise, a cleanup operation is executed periodically on the sandbox switch to remove malicious rules. Rules are classified based on the statistics entries already existing in Openflow switches flow table. The proposed approach is simple and does not need any extra memory or modifications in the switches. It is proven to mitigate this type of DoS attacks.