{"title":"Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in SDN","authors":"Phan The Duy, Hoai An Le Thi, V. Pham","doi":"10.1145/3371676.3371706","DOIUrl":null,"url":null,"abstract":"Controller is a key component in the three layers of Software - Defined Networking (SDN), which is to process a huge number of flow requests from network devices. As a result, it puts a flow rule into flow table in switch according to every incoming packet. However, the capacity of flow table is limited and can be the target of malicious attacks by taking advantage of installing rules from controller. Specifically, malicious rules can be pushed from controller to occupy the available space for new benign traffic due to controlling and directing the packets in SDN relied on flow rules installation. These tables can be full of a massive number of flow entries populated from controller, leading to be out of space for new benign flows. This paper gives a method to mitigate flow table overloading attack after a DDoS attack notification. It can help the data plane to be more secured by improving the availability of flow table with a strategy of real-time packet monitoring and flow management in controller.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2019 9th International Conference on Communication and Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3371676.3371706","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Controller is a key component in the three layers of Software - Defined Networking (SDN), which is to process a huge number of flow requests from network devices. As a result, it puts a flow rule into flow table in switch according to every incoming packet. However, the capacity of flow table is limited and can be the target of malicious attacks by taking advantage of installing rules from controller. Specifically, malicious rules can be pushed from controller to occupy the available space for new benign traffic due to controlling and directing the packets in SDN relied on flow rules installation. These tables can be full of a massive number of flow entries populated from controller, leading to be out of space for new benign flows. This paper gives a method to mitigate flow table overloading attack after a DDoS attack notification. It can help the data plane to be more secured by improving the availability of flow table with a strategy of real-time packet monitoring and flow management in controller.