软件定义网络中控制器交换机受损引发的DDoS攻击的早期检测与减少

S. R, Ashutosh Pattanaik, Anshul Gupta, A. Kanavalli
{"title":"软件定义网络中控制器交换机受损引发的DDoS攻击的早期检测与减少","authors":"S. R, Ashutosh Pattanaik, Anshul Gupta, A. Kanavalli","doi":"10.1109/DISCOVER47552.2019.9007925","DOIUrl":null,"url":null,"abstract":"Software Defined Networks (SDN) provides separation of data plane and control plane, which can be used for implementing various network solutions like traffic engineering, intrusion detection load balancing, etc. However, there are few issues relating to SDN that needs to be addressed, one of them being Distributed Denial of Service (DDoS) attack on the centralized controller. Many researchers have contributed various solutions for identifying and mitigating such attacks. However, the intruders often find new ways of performing such DDoS attacks and hence the detection of such attacks takes more time and resources. In this paper, the aim is to demonstrate how a DDoS attack can be initiated on an SDN controller by the compromised switches whose idle and hard timeout values are manipulated to send repeated flow table entry requests to the controller. Furthermore, a solution is also proposed to detect such an attack within the second repeated request and mitigate it immediately. This solution is highly efficient as the attack is detected instantly instead of calculating a threshold based on the number of flow entry requests to identify whether the traffic is attack traffic or a genuine one.","PeriodicalId":274260,"journal":{"name":"2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Early Detection and Diminution of DDoS attack instigated by compromised switches on the controller in Software Defined Networks\",\"authors\":\"S. R, Ashutosh Pattanaik, Anshul Gupta, A. Kanavalli\",\"doi\":\"10.1109/DISCOVER47552.2019.9007925\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software Defined Networks (SDN) provides separation of data plane and control plane, which can be used for implementing various network solutions like traffic engineering, intrusion detection load balancing, etc. However, there are few issues relating to SDN that needs to be addressed, one of them being Distributed Denial of Service (DDoS) attack on the centralized controller. Many researchers have contributed various solutions for identifying and mitigating such attacks. However, the intruders often find new ways of performing such DDoS attacks and hence the detection of such attacks takes more time and resources. In this paper, the aim is to demonstrate how a DDoS attack can be initiated on an SDN controller by the compromised switches whose idle and hard timeout values are manipulated to send repeated flow table entry requests to the controller. Furthermore, a solution is also proposed to detect such an attack within the second repeated request and mitigate it immediately. This solution is highly efficient as the attack is detected instantly instead of calculating a threshold based on the number of flow entry requests to identify whether the traffic is attack traffic or a genuine one.\",\"PeriodicalId\":274260,\"journal\":{\"name\":\"2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DISCOVER47552.2019.9007925\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DISCOVER47552.2019.9007925","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

软件定义网络SDN (Software Defined Networks)提供了数据平面和控制平面的分离,可用于实现各种网络解决方案,如流量工程、入侵检测负载均衡等。然而,与SDN相关的问题很少需要解决,其中之一是对集中式控制器的分布式拒绝服务(DDoS)攻击。许多研究人员为识别和减轻此类攻击提供了各种解决方案。然而,入侵者经常找到执行此类DDoS攻击的新方法,因此检测此类攻击需要更多的时间和资源。在本文中,目的是演示如何通过被破坏的交换机在SDN控制器上发起DDoS攻击,这些交换机的空闲和硬超时值被操纵以向控制器发送重复的流表输入请求。此外,还提出了在第二次重复请求中检测此类攻击并立即减轻攻击的解决方案。该解决方案的效率很高,可以立即检测到攻击,而不是根据流量进入请求的数量计算阈值来识别流量是攻击流量还是真实流量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Early Detection and Diminution of DDoS attack instigated by compromised switches on the controller in Software Defined Networks
Software Defined Networks (SDN) provides separation of data plane and control plane, which can be used for implementing various network solutions like traffic engineering, intrusion detection load balancing, etc. However, there are few issues relating to SDN that needs to be addressed, one of them being Distributed Denial of Service (DDoS) attack on the centralized controller. Many researchers have contributed various solutions for identifying and mitigating such attacks. However, the intruders often find new ways of performing such DDoS attacks and hence the detection of such attacks takes more time and resources. In this paper, the aim is to demonstrate how a DDoS attack can be initiated on an SDN controller by the compromised switches whose idle and hard timeout values are manipulated to send repeated flow table entry requests to the controller. Furthermore, a solution is also proposed to detect such an attack within the second repeated request and mitigate it immediately. This solution is highly efficient as the attack is detected instantly instead of calculating a threshold based on the number of flow entry requests to identify whether the traffic is attack traffic or a genuine one.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信