Slow denial-of-service attacks on software defined networks

被引:0
|
作者
Interdisciplinary Centre for Security, Reliability and Trust , University of Luxembourg, Luxembourg [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
基金
欧盟地平线“2020”; 巴西圣保罗研究基金会;
关键词
Ternary content adressable memory - Network security - Logic gates - Denial-of-service attack;
D O I
暂无
中图分类号
学科分类号
摘要
Software Defined Networking (SDN) is a network paradigm that decouples the network's control plane, delegated to the SDN controller, from the data plane, delegated to SDN switches. For increased efficiency, SDN switches use a high-performance Ternary Content-Addressable memory (TCAM) to install rules. However, due to the TCAM's high cost and power consumption, switches have a limited amount of TCAM memory. Consequently, a limited number of rules can be installed. This limitation has been exploited to carry out Distributed Denial of Service (DDoS) attacks, such as Saturation attacks, that generate large amounts of traffic. Inspired by slow application layer DDoS attacks, this paper presents and investigates DDoS attacks on SDN that do not require large amounts of traffic, thus bypassing existing defenses that are triggered by traffic volume. In particular, we offer two slow attacks on SDN. The first attack, called Slow TCAM Exhaustion attack (Slow-TCAM), is able to consume all SDN switch's TCAM memory by forcing the installation of new forwarding rules and maintaining them indeterminately active, thus disallowing new rules to be installed to serve legitimate clients. The second attack, called Slow Saturation attack, combines Slow-TCAM attack with a lower rate instance of the Saturation attack. A Slow Saturation attack is capable of denying service using a fraction of the traffic of typical Saturation attacks. Moreover, the Slow Saturation attack can also impact installed legitimate rules, thus causing a greater impact than the Slow-TCAM attack. In addition, it also affects the availability of other network's components, e.g., switches, even the ones not being directly targeted by the attack, as has been proven by our experiments. We propose a number of variations of these attacks and demonstrate their effectiveness by means of an extensive experimental evaluation. The Slow-TCAM is able to deny service to legitimate clients requiring only 38 s and sending less than 40 packets per second without abruptly changing network resources, such as CPU and memory. Moreover, besides denying service as a Slow-TCAM attack, the Slow Saturation attack can also disrupt multiple SDN switches (not only the targeted ones) by sending a lower-rate traffic when compared to current known Saturation attacks. © 2020 Elsevier B.V.
引用
收藏
相关论文
共 50 条
  • [31] Evaluation of Denial of Service Attacks in Software Defined-Cognitive Radio Networks
    Lebepe, Mampuele
    Velempini, Mthulisi
    AD HOC NETWORKS AND TOOLS FOR IT, ADHOCNETS 2021, 2022, 428 : 49 - 62
  • [32] Denial-of-Service Prevention for Software-Defined Network Controllers
    Wolf, Tilman
    Li, Jingrui
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [33] Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
    Bicakci, Kemal
    Tavli, Bulent
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 931 - 941
  • [34] Analysis of the effects of distributed denial-of-service attacks on MPLS networks
    Genge, Bela
    Siaterlis, Christos
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2013, 6 (02) : 87 - 95
  • [35] Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks
    Tan, Yi
    Sengupta, Shamik
    Subbalakshmi, K. P.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (04) : 890 - 902
  • [36] Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks
    Wang, Ronghua
    Du, Wenliang
    Ning, Peng
    MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2007, : 71 - 79
  • [37] Measuring the Impact of Denial-of-Service Attacks on Wireless Sensor Networks
    Riecker, Michael
    Thies, Daniel
    Hollick, Matthias
    2014 IEEE 39TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2014, : 296 - 304
  • [38] Active router approach to defeating denial-of-service attacks in networks
    El-Moussa, F. A.
    Linge, N.
    Hope, M.
    IET COMMUNICATIONS, 2007, 1 (01) : 55 - 63
  • [39] Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks
    Zuba, Michael
    Shi, Zhijie
    Peng, Zheng
    Cui, Jun-Hong
    Zhou, Shengli
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2635 - 2645
  • [40] Quickest Detection of Denial-of-Service Attacks in Cognitive Wireless Networks
    Sorrells, CaLynna
    Qian, Lijun
    Li, Husheng
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 580 - 584