Slow denial-of-service attacks on software defined networks

被引:0
|
作者
Interdisciplinary Centre for Security, Reliability and Trust , University of Luxembourg, Luxembourg [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
基金
欧盟地平线“2020”; 巴西圣保罗研究基金会;
关键词
Ternary content adressable memory - Network security - Logic gates - Denial-of-service attack;
D O I
暂无
中图分类号
学科分类号
摘要
Software Defined Networking (SDN) is a network paradigm that decouples the network's control plane, delegated to the SDN controller, from the data plane, delegated to SDN switches. For increased efficiency, SDN switches use a high-performance Ternary Content-Addressable memory (TCAM) to install rules. However, due to the TCAM's high cost and power consumption, switches have a limited amount of TCAM memory. Consequently, a limited number of rules can be installed. This limitation has been exploited to carry out Distributed Denial of Service (DDoS) attacks, such as Saturation attacks, that generate large amounts of traffic. Inspired by slow application layer DDoS attacks, this paper presents and investigates DDoS attacks on SDN that do not require large amounts of traffic, thus bypassing existing defenses that are triggered by traffic volume. In particular, we offer two slow attacks on SDN. The first attack, called Slow TCAM Exhaustion attack (Slow-TCAM), is able to consume all SDN switch's TCAM memory by forcing the installation of new forwarding rules and maintaining them indeterminately active, thus disallowing new rules to be installed to serve legitimate clients. The second attack, called Slow Saturation attack, combines Slow-TCAM attack with a lower rate instance of the Saturation attack. A Slow Saturation attack is capable of denying service using a fraction of the traffic of typical Saturation attacks. Moreover, the Slow Saturation attack can also impact installed legitimate rules, thus causing a greater impact than the Slow-TCAM attack. In addition, it also affects the availability of other network's components, e.g., switches, even the ones not being directly targeted by the attack, as has been proven by our experiments. We propose a number of variations of these attacks and demonstrate their effectiveness by means of an extensive experimental evaluation. The Slow-TCAM is able to deny service to legitimate clients requiring only 38 s and sending less than 40 packets per second without abruptly changing network resources, such as CPU and memory. Moreover, besides denying service as a Slow-TCAM attack, the Slow Saturation attack can also disrupt multiple SDN switches (not only the targeted ones) by sending a lower-rate traffic when compared to current known Saturation attacks. © 2020 Elsevier B.V.
引用
收藏
相关论文
共 50 条
  • [41] Quickest detection of denial-of-service attacks in cognitive wireless networks
    Sorrells, CaLynna
    Qian, Lijun
    International Journal of Network Security, 2014, 16 (06) : 468 - 476
  • [42] Quickest detection of denial-of-service attacks in cognitive wireless networks
    Department of ECE, Prairie View A and M University, Prairie View, TX 77446, United States
    不详
    IEEE Int. Conf. Technol. Homeland Secur., HST, 2012, (580-584):
  • [43] Investigation of Simple Denial-of-Service Attacks
    Voitovych, Olesya
    Baryshev, Yurii
    Kolibabchuk, Eduard
    Kupershtein, Leonid
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 145 - 148
  • [44] Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks
    Wu, Yongdong
    Zhao, Zhigang
    Bao, Feng
    Deng, Robert H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) : 168 - 177
  • [45] Control Plane Packet-In Arrival Rate Analysis for Denial-of-Service Saturation Attacks Detection and Mitigation in Software-Defined Networks
    Fakhry Khellah
    Arabian Journal for Science and Engineering, 2019, 44 : 9349 - 9362
  • [46] Denial-of-service attacks and countermeasures on BitTorrent
    Lehmann, Matheus Brenner
    Santos, Flavio Roberto
    Gaspary, Luciano Paschoal
    Barcellos, Marinho Pilla
    COMPUTER NETWORKS, 2012, 56 (15) : 3479 - 3498
  • [47] Control Plane Packet-In Arrival Rate Analysis for Denial-of-Service Saturation Attacks Detection and Mitigation in Software-Defined Networks
    Khellah, Fakhry
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2019, 44 (11) : 9349 - 9362
  • [48] Detecting and Mitigating Denial of Service Attacks against the Data Plane in Software Defined Networks
    Durner, Raphael
    Lorenz, Claas
    Wiedemann, Michael
    Kellerer, Wolfgang
    2017 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (IEEE NETSOFT), 2017,
  • [49] Denial-of-service attacks rip the Internet
    Garber, L
    COMPUTER, 2000, 33 (04) : 12 - 17
  • [50] Optimizing the pulsing denial-of-service attacks
    Luo, XP
    Chang, RKC
    2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 582 - 591