rDefender: A Lightweight and Robust Defense Against Flow Table Overflow Attacks in SDN

被引:1
|
作者
Kong, Dezhang [1 ,2 ]
Chen, Xiang [1 ,2 ]
Wu, Chunming [1 ,2 ]
Shen, Yi [1 ]
Zhou, Zhengyan [1 ,2 ]
Cheng, Qiumei [1 ]
Liu, Xuan [3 ]
Yang, Mingliang [4 ]
Qiu, Yubing [4 ]
Zhang, Dong [5 ]
Khan, Muhammad Khurram [6 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310058, Peoples R China
[2] Quan Cheng Lab, Jinan 250103, Peoples R China
[3] Yangzhou Univ, Coll Informat Engn, Coll Artificial Intelligence, Yangzhou 225009, Peoples R China
[4] Alibaba Cloud, Hangzhou 311121, Peoples R China
[5] Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350002, Peoples R China
[6] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11421, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Software-defined networking; table overflow attacks; security; RATE DDOS ATTACK;
D O I
10.1109/TIFS.2024.3472477
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The flow table is a critical component of Software-Defined Networking (SDN). However, flow tables' limited capacity makes them highly vulnerable to flow table overflow attacks (FTOAs). Due to the low attack cost and highly flexible attack forms, it is hard to eradicate FTOAs. This paper addresses three unsolved problems for table security and proposes a robust defense accordingly. First, we reveal that the existing defenses with fixed defense speeds will cause severe packet loss when handling diverse traffic. We prove that deleting multiple rules can efficiently solve this problem and give a rigorous derivation to calculate the suitable deletion number according to the environment. Second, we illustrate that abnormal table occupancy squeezing is a constant characteristic of FTOAs regardless of attack forms. It can be used to identify attacked ports accurately in different scenarios. Third, we mathematically prove that random deletion can guarantee the continuous decrease of malicious flow rules after confirming attacked ports. It achieves fast speed and robust effectiveness in different environments. Based on these findings, we design rDefender, a robust and lightweight defense prototype. We evaluate its effect by designing diverse, powerful attacks and using real-world datasets and topology. The results demonstrate that it achieves the best overall performance compared to six existing mainstream defenses, providing stable security for switch flow tables.
引用
收藏
页码:9436 / 9451
页数:16
相关论文
共 50 条
  • [31] Implementation of an SDN-based Security Defense Mechanism Against DDoS Attacks
    Lin, Hsiao-Chung
    Wang, Ping
    JOINT 2016 INTERNATIONAL CONFERENCE ON ECONOMICS AND MANAGEMENT ENGINEERING (ICEME 2016) AND INTERNATIONAL CONFERENCE ON ECONOMICS AND BUSINESS MANAGEMENT (EBM 2016), 2016, : 377 - 383
  • [32] LFOD: A Lightweight Flow Table Optimization Scheme in SDN Based on Flow Length Distribution in the Internet
    He, Heng
    Peng, Zhezhe
    Zhou, Xiaohu
    Wang, Jia
    2022 23RD ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS 2022), 2022, : 199 - 204
  • [33] Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack
    Cao, Jiahao
    Xu, Mingwei
    Li, Qi
    Sun, Kun
    Yang, Yuan
    Zheng, Jing
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 356 - 376
  • [34] Protection against Flow Table Overflow Attack in Software Defined Networks
    Noh, Sichul Kevin
    Kang, Minjae
    Park, Minho
    35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 486 - 490
  • [35] Enhancing the performance and security against media-access-control table overflow vulnerability attacks
    Tzang, Yih-Jou
    Chang, Hong-Yi
    Tzang, Chih-Hsuan
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (09) : 1780 - 1793
  • [36] SDNShield: Towards More Comprehensive Defense against DDoS Attacks on SDN Control Plane
    Chen, Kuan-yin
    Junuthula, Anudeep Reddy
    Siddhrau, Ishant Kumar
    Xu, Yang
    Chao, H. Jonathan
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 28 - 36
  • [37] Collaborative Defense Method Against DDoS Attacks on SDN-Architected Cloud Servers
    Zhang, Yiying
    Xu, Yao
    Han, Longzhe
    Liang, Kun
    Li, Wenjing
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IV, ICIC 2024, 2024, 14865 : 362 - 370
  • [38] Source-Based Defense Against DDoS Attacks in SDN Based on sFlow and SOM
    Wang, Meng
    Lu, Yiqin
    Qin, Jiancheng
    IEEE ACCESS, 2022, 10 : 2097 - 2116
  • [39] Flow Table Saturation Attack against Dynamic Timeout Mechanisms in SDN
    Shen, Yi
    Wu, Chunming
    Kong, Dezhang
    Cheng, Qiumei
    APPLIED SCIENCES-BASEL, 2023, 13 (12):
  • [40] Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments
    Novaes, Matheus P.
    Carvalho, Luiz F.
    Lloret, Jaime
    Proenca, Mario Lemes, Jr.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 : 156 - 167