POAGuard: A Defense Mechanism Against Preemptive Table Overflow Attack in Software-Defined Networks

被引:0
|
作者
Liu, Yuming [1 ]
Wang, Yong [1 ]
Feng, Hao [1 ]
机构
[1] Guilin Univ Elect Technol, Sch Comp & Informat Secur, Guilin 541004, Peoples R China
基金
中国国家自然科学基金;
关键词
SDN; flow table overflow; preemptive overflow attack; attack detection;
D O I
10.1109/ACCESS.2023.3330224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Software-Defined Networks (SDN), the limited flow table capacity of switches makes them susceptible to flow table overflow attacks, which can lead to performance degradation or network corruption. Prior research has mainly focused on rate-based overflow attacks (ROA), which exhibit varying attack effects depending on the overflow rate. This study introduces a novel attack called the preemptive overflow attack (POA), which exploits flow entry eviction mechanism to preempt the flow entries of normal applications, resulting in amplified performance degradation. Notably, when using the widely deployed Least Frequently Used (LFU) eviction algorithm, POA achieves a significant impact while consuming fewer flow entries than existing ROA methods. Furthermore, the detection of POA remains challenging owing to the lack of distinctive flow features. To mitigate POA, we propose POAGuard as a defense mechanism. POAGuard incorporates a table segmentation method for table management, a score-based eviction algorithm that evicts suspicious flow entries, and a concept drift-based detection method that identifies and defends against POA. Extensive experiments are conducted to verify the effectiveness of POAGuard, and the results demonstrate that POAGuard can effectively defend against POA.
引用
收藏
页码:123659 / 123676
页数:18
相关论文
共 50 条
  • [1] A Table Overflow LDoS Attack Defending Mechanism in Software-Defined Networks
    Xie, Shengxu
    Xing, Changyou
    Zhang, Guomin
    Zhao, Jinlong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [2] An Effective Table-Overflow Attack and Defense in Software-Defined Networking
    Xu, Jianfeng
    Wang, Liming
    Song, Chen
    Xu, Zhen
    2019 IEEE 44TH LOCAL COMPUTER NETWORKS (LCN) SYMPOSIUM ON EMERGING TOPICS IN NETWORKING (LCN SYMPOSIUM 2019), 2019, : 10 - 17
  • [3] Protection against Flow Table Overflow Attack in Software Defined Networks
    Noh, Sichul Kevin
    Kang, Minjae
    Park, Minho
    35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 486 - 490
  • [4] Mitigating the Table-Overflow Attack in Software-Defined Networking
    Xu, Tong
    Gao, Deyun
    Dong, Ping
    Foh, Chuan Heng
    Zhang, Hongke
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2017, 14 (04): : 1086 - 1097
  • [5] Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense
    Zhou, Yadong
    Chen, Kaiyue
    Zhang, Junjie
    Leng, Junyuan
    Tang, Yazhe
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [6] Defending Against Flow Table Overloading Attack in Software-Defined Networks
    Yuan, Bin
    Zou, Deqing
    Yu, Shui
    Jin, Hai
    Qiang, Weizhong
    Shen, Jinan
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 12 (02) : 231 - 246
  • [7] A Defense Mechanism for Distributed Denial of Service Attack in Software-Defined Networks
    Luo, Shibo
    Wu, Jun
    Li, Jianhua
    Pei, Bei
    2015 NINTH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY FCST 2015, 2015, : 324 - 328
  • [8] Isolation Guarantees with Flow Table Overflow in Software-Defined Networks
    Chang, Tzu-Wen
    Huang, Zhi-Hong
    Chang, You-Jia
    Kuo, Jian-Jhih
    Tsai, Ming-Jer
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [9] STAR: Preventing flow-table overflow in software-defined networks
    Guo, Zehua
    Liu, Ruoyan
    Xu, Yang
    Gushchin, Andrey
    Walid, Anwar
    Chao, H. Jonathan
    COMPUTER NETWORKS, 2017, 125 : 15 - 25
  • [10] Packet Injection Attack and Its Defense in Software-Defined Networks
    Deng, Shuhua
    Gao, Xing
    Lu, Zebin
    Gao, Xieping
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) : 695 - 705