Method for Overflow Attack Defense of SDN Network Flow Table Based on Stochastic Differential Equation

被引:0
|
作者
Xinhui Zhao
Qingxian Wang
Zehui Wu
Rui Guo
机构
[1] Information Engineering University,State Key Laboratory of Mathematics Engineering & Advanced Computing
[2] Physical Education College of Zhengzhou University,Modern Education Technology Center
[3] Zhengzhou University of Light Industry,Engineering Training Center
来源
关键词
Stochastic differential equation; Overflow of SDN network flow table; SDN network attack; Defense;
D O I
暂无
中图分类号
学科分类号
摘要
In order to avoid the overflow problem of network flow table caused by hackers attacking the network in the process of using the network, a method for overflow attack defense of SDN network flow table based on stochastic differential equation is proposed. In this method, the stochastic differential equation is first proposed, and the drift coefficient and diffusion coefficient of the equation are expanded and adjusted by Taylor. By using the limit theorem, the spillover attack of SDN network is weakly converged to an approximate two-dimensional Markov diffusion process, and the improved stochastic differential equation is obtained. Then, according to the stochastic nature of SDN network attack, the stochastic differential equation is transformed into an amplitude equation, which is based on the amplitude. The equation establishes a SDN attack detection scheme based on flow table statistics, which detects the spillover attacks of SDN network flow tables. Finally, according to the test results, it is proposed to use other switches instead of network flow table overflow switches to control the data upload rate, thus reducing the possibility of network crash and meeting the attack defense requirements of flow table overflow. The simulation results show that the proposed method has better detection performance and shorter running time, and can provide help for network security related work.
引用
收藏
页码:3431 / 3447
页数:16
相关论文
共 50 条
  • [1] Method for Overflow Attack Defense of SDN Network Flow Table Based on Stochastic Differential Equation
    Zhao, Xinhui
    Wang, Qingxian
    Wu, Zehui
    Guo, Rui
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (04) : 3431 - 3447
  • [2] Mitigating SDN Flow Table Overflow
    Luo, Hanwu
    Li, Wenzhen
    Qian, Ying
    Dou, Liang
    2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2018, : 821 - 822
  • [3] rDefender: A Lightweight and Robust Defense Against Flow Table Overflow Attacks in SDN
    Kong, Dezhang
    Chen, Xiang
    Wu, Chunming
    Shen, Yi
    Zhou, Zhengyan
    Cheng, Qiumei
    Liu, Xuan
    Yang, Mingliang
    Qiu, Yubing
    Zhang, Dong
    Khan, Muhammad Khurram
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9436 - 9451
  • [4] Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense
    Zhou, Yadong
    Chen, Kaiyue
    Zhang, Junjie
    Leng, Junyuan
    Tang, Yazhe
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [5] Cross-Plane DDoS Attack Defense Architecture Based on Flow Table Features in SDN
    Yue, Meng
    Yan, Qingxin
    Zheng, Han
    Wu, Zhijun
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [6] Cross-Plane DDoS Attack Defense Architecture Based on Flow Table Features in SDN
    Yue, Meng
    Yan, Qingxin
    Zheng, Han
    Wu, Zhijun
    Security and Communication Networks, 2022, 2022
  • [7] Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack
    Cao, Jiahao
    Xu, Mingwei
    Li, Qi
    Sun, Kun
    Yang, Yuan
    Zheng, Jing
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 356 - 376
  • [8] Flow Table Overflow Attacks in a Software-Defined Network (SDN): A Systematic Review
    Isaiah, Aladesote Olomi
    Abdullah, Azizol
    Samian, Normalia
    Hanapi, Zurina Mohd.
    IAENG International Journal of Computer Science, 2024, 51 (09) : 1219 - 1239
  • [9] Attack and defense based on buffer overflow
    Zhu, Wei
    Li, Wei
    2003, Fushun Petroleum Institute (23):
  • [10] Study on Stochastic Differential Game Model in Network Attack and Defense
    Xu, Xiaotong
    Wang, Gaocai
    Hu, Jintian
    Lu, Yuting
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020