A Novel OpenFlow-Based DDoS Flooding Attack Detection and Response Mechanism in Software-Defined Networking

被引:3
作者
Wang, Rui [1 ]
Zhang, Zhiyong [1 ]
Ju, Lei [2 ]
Jia, Zhiping [3 ]
机构
[1] Shandong Univ, Jinan, Peoples R China
[2] Shandong Univ, Sch Comp Sci & Technol, Jinan, Peoples R China
[3] Shandong Univ, Dept Comp Sci & Technol, Jinan, Peoples R China
关键词
Anomaly Detection and Response; DDoS Flooding Attack; DPM; Entropy; IP Traceback; OpenFlow; SDN; Source Filtering;
D O I
10.4018/IJISP.2015070102
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software-Defined Networking (SDN) and OpenFlow have brought a promising architecture for the future networks. However, there are still a lot of security challenges to SDN. To protect SDN from the Distributed denial-of-service (DDoS) flooding attack, this paper extends the flow entry counters and adds a mark action of OpenFlow, then proposes an entropy-based distributed attack detection model, a novel IP traceback and source filtering response mechanism in SDN with OpenFlow-based Deterministic Packet Marking. It achieves detecting the attack at the destination and filtering the malicious traffic at the source and can be easily implemented in SDN controller program, software or programmable switch, such as Open vSwitch and NetFPGA. The experimental results show that this scheme can detect the attack quickly, achieve a high detection accuracy with a low false positive rate, shield the victim from attack traffic and also avoid the attacker consuming resource and bandwidth on the intermediate links.
引用
收藏
页码:21 / 40
页数:20
相关论文
共 21 条
[1]  
[Anonymous], [No title captured]
[2]  
Belenky A, 2003, 2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, P49
[3]  
Francois J., 2015, 2015 NAT C PAR COMP, P203
[4]  
Giotis Kostas, 2014, 2014 Third European Workshop on Software Defined Networks (EWSDN), P85, DOI 10.1109/EWSDN.2014.24
[5]   Combining Open Flow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments [J].
Giotis, K. ;
Argyropoulos, C. ;
Androulidakis, G. ;
Kalogeras, D. ;
Maglaris, V. .
COMPUTER NETWORKS, 2014, 62 :122-136
[6]  
Kreibich C., 2005, P 2005 P ACM HOTNETS, V2005
[7]  
Kreutz F., 2013, P 2 ACM SIGCOMM WORK, P55, DOI [10.1145/2491185.2491199, DOI 10.1145/2491185.2491199]
[8]   OpenFlow: Enabling innovation in campus networks [J].
McKeown, Nick ;
Anderson, Tom ;
Balakrishnan, Hari ;
Parulkar, Guru ;
Peterson, Larry ;
Rexford, Jennifer ;
Shenker, Scott ;
Turner, Jonathan .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2008, 38 (02) :69-74
[9]  
Mehdi SA, 2011, LECT NOTES COMPUT SC, V6961, P161, DOI 10.1007/978-3-642-23644-0_9
[10]   A taxonomy of DDoS attack and DDoS Defense mechanisms [J].
Mirkovic, J ;
Reiher, P .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (02) :39-53