Flow Table Overflow Attacks in Software Defined Networks: A Survey

被引:1
作者
Zhao, Changqing [1 ]
Liao, Ling Xia [1 ]
Chao, Han-Chieh [2 ]
Lai, Roy Xiaorong [3 ]
Zhang, Miao [4 ]
机构
[1] Guilin Univ Aerosp Technol, Sch Elect Informat & Automat, Guilin, Peoples R China
[2] Natl Dong Hwa Univ, Dept Elect Engn, Hualien, Taiwan
[3] Confed Networks Inc, Seattle, WA USA
[4] Quanzhou Univ Informat Engn, Quanzhou, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2023年 / 24卷 / 07期
基金
中国国家自然科学基金;
关键词
SDN; Saturation attack; Low-rate table exhaustion attack; Slow saturation attack; SDN; SECURITY;
D O I
10.53106/160792642023122407001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While Software-Defined Networks (SDNs) have separated control and data planes and completely decouple the flow control from the data forwarding to enable network flexibility, programmability, and innovation, they also raise serious security concerns in each plane and the interfaces between the two planes. This paper, instead of studying the security issues in the SDN control plane as many literatures have done in current research, focuses on the security issues in the SDN data plane, aiming at the state of the art mechanims to identify, detect, and mitigate them. Specifically, this paper reviews the typical models, detections, and mitigations of SDN flow table overflow attacks. After reviewing the various vulnerabilities in SDNs, this paper categorizes the flow table overflow attacks into saturation, low-rate table exhaustion, and slow saturation attacks, and summarizes the attack models, detections, and mitigations of each category. It reviews the typical attacks that can overflow the flow tables and provides the main challenges and open issues for the future research.
引用
收藏
页码:1391 / 1401
页数:11
相关论文
共 66 条
[1]   Comparative Analysis of Control Plane Security of SDN and Conventional Networks [J].
Abdou, AbdelRahman ;
van Oorschot, Paul C. ;
Wan, Tao .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3542-3559
[2]   OpenFlow Communications and TLS Security in Software-Defined Networks [J].
Agborubere, Belema ;
Sanchez-Velazquez, Erika .
2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, :560-566
[3]   From Byzantine Fault-Tolerance to Fault-Avoidance: An Architectural Transformation to Attack and Failure Resiliency [J].
Ahmed, Noor O. ;
Bhargava, Bharat .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (03) :847-860
[4]   A Comprehensive Survey: Benefits, Services, Recent Works, Challenges, Security, and Use Cases for SDN-VANET [J].
Al-Heety, Othman S. ;
Zakaria, Zahriladha ;
Ismail, Mahamod ;
Shakir, Mohammed Mudhafar ;
Alani, Sameer ;
Alsariera, Hussein .
IEEE ACCESS, 2020, 8 :91028-91047
[5]   Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review [J].
Aladaileh, Mohammad A. ;
Anbar, Mohammed ;
Hasbullah, Iznan H. ;
Chong, Yung-Wey ;
Sanjalawe, Yousef K. .
IEEE ACCESS, 2020, 8 :143985-143995
[6]   A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks [J].
Alashhab, Abdussalam Ahmed ;
Zahid, Mohd Soperi Mohd ;
Azim, Mohamed A. ;
Daha, Muhammad Yunis ;
Isyaku, Babangida ;
Ali, Shimhaz .
SYMMETRY-BASEL, 2022, 14 (08)
[7]  
[Anonymous], Under the Perspective of Software-Defined Networking
[8]  
Banerjee S, 2014, INT CONF NETW SER, P109, DOI 10.1109/CNSM.2014.7014147
[9]   SEAL: SDN based secure and agile framework for protecting smart city applications from DDoS attacks [J].
Bawany, Narmeen Zakaria ;
Shamsi, Jawwad A. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 145
[10]  
Benton K., 2013, Proceedings of the second acm sigcomm workshop on hot topics in software defined networking, P151, DOI [10.1145/2491185.2491222, DOI 10.1145/2491185.2491222]