BALANCE: Link Flooding Attack Detection and Mitigation via Hybrid-SDN

被引:24
作者
Ravi, Nagarathna [1 ]
Shalinie, S. Mercy [1 ]
Danyson Jose Theres, D. [1 ]
机构
[1] Thiagarajar Coll Engn, Dept Comp Sci & Engn, Madurai 625015, Tamil Nadu, India
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2020年 / 17卷 / 03期
关键词
Routing; Computer crime; Servers; Measurement; Bandwidth; Protocols; Collaboration; Link flooding attack; distributed denial of service; hybrid-software-defined network; security;
D O I
10.1109/TNSM.2020.2997734
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Link Flooding Attack (LFA) is a genre of Distributed Denial of Service (DDoS) attack. LFA can cut off a target area from the network, without directly attacking the target. The attacker chooses links which when cut off will disconnect the target area and instruct the bots to flood those links with small packets. Some of the existing solutions are suitable for specific routing methods like shortest path routing or need cooperation between Autonomous Systems (AS). To overcome certain hitches of existing solutions, we have proposed a novel mechanism named BALANCE. It detects and mitigates LFA via hybrid-Software-Defined Network (SDN). SDN splits the control and data plane using OpenFlow protocol. Hybrid SDN has both legacy and SDN nodes, with a controller in the control plane. We have used Service Based Hybrid SDN (SBHS), which is a type of hybrid-SDN. BALANCE begins with an algorithm that chooses nodes in an AS to be SBHS enabled in such a way that the controller can get statistics of all the links in the AS. Next, congestion detection and location algorithms are implemented in the controller to find the congested links. Finally, LFA bot detection and mitigation algorithms are implemented in the controller to mitigate LFA. BALANCE was evaluated in testbed and emulator. We compared the results with state-of-the-art solutions. BALANCE was able to detect LFA bots at a precision of 97.64% and had HTTP response time of 2 seconds during the LFA attack.
引用
收藏
页码:1715 / 1729
页数:15
相关论文
共 26 条
[1]  
Aamir M., 2013, INTERDISCIP INF SCI, V19, P173, DOI DOI 10.4036/iis.2013.173
[2]  
Aydeger A, 2018, IEEE MILIT COMMUN C, P958
[3]   Mitigating Crossfire Attacks using SDN-based Moving Target Defense [J].
Aydeger, Abdullah ;
Saputro, Nico ;
Akkaya, Kemal ;
Rahman, Mohammad .
2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2016, :627-630
[4]   Characterizing DDoS attacks and flash events: Review, research gaps and future directions [J].
Behal, Sunny ;
Kumar, Krishan ;
Sachdeva, Monika .
COMPUTER SCIENCE REVIEW, 2017, 25 :101-114
[5]  
Belabed D., 2018, 2 CYBER SECURITY NET, P1
[6]  
Bhuvaneswaran V., 2018, 8455 RFC INT ENG TAS
[7]   An adaptive framework for the detection of novel botnets [J].
Cid-Fuentes, Javier Alvarez ;
Szabo, Claudia ;
Falkner, Katrina .
COMPUTERS & SECURITY, 2018, 79 :148-161
[8]  
Farrel A., 2017, 8283 RFC
[9]  
Gkounis D, 2016, ACM SIGCOMM COMP COM, V46, P5, DOI 10.1145/2935634.2935636
[10]   The drivers for information technology application in supply chain management: How developing countries' companies facing globalization [J].
He, M. ;
Chen, J. .
ICIEA 2008: 3RD IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, PROCEEDINGS, VOLS 1-3, 2008, :2306-+