Towards Crossfire Distributed Denial of Service Attack Protection Using Intent-Based Moving Target Defense Over Software-Defined Networking

被引:16
作者
Hyder, Muhammad Faraz [1 ]
Fatima, Tasbiha [2 ]
机构
[1] NED Univ Engn & Technol, Dept Software Engn & Technol, Karachi 75270, Pakistan
[2] NED Univ Engn & Technol, Dept Comp Sci & Informat Technol, Karachi 75270, Pakistan
关键词
Denial-of-service attack; Computer crime; Security; Software; Ports (computers); Hardware; Cloud computing; Crossfire DDoS; network function virtualization; intent-based networking; moving target defense; software defined networking; SDN;
D O I
10.1109/ACCESS.2021.3103845
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Crossfire is an indirect target area link-flooding Distributed Denial of Service (DDoS) attack determined to affect the neighbors of the real target. Currently, Crossfire DDoS attacks are acquiring impetus because of their indistinguishability and undetectability. SDN (Software Defined Networking) is a progressing technique because of its adaptability and programmability. Moving Target Defense (MTD) is an arising security strategy to counter attacks by progressively changing the attacked plane. IBN (Intent-based Networking) is another promising methodology for providing dynamic network management. IBN-based MTD can provide efficient MTD solutions because of the concentrated control and observing capacities of the intents when translated into rules inside the SDN control plane. In this paper, a framework for the security of Crossfire DDoS attacks is proposed by making use of Intent-based Traffic modifications through the Open Networking Operating System (ONOS) Rest API and Domain Name System (DNS) port redirection. In this paper, we exploited Intent-based MTD to divert traffic from the principal host to virtual shadow hosts to counter this attack. Traffic redirection helps in masquerading the attacker headed for shadow host and consequently getting the erroneous path towards the network and, hence, the Crossfire attack couldn't be executed as expected. The proposed technique is simulated using Mininet and ONOS SDN controllers. The outcomes showed traffic is successfully redirected at a low computational expense. Therefore, Crossfire DDoS is efficiently mitigated as promising results are found.
引用
收藏
页码:112792 / 112804
页数:13
相关论文
共 35 条
[1]   Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies [J].
Achleitner, Stefan ;
La Porta, Thomas F. ;
McDaniel, Patrick ;
Sugrim, Shridatt ;
Krishnamurthy, Srikanth V. ;
Chadha, Ritu .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2017, 14 (04) :1098-1112
[2]  
[Anonymous], MININET OVERVIEW
[3]   A moving target defense and network forensics framework for ISP networks using SDN and NFV [J].
Aydeger, Abdullah ;
Saputro, Nico ;
Akkaya, Kemal .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 94 :496-509
[4]  
Belabed D., 2018, 2 CYBER SECURITY NET, P1
[5]  
BELLOVIN SM, 1995, PROCEEDINGS OF THE FIFTH USENIX UNIX SECURITY SYMPOSIUM, P199
[6]  
Benson T., 2009, NSDI, P335
[7]   Demystifying Configuration Challenges and Trade-Offs in Network-based ISP Services [J].
Benson, Theophilus ;
Akella, Aditya ;
Shaikh, Aman .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2011, 41 (04) :302-313
[8]  
Berde P., 2014, P 3 WORKSH HOT TOP S, P1
[9]  
Beshley Mykola, 2019, 2019 3rd International Conference on Advanced Information and Communications Technologies (AICT). Proceedings, P22, DOI 10.1109/AIACT.2019.8847731
[10]  
Chavez AR, 2015, INT CARN CONF SECU, P77