A survey of link flooding attacks in software defined network ecosystems

被引:27
作者
Rasool, Raihan Ur [1 ]
Wang, Hua [1 ]
Ashraf, Usman [2 ]
Ahmed, Khandakar [1 ]
Anwar, Zahid [3 ,4 ]
Rafique, Wajid [5 ]
机构
[1] Victoria Univ, Melbourne, Vic, Australia
[2] King Faisal Univ, Al Hasa, Saudi Arabia
[3] Natl Univ Sci & Technol, Islamabad, Pakistan
[4] Fontbonne Univ, St Louis, MO USA
[5] Nanjing Univ, Dept Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
基金
美国国家科学基金会;
关键词
Link flooding attacks; SDN attacks; SDN security; LAYER DDOS ATTACKS; SDN; ARCHITECTURE; CHALLENGES; SECURITY; INTERNET; DEFENSE; OPPORTUNITIES; PERFORMANCE; PRIVACY;
D O I
10.1016/j.jnca.2020.102803
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Link Flooding Attacks (LFA) are a devastating type of stealthy denial of service attack that congests critical network links and can completely isolate the victim's network. In this work, we present a systematic survey of LFA patterns on all the layers of the Software Defined Network (SDN) ecosystem, along with a comparative analysis of mitigation techniques. The paper starts by examining different LFA types, techniques, and behaviors in wired and wireless SDNs. Next, an in-depth analysis of mitigation techniques is presented along with their suitability for each of the SDN variants. Subsequently, the significance of a pattern matching and machine learning-based detection and mitigation approaches as a defense against these attacks is highlighted. The paper also contributes by discussing the vulnerabilities of in-band SDNs against LFA when the interface of the data/ control plane is attacked by saturating shared strategic links through stealth flows.
引用
收藏
页数:23
相关论文
共 220 条
[1]  
AARNET, 2020, VIRT TEST NFV SDN EN
[2]   Comparative Analysis of Control Plane Security of SDN and Conventional Networks [J].
Abdou, AbdelRahman ;
van Oorschot, Paul C. ;
Wan, Tao .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3542-3559
[3]  
Ahmad Ijaz, 2016, 2016 12th Annual Conference on Wireless On-Demand Network Systems and Services (WONS), P1
[4]   Security in Software Defined Networks: A Survey [J].
Ahmad, Ijaz ;
Namal, Suneth ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2317-2346
[5]   Secure and dependable software defined networks [J].
Akhunzada, Adnan ;
Gani, Abdullah ;
Anuar, Nor Badrul ;
Abdelaziz, Ahmed ;
Khan, Muhammad Khurram ;
Hayat, Amir ;
Khan, Samee U. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 :199-221
[6]  
AL Huti MHA, 2015, INT CONF INFORM COMM, P225, DOI 10.1109/ICTS.2015.7379903
[7]  
Alan M., 2013, NY TIMES
[8]  
Ambrosin M., 2016, IEEE ACM T NETW, V25, P14
[9]  
Amelyanovich A., 2017, 2017 SYST SIGN SYNCH, P1
[10]  
[Anonymous], 2017, 26 USENIX SEC S, DOI DOI 10.1016/J.JOT.2017.03.002