Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack

被引:21
作者
Zhang, Chaoqin [1 ,2 ]
Hu, Guangwu [3 ]
Chen, Guolong [4 ]
Sangaiah, Arun Kumar [5 ]
Zhang, Ping'an [3 ]
Yan, Xia [3 ]
Jiang, Weijin [6 ]
机构
[1] Natl Digital Switches Syst Engn & Technol Researc, Zhengzhou 450002, Henan, Peoples R China
[2] Zhengzhou Univ Light Ind, Sch Comp & Commun Engn, Zhengzhou 450001, Henan, Peoples R China
[3] Shenzhen Inst Informat Technol, Sch Comp Sci, Shenzhen 518172, Peoples R China
[4] Huawei Technol, Shenzhen 518055, Peoples R China
[5] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[6] Hunan Univ Commerce, Coll Comp & Informat Engn, Changsha 410205, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-security; IP address validation; software-defined networking; INTERNET;
D O I
10.1109/ACCESS.2017.2785236
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current Internet packet delivery only relies on packet's destination IP address and forwarding devices neglect the validation of packet's IP source address, it makes attackers can leverage this flaw to launch attacks with forged IP source address so as to meet their vicious purposes and avoid to be tracked. In order to mitigate this threat and enhance Internet accountability, many solutions have been proposed either from the intra-domain or the inter-domain aspects. However, most of them faced with some issues hard to cope with, e.g., low filtering rates, high deployment cost. And most importantly, few of them can cover both intra-domain and inter-domain areas at the same time. With the central control and edge response pattern, the novel network architecture of software defined networking (SDN) possess whole network intelligence and distribute control rules directly to edged SDN switches, which brings a good opportunity to solve the IP spoofing problem. By taking advantage of SDN, in this paper, we propose an SDN-based integrated IP source address validation architecture (ISAVA) which can cover both intra- and inter-domain areas and effectively lower SDN devices deployment cost, while achieve desirable control granularities in the meantime. Specifically, within autonomous system (AS), ISAVA relies on an SDN incremental deployment scheme which can achieve IP prefix (subnet)-level validation granularity with minimum SDN devices deployment. While among ASes, ISAVA sets up border server and establishes a vouch mechanism between allied ASes for signing outbound packets so as to achieve AS-level validation granularity. Finally, conducted experiments confirm that ISAVA intra-domain scheme can get beyond 90% filtering rates with only 10% deployment in average, while the inter-domain scheme can get high filtering rates with low system cost and less storage usage.
引用
收藏
页码:22764 / 22777
页数:14
相关论文
共 36 条
[1]   Accountable Internet Protocol (AIP) [J].
Andersen, David G. ;
Balakrishnan, Hari ;
Feamster, Nick ;
Koponen, Teemu ;
Moon, Daekyeong ;
Shenker, Scott .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2008, 38 (04) :339-350
[2]  
[Anonymous], 2013, Frontiers in Internet Technologies
[3]  
Aura T., 2005, RFC 3972: Cryptographically generated addresses (CGA) specification
[4]  
Bi Jun, 2009, Tsinghua Science and Technology, V14, P413, DOI 10.1016/S1007-0214(09)70097-5
[5]  
Bingyang Liu, 2011, 2011 19th IEEE International Conference on Network Protocols, P19, DOI 10.1109/ICNP.2011.6089052
[6]  
Bremler-Barr A, 2005, IEEE INFOCOM SER, P536
[7]  
CAIDA, STAT OF IP SPOOF
[8]  
Casado M., 2006, USENIX SEC S, V49, P50
[9]  
CERT, CHIN INT NETW SEC RE
[10]   Learning Transfer: does it take place in MOOCs? An Investigation into the Uptake of Functional Programming in Practice [J].
Chen, Guanliang ;
Davis, Dan ;
Hauff, Claudia ;
Houben, Geert-Jan .
PROCEEDINGS OF THE THIRD (2016) ACM CONFERENCE ON LEARNING @ SCALE (L@S 2016), 2016, :409-418