On-the-fly (D)DoS attack mitigation in SDN using Deep Neural Network-based rate

被引:15
作者
El Kamel, Ali [1 ]
Eltaief, Hamdi [1 ]
Youssef, Habib [1 ]
机构
[1] Univ Sousse, PRINCE Res Lab, ISITC Hammam Sousse, Sousse, Tunisia
关键词
Software Defined Networking (SDN); Deep; Shallow Neural Networks (SNN); MultiLoss SNN (ML-SNN); Online Deep Learning (ODL); Rate limiting; Trustworthiness; SECURITY; DDOS;
D O I
10.1016/j.comcom.2021.11.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software Defined Networking (SDN) has emerged as a promising paradigm offering an unprecedented programmability, scalability and fine-grained control over forwarding elements (FE). Mainly, SDN decouples the forwarding plane from the control plane which is moved to a central controller that is in charge of taking routing decisions in the network. However, SDN is rife with vulnerabilities so that several network attacks, especially Distributed Denial of Service (DDoS), can be launched from compromised hosts connected to switches. DDoS attacks can easily overload the controller processing capacity and flood switch flow-tables. This paper deals with the security issue in SDN. It proposes a real-time protection against DDoS attacks that is based on a controller-side sliding window rate limiting approach which relies on a weighted abstraction of the underlying network. A weight defines the allowable amount of data that can be transmitted by a node and is dynamically updated according to its contribution to: (1) the queueing capacity of the controller, and (2) the number of flow-rules in the switch. Hence, a new deep learning algorithm, denoted the Parallel Online Deep Learning algorithm (PODL), is defined in order to update weights on the-fly according to both aforementioned constraints simultaneously. Furthermore, the behavior of each host and each switch is evaluated through a measure of trustworthiness which is used to penalize mis-behaving ones by prohibiting new flow requests or PacketIn messages for a period of time. Host trustworthiness is based on their weights while switch trustworthiness is achieved through a computation of the Average Nearest-Neighbor Degree (ANND). Realistic experiments show that the proposed solution succeeds in minimizing the impact of DDoS attacks on both the controllers and the switches regarding the PacketIn arrival rate at the controller, the rate of accepted requests and the flow-table usage.
引用
收藏
页码:153 / 169
页数:17
相关论文
共 53 条
[1]   Security in Software Defined Networks: A Survey [J].
Ahmad, Ijaz ;
Namal, Suneth ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2317-2346
[2]  
Alshamrani A, 2017, PROCEEDINGS OF THE 15TH ACM INTERNATIONAL SYMPOSIUM ON MOBILITY MANAGEMENT AND WIRELESS ACCESS, MOBIWAC 2017, P83, DOI 10.1145/3132062.3132074
[3]  
[Anonymous], 2020, PYTHON 3 0 RELEASE
[4]  
[Anonymous], 2012, FLEX NETW
[5]  
[Anonymous], 2020, JUPYTER LAB PLATEFOR
[6]  
[Anonymous], 2020, MININET OVERVIEW
[7]  
[Anonymous], 2012, BIG SWITCH NETWORKS
[8]  
[Anonymous], 2020, OPENVSWITCH 2 5 DOCU
[9]  
[Anonymous], 2020, FLOODLIGHT CONTROLLE
[10]  
Aoki Hidenobu, 2016, ICN, Vfifth, P108