R. Sanjeetha, A. Prasanna, D. P. Kumar, A. Kanavalli
{"title":"软件定义网络大流量场景下控制器对主服务器DDoS攻击的缓解","authors":"R. Sanjeetha, A. Prasanna, D. P. Kumar, A. Kanavalli","doi":"10.1109/ANTS.2018.8710066","DOIUrl":null,"url":null,"abstract":"One of the major constraint of a Software Defined Network (SDN) is the limited size of the flow table in the switch. These flow tables are required for forwarding packets to the desired destination. To deliver a packet in SDN, the controller installs flow table rules on the source switch i.e. the switch which connects to the source host, multiple intermediate switches through which the packet will be transmitted, and the destination switch which connects to the destination host. In high traffic scenarios, the flow tables of these switches become full and the flow rules must be repeatedly replaced by the controller. Hiep T. Nguyen Tri et al. proposed a solution for the same, by using an OpenDaylight controller feature that forwards packets to the destination switch directly and install a flow table rules only on it. In this paper we show how a DDoS attack can be instigated on a primary server i.e. the server providing important services like web server, file server etc., present in SDN which uses the abovementioned solution during high traffic scenarios. The attack is instigated by generating huge number of packets with destination IP addresses such that it compels the controller to always choose the switch which connects the primary sever to the rest of the network as the destination switch. The flow table rules are repeatedly installed by the controller into this switch, leading to exhaustion of its flow table space. This blocks the genuine traffic between the primary server and its clients as the flow rules that would service legitimate clients get replaced by flow rules that process this attack traffic.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Mitigation of Controller induced DDoS Attack on Primary Server in High Traffic Scenarios of Software Defined Networks\",\"authors\":\"R. Sanjeetha, A. Prasanna, D. P. Kumar, A. Kanavalli\",\"doi\":\"10.1109/ANTS.2018.8710066\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the major constraint of a Software Defined Network (SDN) is the limited size of the flow table in the switch. These flow tables are required for forwarding packets to the desired destination. To deliver a packet in SDN, the controller installs flow table rules on the source switch i.e. the switch which connects to the source host, multiple intermediate switches through which the packet will be transmitted, and the destination switch which connects to the destination host. In high traffic scenarios, the flow tables of these switches become full and the flow rules must be repeatedly replaced by the controller. Hiep T. Nguyen Tri et al. proposed a solution for the same, by using an OpenDaylight controller feature that forwards packets to the destination switch directly and install a flow table rules only on it. In this paper we show how a DDoS attack can be instigated on a primary server i.e. the server providing important services like web server, file server etc., present in SDN which uses the abovementioned solution during high traffic scenarios. The attack is instigated by generating huge number of packets with destination IP addresses such that it compels the controller to always choose the switch which connects the primary sever to the rest of the network as the destination switch. The flow table rules are repeatedly installed by the controller into this switch, leading to exhaustion of its flow table space. This blocks the genuine traffic between the primary server and its clients as the flow rules that would service legitimate clients get replaced by flow rules that process this attack traffic.\",\"PeriodicalId\":273443,\"journal\":{\"name\":\"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)\",\"volume\":\"79 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ANTS.2018.8710066\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTS.2018.8710066","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
摘要
软件定义网络(SDN)的主要限制之一是交换机中流表的有限大小。这些流表是将数据包转发到所需目的地所必需的。为了在SDN中传送数据包,控制器在源交换机上安装流表规则,即连接到源主机的交换机、传输数据包的多个中间交换机以及连接到目的主机的目的交换机。在高流量场景下,这些交换机的流表会被填满,流规则必须被控制器反复替换。Hiep T. Nguyen Tri等人提出了同样的解决方案,通过使用OpenDaylight控制器功能将数据包直接转发到目标交换机,并仅在其上安装流表规则。在本文中,我们展示了如何在主服务器上煽动DDoS攻击,即提供重要服务的服务器,如web服务器,文件服务器等,存在于SDN中,在高流量场景中使用上述解决方案。这种攻击是通过生成大量带有目的IP地址的数据包来煽动的,这样就迫使控制器总是选择连接主服务器和网络其余部分的交换机作为目的交换机。流表规则被控制器反复安装到该开关中,导致其流表空间耗尽。这将阻止主服务器与其客户端之间的真实流量,因为将为合法客户端提供服务的流规则将被处理攻击流量的流规则所取代。
Mitigation of Controller induced DDoS Attack on Primary Server in High Traffic Scenarios of Software Defined Networks
One of the major constraint of a Software Defined Network (SDN) is the limited size of the flow table in the switch. These flow tables are required for forwarding packets to the desired destination. To deliver a packet in SDN, the controller installs flow table rules on the source switch i.e. the switch which connects to the source host, multiple intermediate switches through which the packet will be transmitted, and the destination switch which connects to the destination host. In high traffic scenarios, the flow tables of these switches become full and the flow rules must be repeatedly replaced by the controller. Hiep T. Nguyen Tri et al. proposed a solution for the same, by using an OpenDaylight controller feature that forwards packets to the destination switch directly and install a flow table rules only on it. In this paper we show how a DDoS attack can be instigated on a primary server i.e. the server providing important services like web server, file server etc., present in SDN which uses the abovementioned solution during high traffic scenarios. The attack is instigated by generating huge number of packets with destination IP addresses such that it compels the controller to always choose the switch which connects the primary sever to the rest of the network as the destination switch. The flow table rules are repeatedly installed by the controller into this switch, leading to exhaustion of its flow table space. This blocks the genuine traffic between the primary server and its clients as the flow rules that would service legitimate clients get replaced by flow rules that process this attack traffic.