Advertisement

Taxonomy of DDoS Attacks in Software-Defined Networking Environment

  • Tushar Ubale
  • Ankit Kumar JainEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 958)

Abstract

Software Defined Networking brings in the concept of “Programmable Network” in the networking domain which in turn lends flexibility, simplicity for managing the network. The key idea behind this simplicity is decoupling of the control plane from the data plane. Nevertheless, such decoupling of the planes also acquaints SDN to the most critical type of attack, i.e., DDoS attack. Our goal is to showcase a concise survey of DDoS attacks in SDN and then present comparative solutions against these DDoS attacks. Firstly, we discuss the life cycle of DDoS attack in SDN. Then several taxonomies of DDoS attacks which affect SDN environment have been discussed, followed by which analysis is performed to cover the taxonomy of solutions for this severe type of attacks. Finally, we present, future research directions that will be a crucial idea to defend such attacks in near future.

Keywords

Software Defined Networking (SDN) DDoS attack Security Authentication 

References

  1. 1.
    ITU Telecommunication Standardization Sector’s SDN Portal. www.itu.int/en/ITU-T/about/Pages/default.aspx
  2. 2.
    Open Networking Foundation. https://www.opennetworking.org
  3. 3.
    Kreutz, D., Ramos, F.M., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14–76 (2015)CrossRefGoogle Scholar
  4. 4.
    Koponen, T., et al.: Onix: a distributed control platform for large-scale production networks. In: OSDI, vol. 10, pp. 1–6, October 2010Google Scholar
  5. 5.
    Tootoonchian, A., Ganjali, Y.: HyperFlow: a distributed control plane for OpenFlow. In: Proceedings of the 2010 Internet Network Management Conference on Research on Enterprise Networking, p. 3, April 2010Google Scholar
  6. 6.
    Specht, S.M., Lee, R.B.: Distributed denial of service: taxonomies of attacks, tools, and countermeasures. In: ISCA PDCS, pp. 543–550, September 2004Google Scholar
  7. 7.
    Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046–2069 (2013)CrossRefGoogle Scholar
  8. 8.
    Shin, S., Gu, G.: Attacking software-defined networks: a first feasibility study. In Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp. 165–166. ACM, August 2013Google Scholar
  9. 9.
    Brooks, M., Yang, B.: A man-in-the-middle attack against opendaylight SDN controller. In: Proceedings of the 4th Annual ACM Conference on Research in Information Technology, pp. 45–49. ACM, September 2015Google Scholar
  10. 10.
    Akhunzada, A., Ahmed, E., Gani, A., Khan, M.K., Imran, M., Guizani, S.: Securing software defined networks: taxonomy, requirements, and open issues. IEEE Commun. Mag. 53(4), 36–44 (2015)CrossRefGoogle Scholar
  11. 11.
    Wang, A., Guo, Y., Hao, F., Lakshman, T.V., Chen, S.: Scotch: elastically scaling up SDN control-plane using vswitch based overlay. In: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, pp. 403–414. ACM, December 2014Google Scholar
  12. 12.
    Wang, R., Jia, Z., Ju, L.: An entropy-based distributed DDoS detection mechanism in software-defined networking. In: 2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1, pp. 310–317. IEEE, August 2015Google Scholar
  13. 13.
    Mousavi, S.M., St-Hilaire, M.: Early detection of DDoS attacks against SDN controllers. In: 2015 International Conference on Computing, Networking and Communications (ICNC), pp. 77–81. IEEE, February 2015Google Scholar
  14. 14.
    Kandoi, R., Antikainen, M.: Denial-of-service attacks in OpenFlow SDN networks. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 1322–1326. IEEE, May 2015Google Scholar
  15. 15.
    Dao, N.N., Park, J., Park, M., Cho, S.: A feasible method to combat against DDoS attack in SDN network. In: 2015 International Conference on Information Networking (ICOIN), pp. 309–311. IEEE, January 2015Google Scholar
  16. 16.
    You, W., Qian, K., Qian, Y.: Software-defined network flow table overflow attacks and countermeasures. Int. J. Soft Comput. Netw. 1(1), 70–81 (2016)CrossRefGoogle Scholar
  17. 17.
    Yuan, B., Zou, D., Yu, S., Jin, H., Qiang, W., Shen, J.: Defending against flow table overloading attack in software-defined networks. IEEE Trans. Serv. Comput. (2016)Google Scholar
  18. 18.
    Shin, S., Yegneswaran, V., Porras, P., Gu, G.: Avant-guard: scalable and vigilant switch flow management in software-defined networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 413–424. ACM, November 2013Google Scholar
  19. 19.
    Piedrahita, A.F.M., Rueda, S., Mattos, D.M., Duarte, O.C.M.: FlowFence: a denial of service defense system for software defined networking. In: 2015 Global Information Infrastructure and Networking Symposium (GIIS), pp. 1–6. IEEE, October 2015Google Scholar
  20. 20.
    Shang, G., Zhe, P., Bin, X., Aiqun, H., Kui, R.: FloodDefender: protecting data and control plane resources under SDN-aimed DoS attacks. In: INFOCOM 2017-IEEE Conference on Computer Communications, IEEE, pp. 1–9. IEEE, May 2017Google Scholar
  21. 21.
    Wang, H., Xu, L., Gu, G.: FloodGuard: a DoS attack prevention extension in software-defined networks. In: 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 239–250. IEEE, June 2015Google Scholar
  22. 22.
    Kuerban, M., Tian, Y., Yang, Q., Jia, Y., Huebert, B., Poss, D.: FlowSec: DOS attack mitigation strategy on SDN controller. In: 2016 IEEE International Conference on Networking, Architecture and Storage (NAS), pp. 1–2. IEEE, August 2016Google Scholar
  23. 23.
    Zhang, P., Wang, H., Hu, C., Lin, C.: On denial of service attacks in software defined networks. IEEE Netw. 30(6), 28–33 (2016)CrossRefGoogle Scholar
  24. 24.
    Hsu, S.W., et al.: Design a hash-based control mechanism in vSwitch for software-defined networking environment. In: 2015 IEEE International Conference on Cluster Computing (CLUSTER), pp. 498–499. IEEE, September 2015Google Scholar
  25. 25.
    Wei, L., Fung, C.: FlowRanger: a request prioritizing algorithm for controller DoS attacks in software defined networks. In: 2015 IEEE International Conference on Communications (ICC), pp. 5254–5259. IEEE, June 2015Google Scholar
  26. 26.
    Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX/OpenFlow. In: 2010 IEEE 35th Conference on Local Computer Networks (LCN), pp. 408–415. IEEE, October 2010Google Scholar
  27. 27.
    He, B., Dong, L., Xu, T., Fei, S., Zhang, H., Wang, W.: Research on network programming language and policy conflicts for SDN. Concurr. Comput.: Pract. Exp. 29(19), e4218 (2017)CrossRefGoogle Scholar
  28. 28.
    Shin, S., et al.: Rosemary: a robust, secure, and high-performance network operating system. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 78–89. ACM, November 2014Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.NIT KurukshetraKurukshetraIndia

Personalised recommendations