HSDT: Table-Overflow Attack Defender with Historical Statistics Based Dynamic Timeout in Software Defined Networks †
Abstract
:1. Introduction
- We developed an algorithm that determines a history-based dynamic timeout using a 2D counting bloom filter.
- We implemented the defense system that alleviates the flow table overflow attack using the algorithm.
- We proved how effectively our scheme reduces the number of flows through comprehensive experiments in a real testbed.
2. Materials and Methods
2.1. Timeout Revisit and Intuition
2.1.1. Timeout
2.1.2. Intuition
2.2. Proposed Scheme
2.2.1. Procedure Overview
- A flow comes. If there is no rule that the flow matches, the packet in the message is forwarded to the Timeout Calculation Module via the controller.
- The timeout calculation module retrieves the historical statistic of the flow from the 2D counting bloom filter.
- The timeout calculation module calculates the flow’s hard timeout and idle timeout.
- Installs the rule for the flow into the switch.
- When a flow rule expires due to the timeouts, flow-removed messages are forwarded to the Statistics Module via the controller.
- The statistics module updates AFD and the flow’s statistics.
2.2.2. System Design Details
- 2-dimensional Counting Bloom Filter
- Statistics Module
- Timeout Calculation Module
2.2.3. Consideration
2.3. Evaluation Method
2.3.1. Experimental Setup
2.3.2. Attack Emulation
- Host 1 replays captured packets [13] to emulate normal flows.
- While Host 1 is sending packets, the attacker generates packets with random source/destination IP addresses and ports and sends them to a victim. We used Scapy v.2.5.0, a python library, to generate packets.
- As time passes, flow rules are installed in a flow table with timeouts. In the case of attack flow rules, they have a particular cookie to be distinguished by the controller.
- During this flow rules installation process, the controller receives Flow_removed messages [14]. Using the information in the messages, the controller updates the bloom filter.
- The controller records the number of flow rules periodically via aggregate flow statistics request message. The controller is aware of which flow rule is attack flow because all attack flow has a particular cookie in our experiment.
3. Results
3.1. The Number of Flow Rules
3.2. Bandwidth
4. Discussion
4.1. Related Works
4.2. Evaluation
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Scott-Hayward, S.; O’Callaghan, G.; Sezer, S. SDN security: A survey. In Proceedings of the 2013 IEEE SDN For Future Networks and Services (SDN4FNS), Trento, Italy, 11–13 November 2013; IEEE: Piscataway, NJ, USA, 2013. [Google Scholar]
- Chica, J.C.C.; Imbachi, J.C.; Botero, J.F. Security in SDN: A comprehensive survey. J. Netw. Comput. Appl. 2020, 159, 102595. [Google Scholar] [CrossRef]
- Chuang, C.-C.; Yu, Y.-J.; Pang, A.-C.; Chen, G.-Y. Minimization of TCAM usage for SDN scalability in wireless data centers. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; IEEE: Piscataway, NJ, USA, 2016. [Google Scholar]
- Zhang, M.; Bi, J.; Bai, J.; Li, G. FloodShield: Securing the SDN Infrastructure Against Denial-of-Service Attacks. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 687–698. [Google Scholar] [CrossRef]
- Zhu, H.; Fan, H.; Luo, X.; Jin, Y. Intelligent timeout master: Dynamic timeout for SDN-based data centers. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, Canada, 11–15 May 2015; pp. 734–737. [Google Scholar] [CrossRef]
- Sooden, B.; Abbasi, M.R. A Dynamic Hybrid Timeout Method to Secure Flow Tables Against DDoS Attacks in SDN. In Proceedings of the 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar, India, 15–17 December 2018; pp. 29–34. [Google Scholar] [CrossRef]
- Li, X.; Huang, Y. A Flow Table with Two-Stage Timeout Mechanism for SDN Switches. In Proceedings of the 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Zhangjiajie, China, 10–12 August 2019; pp. 1804–1809. [Google Scholar] [CrossRef]
- Zhang, M.; Bi, J.; Bai, J.; Dong, Z.; Li, Y.; Li, Z. Ftguard: A priority-aware strategy against the flow table overflow attack in sdn. In Proceedings of the SIGCOMM Posters and Demos, New York, NY, USA, 22–24 August 2017; pp. 141–143. [Google Scholar]
- Shang, G.; Zhe, P.; Bin, X.; Aiqun, H.; Kui, R. FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks. In Proceedings of the IEEE INFOCOM 2017—IEEE Conference on Computer Communications, Atlanta, GA, USA, 1–4 May 2017; pp. 1–9. [Google Scholar] [CrossRef]
- Noh, S.K.; Kang, M.; Park, M. Protection against flow table overflow attack in software defined networks. In Proceedings of the 2021 International Conference on Information Networking (ICOIN), Jeju, Republic of Korea, 13–16 January 2021; IEEE: Piscataway, NJ, USA, 2021. [Google Scholar]
- Geravand, S.; Mahmood, A. Bloom filter applications in network security: A state-of-the-art survey. Comput. Netw. 2013, 57, 4047–4064. [Google Scholar] [CrossRef]
- Bonomi, F.; Mitzenmacher, M.; Panigrahy, R.; Singh, S.; Varghese, G. An improved construction for counting bloom filters. In Proceedings of the Algorithms–ESA 2006: 14th Annual European Symposium, Zurich, Switzerland, 11–13 September 2006; Springer: Berlin/Heidelberg, Germany, 2006. [Google Scholar]
- Available online: https://s3.amazonaws.com/tcpreplay-pcap-files/bigFlows.pcap (accessed on 11 December 2022).
- Open Networking Foundation. Openflow Switch Specification. 2014. Available online: http://www.opennetworking.org (accessed on 1 December 2022).
- Ubale, T.; Jain, A.K. Survey on DDoS Attack Techniques and Solutions in Software-Defined Network. In Handbook of Computer Networks and Cyber Security; Gupta, B., Perez, G., Agrawal, D., Gupta, D., Eds.; Springer: Cham, Switzerland, 2020. [Google Scholar]
- Xu, T.; Gao, D.; Dong, P.; Foh, C.H.; Zhang, H. Mitigating the Table-Overflow Attack in Software-Defined Networking. IEEE Trans. Netw. Serv. Manag. 2017, 14, 1086–1097. [Google Scholar] [CrossRef]
- Zhang, L.; Lin, R.; Xu, S.; Wang, S. AHTM: Achieving efficient flow table utilization in Software Defined Networks. In Proceedings of the 2014 IEEE Global Communications Conference, Austin, TX, USA, 8–12 December 2014; pp. 1897–1902. [Google Scholar] [CrossRef]
- Tang, D.; Zhang, D.; Qin, Z.; Yang, Q.; Xiao, S. SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks. J. Netw. Comput. Appl. 2023, 213, 103597. [Google Scholar] [CrossRef]
- Sayed, M.S.E.; Le-Khac, N.-A.; Azer, M.A.; Jurcut, A.D. A Flow-Based Anomaly Detection Approach with Feature Selection Method Against DDoS Attacks in SDNs. IEEE Trans. Cogn. Commun. Netw. 2022, 8, 1862–1880. [Google Scholar] [CrossRef]
- Jain, L.; Venkanna, U. P4 based Switch Centric Flow table Overflow Detection and Mitigation in Data Plane Devices. In Proceedings of the 2023 5th International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, 3–5 March 2023; pp. 1–6. [Google Scholar] [CrossRef]
- Hamid, Y.; Sugumaran, M.; Balasaraswathi, V.R. Ids using machine learning-current state of art and future directions. Br. J. Appl. Sci. Technol. 2016, 15, BJAST.23668. [Google Scholar] [CrossRef]
- Chaabouni, N.; Mosbah, M.; Zemmari, A.; Sauvignac, C. A OneM2M Intrusion Detection and Prevention System based on Edge Machine Learning. In Proceedings of the NOMS 2020—2020 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 20–24 April 2020; pp. 1–7. [Google Scholar] [CrossRef]
- Tang, D.; Gao, C.; Liang, W.; Zhang, J.; Li, K. FTMaster: A Detection and Mitigation System of Low-rate Flow Table Overflow Attacks via SDN. IEEE Trans. Netw. Serv. Manag. 2023, 11, 123659–123676. [Google Scholar] [CrossRef]
Variable Definitions | |
---|---|
M | Memory size of a bloom filter |
r | The number of rows (filter length for source address) |
c | The number of columns (filter length for destination address) |
e | the size of an element (# of bits for each counter) |
# of hash functions for source address | |
# of hash functions for destination address | |
p | Total false positive ratio |
False positive ratio of a row for source | |
False positive ratio of a column for destination | |
S | # of items for source addresses (e.g., # of source IP/port pairs) |
D | # of items for destination addresses (e.g., # of destination IP/port pairs) |
Parameters | Value |
---|---|
Number of counters (r × c) | 1248 × 9248 |
Counter size (e) | 8-bit |
Number of ash functions () | 3 |
Number of hash functions ( | 3 |
Probability of false positive ( and ) | 0.1 |
Hard Timeout | Idle Timeout | |
---|---|---|
Environment 1 (Proposed Scheme) | Dynamic | Dynamic |
Environment 2 | None | 10 s |
Environment 3 | 10 s | 5 s |
Environment 4 (FTGuard) | None | None |
Environment 1 | Environment 2 | Environment 3 | Environment 4 | |
---|---|---|---|---|
Bandwidth consumption | RX: 302 KiB/s | RX: 184 KiB/s | RX: 190 KiB/s | RX: 451 KiB/s |
TX: 344 KiB/s | TX: 320 KiB/s | TX: 328 KiB/s | TX: 189 KiB/s |
Domain | Solution/Techniques | Timeout Usage | |
---|---|---|---|
[4] | SDN-aimed DoS | Source address validation/stateful packet monitoring | - |
[5] | Efficient Timeout for Data Centers | Caching flow rules, dynamic timeout | Idle timeout only |
[6] | Flow Table Overflow Attack | Categorizing flows and applying hard or idle timeout based on the categories | Hard timeout or Idle timeout |
[7] | Efficient Flow Table Utilization | Caching flow rules, proactive eviction | Idle timeout only |
[8] | Flow Table Overflow Attack | Proactive evicting based on the flow rule priority | - |
[9] | SDN-aimed DoS | Dynamic monitoring/detouring | - |
[16] | Flow Table Overflow Attack | Identifying possible victim switch and applying rate limiting | - |
[17] | Efficient Flow Table Utilization | Optimized timeout based on the mathematical modelling | Mainly hard timeout |
[18] | Flow Table Overflow Attack | Prediction/eviction/scoring flow rules with Machine Learning | - |
[19] | DDoS in SDN | Deep Learning with LSTM + Autoencoder model | - |
[20] | Flow Table Overflow Attack | Moving monitoring/mitigation logic to data plane using P4 Switch | - |
Proposed Scheme | Flow Table Overflow Attack | Dynamic timeout based on the flow history | Hard timeout and Idle timeout |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Noh, S.K.; Park, M. HSDT: Table-Overflow Attack Defender with Historical Statistics Based Dynamic Timeout in Software Defined Networks. Appl. Sci. 2023, 13, 12232. https://doi.org/10.3390/app132212232
Noh SK, Park M. HSDT: Table-Overflow Attack Defender with Historical Statistics Based Dynamic Timeout in Software Defined Networks. Applied Sciences. 2023; 13(22):12232. https://doi.org/10.3390/app132212232
Chicago/Turabian StyleNoh, Sichul Kevin, and Minho Park. 2023. "HSDT: Table-Overflow Attack Defender with Historical Statistics Based Dynamic Timeout in Software Defined Networks" Applied Sciences 13, no. 22: 12232. https://doi.org/10.3390/app132212232