A DDoS Vulnerability Analysis System against Distributed SDN Controllers in a Cloud Computing Environment
Abstract
:1. Introduction
1.1. Major Contributions
- To analyze the DDoS attack vulnerability of ODL and ONOS (stable released versions) by using different penetration tools and scripts on distributed cloud environments (AWS, Azure);
- The network topology is created using the Mininet emulation tool on the host PC;
- Generated malicious network traffic is bombarded on the leader node of every controller and, for this, we have considered five varied scenarios;
- Real-time network analysis is achieved through Wireshark on varied scenarios;
- From experimentation, we have found that a vulnerability system against DDoS attacks on both ODL and ONOS (located distributed) is successful in a distributed cloud environment.
1.2. Structure of the Paper
2. Related Work
3. Proposed Methodology
3.1. Emulation Tool
3.2. Multiple Machines and Distributed Environment
4. Results of the Experimentation
4.1. Scenario before DDoS Attack
4.2. An Attack Could Be Launched against Any Organization
4.3. Traffic Range for ODL and ONOS
4.4. Customers to Target
4.5. CPU Utilization
- Permits authorized users to access resources and services after identifying a denial-of-service attack, such as a TCP;
- Lowers and SYN Flood CPU burden;
- To successfully detect denial-of-service attacks, the method employs a threshold and abuse detection strategy. TCP SYN flood attacks are created using the Linux hping tool. The majority of the malicious TCP packets are generated by the hping tool for web servers.
4.6. Memory Utilization
4.7. Disk Utilization
5. Conclusions and Future Scope
Author Contributions
Funding
Conflicts of Interest
References
- Casado, M.; Koponen, T.; Shenker, S.; Tootoonchian, A. Fabric: A retrospective on evolving SDN. In Proceedings of the First Workshop on Hot Topics in Software Defined Networks, Helsinki, Finland, 13 August 2012; Association for Computing Machinery: New York, NY, USA, 2012; pp. 85–90. [Google Scholar]
- Gelberger, A.; Yemini, N.; Giladi, R. Performance analysis of software-defined networking (SDN). In Proceedings of the 2013 IEEE 21st International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems, San Francisco, CA, USA, 14–16 August 2013; IEEE: Piscataway, NJ, USA; pp. 389–393. [Google Scholar]
- Khondoker, R.; Zaalouk, A.; Marx, R.; Bayarou, K. Feature-based comparison and selection of Software Defined Networking (SDN) controllers. In Proceedings of the 2014 World Congress on Computer Applications and Information Systems (WCCAIS), Hammamet, Tunisia, 17–19 January 2014; IEEE: Piscataway, NJ, USA; pp. 1–7. [Google Scholar]
- Baktir, A.C.; Ozgovde, A.; Ersoy, C. How Can Edge Computing Benefit From Software-Defined Networking: A Survey, Use Cases, and Future Directions. IEEE Commun. Surv. Tutor. 2017, 19, 2359–2391. [Google Scholar] [CrossRef]
- Sun, S.; Gong, L.; Rong, B.; Lu, K. An intelligent SDN framework for 5G heterogeneous networks. IEEE Commun. Mag. 2015, 53, 142–147. [Google Scholar] [CrossRef]
- Yoon, C.; Park, T.; Lee, S.; Kang, H.; Shin, S.; Zhang, Z. Enabling security functions with SDN: A feasibility study. Comput. Netw. 2015, 85, 19–35. [Google Scholar] [CrossRef]
- Badotra, S.; Panda, S.N. SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking. Clust. Comput. 2021, 24, 501–513. [Google Scholar] [CrossRef]
- Basta, A.; Kellerer, W.; Hoffmann, M.; Morper, H.J.; Hoffmann, K. Applying NFV and SDN to LTE mobile core gateways, the functions placement problem. In Proceedings of the 4th Workshop on All Things Cellular: Operations, Applications, Challenges, Chicago, IL, USA, 22 August 2014; Association for Computing Machinery: New York, NY, USA, 2014; pp. 33–38. [Google Scholar]
- Xia, W.; Wen, Y.; Foh, C.H.; Niyato, D.; Xie, H. A survey on software-defined networking. IEEE Commun. Surv. Tutor. 2015, 17, 27–51. [Google Scholar] [CrossRef]
- Aburukba, R.O.; AliKarrar, M.; Landolsi, T.; El-Fakih, K. Scheduling Internet of Things requests to minimize latency in hybrid Fog–Cloud computing. Future Gener. Comput. Syst. 2020, 111, 539–551. [Google Scholar] [CrossRef]
- Gupta, A.; Sharma, L.S. Performance Evaluation of Snort and Suricata Intrusion Detection Systems on Ubuntu Server. In Proceedings of the ICRIC 2019, Jammu, India, 8–9 March 2019; Springer: Cham, Switzerland, 2020; pp. 811–821. [Google Scholar]
- Shorey, T.; Subbaiah, D.; Goyal, A.; Sakxena, A.; Mishra, A.K. Performance Comparison and Analysis of Slowloris, GoldenEye and Xerxes DDoS Attack Tools. In Proceedings of the 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Bangalore, India, 19–22 September 2018; IEEE: Piscataway, NJ, USA; pp. 318–322. [Google Scholar]
- Mouradian, C.; Kianpisheh, S.; Abu-Lebdeh, M.; Ebrahimnezhad, F.; Jahromi, N.T.; Glitho, R.H. Application component placement in NFV-based hybrid cloud/fog systems with mobile fog nodes. IEEE J. Sel. Areas Commun. 2019, 37, 1130–1143. [Google Scholar] [CrossRef]
- Badotra, S.; Panda, S.N. Software-defined networking: A novel approach to networks. In Handbook of Computer Networks and Cyber Security; Springer: Cham, Switzerland, 2020; pp. 313–339. [Google Scholar]
- Badotra, S.; Panda, S.N.; Datta, P. Detection and Prevention from DDoS Attack Using Software-Defined Security. In Progress in Advanced Computing and Intelligent Engineering; Springer: Singapore, 2021; pp. 207–217. [Google Scholar]
- Badotra, S.; Nagpal, D.; Panda, S.N.; Tanwar, S.; Bajaj, S. IoT-enabled healthcare network with SDN. In Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), Noida, India, 4–5 June 2020; IEEE: Piscataway, NJ, USA; pp. 38–42. [Google Scholar]
- Bharany, S.; Kaur, K.; Badotra, S.; Rani, S.; Wozniak, M.; Shafi, J.; Ijaz, M.F. Efficient Middleware for the Portability of PaaS Services Consuming Applications among Heterogeneous Clouds. Sensors 2022, 22, 5013. [Google Scholar] [CrossRef]
- Badotra, S.; Panda, S.N. Experimental comparison and evaluation of various OpenFlow software defined networking controllers. Int. J. Appl. Sci. Eng. 2020, 17, 317–324. [Google Scholar]
- Bharany, S.; Sharma, S.; Bhatia, S.; Rahmani, M.K.I.; Shuaib, M.; Lashari, S.A. Energy Efficient Clustering Protocol for FANETS Using Moth Flame Optimization. Sustainability 2022, 14, 6159. [Google Scholar] [CrossRef]
- Betgé-Brezetz, S.; Kamga, G.B.; Tazi, M. Trust support for SDN controllers and virtualized network applications. In Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft), London, UK, 13–17 April 2015; IEEE: Piscataway, NJ, USA; pp. 1–5. [Google Scholar]
- Isong, B.; Kgogo, T.; Lugayizi, F.; Kankuzi, B. Trust establishment framework between SDN controller and applications. In Proceedings of the 2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), Kanazawa, Japan, 26–28 June 2017; IEEE: Piscataway, NJ, USA; pp. 101–107. [Google Scholar]
Paper | Title | About |
---|---|---|
[1] | An Analysis of the Reliability of the Software-Defined Network Controllers ONOS and ODL | The purpose of this study is to examine how ODL and ONOS manage different failure situations in their data and control planes. |
[2] | Comparative Study of the Effectiveness of a Number of SDN Controllers Over a Range of Network Sizes in SDWN | Based on the many features and conditions of the wireless network, the results of this experiment may be utilized to determine the most suitable controller. |
[3] | A Comprehensive Study of the Performance of Several Open Flow Software-Defined Network Controllers by Addressing Scalability Metrics Based on Numerous Topology Designs on Software-defined Networks | There are a number of challenges associated with deploying SDN, including determining which controller platform is best for obtaining beyond conventional network constraints and determining how to evaluate the performance of SDN open flow controllers. The inquiry then moves on to the potential literature or work done by a range of academics on the issue of performance analysis and evaluation of open flow-based SDN controllers. |
[4] | A Control Plane That Is Both Secure and Resilient for Software-Defined Networks Is Known as SDN-ESRC. | They offer a framework for evaluating SDN-ESRC and theoretically look at how well it protects against three common backdoor attack scenarios. Simulations and testing have been done while SDN-ESRC has been integrated in a prototype system. |
[5] | An Evaluation and Analysis of the Available SDN Network Operating Systems with the Purpose of Selecting the Most Appropriate One for Cloud Data Centers | We found that ODL is the most similar NOS to CDC compared to the others we looked at. However, ODL and ONOS provide almost identical findings when evaluated against the other NOSs. |
[6] | Detection of Distributed Denial of Service Attacks in the Internet of Things Using Recurrent Neural Networks | The programme classifies the sort of attack using an exclusive activation function and ideas from machine learning and deep learning. We put the suggested classifier through its paces 177 times. Mininet and Wireshark were used throughout the simulation to properly detect the many DDoS attempts on the network. |
[7] | Test Design of SDN Controllers from the Perspective of Combinatorial Testing | Programmable networks have been made possible by OpenDayLight, an open-source software-defined network controller. To provide programmable and interoperable networks to service providers, corporations, institutions, and organizations, it has united business and the OpenDayLight community. It is a dynamic project with a variety of releases, all of which necessitate thorough testing to guarantee high-quality software. To make sure that current features are not impacted, efficient regression testing is necessary. |
[8] | Open-Source Platforms Used in a Fully Integrated Software-Defined Networking Testbed | Software-defined networking, network function virtualization (NFV), cloud computing, multi-access edge computing (MEC), and network slicing are just a few of the networking concepts developed to improve the performance, portability, scalability, and energy efficiency of networks in the Internet of Things era. SDN separates the network’s control plane and data plane to overcome the limitations of conventional networking technologies such static setup, lack of scalability, and inefficiency. |
Name of the Machine | IP Addresses | Specifications |
---|---|---|
Controller-1 (ONOS Leader) (V) | 192.142.99.99 | Controller installed in the AWS cloud at Chicago |
Controller-2 (ONOS follower) | 192.35.14.253 | Controller installed in the AWS cloud at Mumbai |
Controller-3 (ODL follower) | 192.73.75.70 | Controller installed in the AWS cloud at Europe |
Mininet (Virtual Machine) | 192.53.105.6 | Mininet is installed in a Personnel Computer (PC) |
Parameters’ Scenarios | Controller | No. of Packets/Secs | The Amount of Time in Seconds When the Leader Was Taken Down | Type of Network Traffic | Memory Utilization % | CPU Utilization % | Disk Utilization % |
---|---|---|---|---|---|---|---|
I | ODL | 5000 | 25 | TCP SYN and HTTP | 96 | 98 | 95 |
ONOS | 5000 | 23 | TCP SYN and HTTP | 90 | 91 | 92 | |
II | ODL | 10,000 | 20 | TCP SYN | 84 | 89 | 90 |
ONOS | 10,000 | 17 | TCP SYN | 80 | 84 | 79 | |
III | ODL | 15,000 | 18 | HTTP | 72 | 75 | 82 |
ONOS | 15,000 | 15 | HTTP | 67 | 69 | 63 | |
IV | ODL | 20,000 | 14 | TCP SYN | 59 | 70 | 73 |
ONOS | 20,000 | 10 | TCP SYN | 50 | 62 | 54 | |
V | ODL | 25,000 | 11 | TCP SYN and HTTP | 43 | 57 | 46 |
ONOS | 25,000 | 08 | TCP SYN and HTTP | 38 | 46 | 35 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Badotra, S.; Tanwar, S.; Bharany, S.; Rehman, A.U.; Eldin, E.T.; Ghamry, N.A.; Shafiq, M. A DDoS Vulnerability Analysis System against Distributed SDN Controllers in a Cloud Computing Environment. Electronics 2022, 11, 3120. https://doi.org/10.3390/electronics11193120
Badotra S, Tanwar S, Bharany S, Rehman AU, Eldin ET, Ghamry NA, Shafiq M. A DDoS Vulnerability Analysis System against Distributed SDN Controllers in a Cloud Computing Environment. Electronics. 2022; 11(19):3120. https://doi.org/10.3390/electronics11193120
Chicago/Turabian StyleBadotra, Sumit, Sarvesh Tanwar, Salil Bharany, Ateeq Ur Rehman, Elsayed Tag Eldin, Nivin A. Ghamry, and Muhammad Shafiq. 2022. "A DDoS Vulnerability Analysis System against Distributed SDN Controllers in a Cloud Computing Environment" Electronics 11, no. 19: 3120. https://doi.org/10.3390/electronics11193120
APA StyleBadotra, S., Tanwar, S., Bharany, S., Rehman, A. U., Eldin, E. T., Ghamry, N. A., & Shafiq, M. (2022). A DDoS Vulnerability Analysis System against Distributed SDN Controllers in a Cloud Computing Environment. Electronics, 11(19), 3120. https://doi.org/10.3390/electronics11193120