SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke

Slides:



Advertisements
Similar presentations
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Advertisements

IP Forwarding Relates to Lab 3.
Delivery and Forwarding of
A Scalable and Reconfigurable Search Memory Substrate for High Throughput Packet Processing Sangyeun Cho and Rami Melhem Dept. of Computer Science University.
1 Mobile IPv6-Based Ad Hoc Networks: Its Development and Application Advisor: Dr. Kai-Wei Ke Speaker: Wei-Ying Huang.
NETWORK LAYER (1) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Outline Introduction Related work on packet classification Grouper Performance Empirical Evaluation Conclusions.
OpenFlow-Based Server Load Balancing GoneWild
SDN and Openflow.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
Hash Tables With Finite Buckets Are Less Resistant to Deletions Yossi Kanizo (Technion, Israel) Joint work with David Hay (Columbia U. and Hebrew U.) and.
An Efficient IP Lookup Architecture with Fast Update Using Single-Match TCAMs Author: Jinsoo Kim, Junghwan Kim Publisher: WWIC 2008 Presenter: Chen-Yu.
Fast binary and multiway prefix searches for pachet forwarding Author: Yeim-Kuan Chang Publisher: COMPUTER NETWORKS, Volume 51, Issue 3, pp , February.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
PARALLEL TABLE LOOKUP FOR NEXT GENERATION INTERNET
– Chapter 5 – Secure LAN Switching
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
CS3502: Data and Computer Networks Local Area Networks - 4 Bridges / LAN internetworks.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
IP Forwarding.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Wire Speed Packet Classification Without TCAMs ACM SIGMETRICS 2007 Qunfeng Dong (University of Wisconsin-Madison) Suman Banerjee (University of Wisconsin-Madison)
Delivery, Forwarding, and Routing of IP Packets
Author : Guangdeng Liao, Heeyeol Yu, Laxmi Bhuyan Publisher : Publisher : DAC'10 Presenter : Jo-Ning Yu Date : 2010/10/06.
1. Outline Introduction Related work on packet classification Grouper Performance Analysis Empirical Evaluation Conclusions 2/42.
Othman Othman M.M., Koji Okamura Kyushu University Proceedings of the 32 nd Asia-Pacific Advanced Network Meeting India, New Delhi, 2001/8/22.
1 Fast packet classification for two-dimensional conflict-free filters Department of Computer Science and Information Engineering National Cheng Kung University,
Efficient Cache Structures of IP Routers to Provide Policy-Based Services Graduate School of Engineering Osaka City University
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
BalanceFlow: Controller load balancing for OpenFlow networks Hu, Yannan ; Wang, Wendong ; Gong, Xiangyang ; Que, Xirong ; Cheng, Shiduan Cloud Computing.
1 Bit Weaving: A Non-Prefix Approach to Compressing Packet Classifiers in TCAMs Author: Chad R. Meiners, Alex X. Liu, and Eric Torng Publisher: IEEE/ACM.
IP Routing table compaction and sampling schemes to enhance TCAM cache performance Author: Ruirui Guo a, Jose G. Delgado-Frias Publisher: Journal of Systems.
Author : Lynn Choi, Hyogon Kim, Sunil Kim, Moon Hae Kim Publisher/Conf : IEEE/ACM TRANSACTIONS ON NETWORKING Speaker : De yu Chen Data :
Packet Classification Using Multi- Iteration RFC Author: Chun-Hui Tsai, Hung-Mao Chu, Pi-Chung Wang Publisher: 2013 IEEE 37th Annual Computer Software.
First generation firewalls packets filtering ريماز ابراهيم محمد علي دعاء عادل محمد عسجد سامي عبدالكريم.
Programming Assignment 2 Zilong Ye. Traditional router Control plane and data plane embed in a blackbox designed by the vendor high-seed switching fabric.
Author : Tzi-Cker Chiueh, Prashant Pradhan Publisher : High-Performance Computer Architecture, Presenter : Jo-Ning Yu Date : 2010/11/03.
By: Yaron Levy Supervisors: Dr. Shlomo Greenberg Mr. Hagai David.
Ready-to-Deploy Service Function Chaining for Mobile Networks
Chapter 2 Network Models
Introduction to Networks v6.0
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
Instructor Materials Chapter 5: Ethernet
Networking Devices.
Packet Forwarding.
IP Forwarding Covers the principles of end-to-end datagram delivery in IP networks.
– Chapter 5 – Secure LAN Switching
IP Forwarding Relates to Lab 3.
What’s “Inside” a Router?
CS 31006: Computer Networks – The Routers
Timed Consistent Network Updates in Software-Defined Networks
DDoS Attack Detection under SDN Context
Transport Layer Systems Packet Classification
Module 8: Ethernet Switching
IP Forwarding Relates to Lab 3.
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
Delivery and Forwarding of
IP Forwarding Relates to Lab 3.
Implementing an OpenFlow Switch on the NetFPGA platform
Virtual TCAM for Data Center Switches
Delivery, Forwarding, and Routing of IP Packets
IP Forwarding Relates to Lab 3.
Networking and Network Protocols (Part2)
IP Forwarding Relates to Lab 3.
Worst-Case TCAM Rule Expansion
Authors: Ding-Yuan Lee, Ching-Che Wang, An-Yeu Wu Publisher: 2019 VLSI
Chapter 4: outline 4.1 Overview of Network layer data plane
Presentation transcript:

SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke NetworksDetecting and Mitigating Denial of Service Attacks against the Data Plane in Software Defined Networks SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke DATE:2018/03/23

Outline INTRODUCTION RELATED WORK DENIAL OF SERVICE ATTACKS AGAINST THE DATA PLANE EVALUATION CONCLUSION 1

INTRODUCTION Software Defined Networking (SDN) SDN proposes a marked shift from the current network infrastructure by decoupling the network logic layer, called the control plane, and the data layer, called the data plane, into separate entities. 2

2) into a PacketIn message and sent to the controller. 1) A host sends a packet for a new connection which reaches an SDN switch. 2) into a PacketIn message and sent to the controller. 3) In the controller the PacketIn is processed by an SDN application. 4) If has set up a rule in the switch to handle the flow, further packets belonging to that flow will be processed. 3

RELATED WORK In this work we focus on a much less investigated area of SDN security – the detection and mitigation of Denial of Service attacks against the data plane. Forwarding tables have limited memory capacities. Typically, switches rely on Content Addressable Memory (CAM) that performs table lookups at line rate. Especially, Ternary CAM (TCAM) is expensive and therefore very small, ranging in the region of 1k to 2k entries. But also, regular and cheaper Binary CAM (BCAM) is limited to only a couple of 100k entries. 4

LIMITATIONS OF THE RELATED WORK Some works extend the available table size by using a combination of software and hardware flow tables. the severity of the DoS is reduced, as software tables allow far more entries. Although, also software tables suffer from performance penalties for big table sizes, e.g. Open vSwitch uses a linear search to handle wildcard rules. 5

DENIAL OF SERVICE ATTACKS AGAINST THE DATA PLANE The attacker causes a high number of PacketIn messages by changing header fields. Our proposed detection approach is based on the observation that an attacker cannot change all header fields. This allows us to identify the attack. 6

Attack Description An attacker knowing about the controller’s decision making and flow rule setting behavior is able to craft packets. For the switch these packets appear as new flows and therefore, are handled by the controller resulting in an increasing number of flow rules in the switching tables.

Detection 1.The idea for the detection of DoS attacks against the data plane aims at localizing the fixed header fields of the attacking flow. 2.The approach uses a table of counters with the different header fields as columns. 3.To normalize the table size the header fields are hashed by a uniformly dispersing function with fixed output size.

used the 32Bit FNV-1a hashing function folded to an output size of 16Bit by applying an XOR operation of the upper half to the lower half of the hash sum. This results in 2 ^16 rows in the counter table. 9

Analytic Evaluation of the Detection Performanceion 1.The idea for the detection of DoS attacks against the data plane aims at localizing the fixed header fields of the attacking flow. 2.The approach uses a table of counters with the different header fields as columns. 3.To normalize the table size the header fields are hashed by a uniformly dispersing function with fixed output size.

the memory consumption can be bound to: 11

The detection algorithm has a complexity of : O(|hash| · |H|) 12

EVALUATION In order to evaluate the detection method we built a simulation based on the widely used OMNeT++ framework 13

the attacker arrival rate is called λa. inter arrival time arrival rate λl = 1/ Tl . the attacker arrival rate is called λa. the window size tW , i.e. the time between two consecutive runs of the detection algorithm the detection threshold θm. 14

Analytic Evaluation of the Detection Performanceion give a more systematic approach for determining the threshold. The expected mT corresponds with the maximum expected collisions of a header value. 15

16

Results a network of legitimate H = 100 hosts. We simulated 10 repetitions for each setting with a duration of 1000 s per run. 17

Fig. 5: Working region of detection algorithm, with λa = 10·λl and H = 100 18

CONCLUSION In this work we introduced a novel detection and mitigation algorithm for Denial of Service Attacks in Software Defined Networks. This work concentrates on attacks which aim to overflow the hardware tables of SDN switches In cloud environments. uses a table with the header fields as columns and hashes of the header fields as rows. If an attack occurs the fields corresponding to the unchanged fields grow tremendously.. 19

REFERENCES R. Durner, C. Lorenz, M. Wiedemann and W. Kellerer, "Detecting and mitigating denial of service attacks against the data plane in software defined networks," 2017 IEEE Conference on Network Softwarization (NetSoft), Bologna, 2017, pp. 1-6. 20