SDN-Guard: DoS Attacks Mitigation in SDN Networks

Slides:



Advertisements
Similar presentations
OpenFlow-Based Server Load Balancing GoneWild
Advertisements

NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
OpenFlow Switch Limitations. Background: Current Applications Traffic Engineering application (performance) – Fine grained rules and short time scales.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Server Load Balancing. Introduction Why is load balancing of servers needed? If there is only one web server responding to all the incoming HTTP requests.
OpenFlow-Based Server Load Balancing GoneWild Author : Richard Wang, Dana Butnariu, Jennifer Rexford Publisher : Hot-ICE'11 Proceedings of the 11th USENIX.
Packet Classification using Rule Caching Author: Nitesh B. Guinde, Roberto Rojas-Cessa, Sotirios G. Ziavras Publisher: IISA, 2013 Fourth International.
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Memory-Efficient Regular Expression Search Using State Merging Author: Michela Becchi, Srihari Cadambi Publisher: INFOCOM th IEEE International.
1 Version 3.1 Module 6 Routed & Routing Protocols.
Research on TCAM-based OpenFlow Switch Author: Fei Long, Zhigang Sun, Ziwen Zhang, Hui Chen, Longgen Liao Conference: 2012 International Conference on.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
Early Detection of DDoS Attacks against SDN Controllers
Shadow MACs: Scalable Label- switching for Commodity Ethernet Author: Kanak Agarwal, John Carter, Eric Rozner and Colin Dixon Publisher: HotSDN 2014 Presenter:
TFA: A Tunable Finite Automaton for Regular Expression Matching Author: Yang Xu, Junchen Jiang, Rihua Wei, Yang Song and H. Jonathan Chao Publisher: ACM/IEEE.
Lightweight Traffic-Aware Packet Classification for Continuous Operation Author: Shariful Hasan Shaikot, Min Sik Kim Presenter: Yen-Chun Tseng Date: 2014/11/26.
Packet Classification Using Dynamically Generated Decision Trees
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Stochastic Pre-Classification for SDN Data Plane Matching Author : Luke McHale, C. Jasson Casey, Paul V. Gratz, Alex Sprintson Conference: 2014 IEEE 22nd.
Coping with Link Failures in Centralized Control Plane Architecture Maulik Desai, Thyagarajan Nandagopal.
Multiprotocol Label Switching (MPLS) Routing algorithms provide support for performance goals – Distributed and dynamic React to congestion Load balance.
Gateway redundancy protocols
William Stallings Data and Computer Communications
SDN and Security Security as a service in the cloud
Lab A: Planning an Installation
2018/4/23 Dynamic Load-balanced Path Optimization in SDN-based Data Center Networks Author: Yuan-Liang Lan , Kuochen Wang and Yi-Huai Hsu Presenter: Yi-Hsien.
Minimizing latency of critical traffic through SDN
Software defined networking: Experimental research on QoS
2018/5/8 An approach for detecting encrypted insider attacks on OpenFlow SDN Networks Author: Charles V. Neu , Avelino F. Zorzox , Alex M. S. Orozcoy and.
University of Maryland College Park
Heitor Moraes, Marcos Vieira, Italo Cunha, Dorgival Guedes
Network Anti-Spoofing with SDN Data plane Authors:Yehuda Afek et al.
Topics discussed in this section:
2018/6/5 Centralized Retransmission Management with SDN in Multihop Wireless Access Network Author: Bong-Hwan Oh , Jaiyoung Lee Presenter: Yi-Hsien Wu.
2018/6/26 An Energy-efficient TCAM-based Packet Classification with Decision-tree Mapping Author: Zhao Ruan, Xianfeng Li , Wenjun Li Publisher: 2013.
Author: Ragalatha P, Manoj Challa, Sundeep Kumar. K
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
DDoS Attack Detection under SDN Context
Statistical Optimal Hash-based Longest Prefix Match
2018/11/19 Source Routing with Protocol-oblivious Forwarding to Enable Efficient e-Health Data Transfer Author: Shengru Li, Daoyun Hu, Wenjian Fang and.
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
2018/12/10 Energy Efficient SDN Commodity Switch based Practical Flow Forwarding Method Author: Amer AlGhadhban and Basem Shihada Publisher: 2016 IEEE/IFIP.
Switching Techniques.
2019/1/1 High Performance Intrusion Detection Using HTTP-Based Payload Aggregation 2017 IEEE 42nd Conference on Local Computer Networks (LCN) Author: Felix.
Virtual TCAM for Data Center Switches
Congestion Control Reasons:
2019/5/2 Using Path Label Routing in Wide Area Software-Defined Networks with OpenFlow ICNP = International Conference on Network Protocols Presenter:Hung-Yen.
Compact DFA Structure for Multiple Regular Expressions Matching
2019/5/3 A De-compositional Approach to Regular Expression Matching for Network Security Applications Author: Eric Norige Alex Liu Presenter: Yi-Hsien.
2019/5/5 A Flexible Wildcard-Pattern Matching Accelerator via Simultaneous Discrete Finite Automata Author: Hsiang-Jen Tsai, Chien-Chih Chen, Yin-Chi Peng,
2019/5/13 A Weighted ECMP Load Balancing Scheme for Data Centers Using P4 Switches Presenter:Hung-Yen Wang Authors:Peng Wang, George Trimponias, Hong Xu,
Autonomous Network Alerting Systems and Programmable Networks
Fast Testing Network Data Plane with RuleChecker
Power-efficient range-match-based packet classification on FPGA
Fast Network Congestion Detection And Avoidance Using P4
OpenSec:Policy-Based Security Using Software-Defined Networking
2019/7/26 OpenFlow-Enabled User Traffic Profiling in Campus Software Defined Networks Presenter: Wei-Li,Wang Date: 2016/1/4 Author: Taimur Bakhshi and.
2019/9/14 The Deep Learning Vision for Heterogeneous Network Traffic Control Proposal, Challenges, and Future Perspective Author: Nei Kato, Zubair Md.
2019/10/9 A Weighted ECMP Load Balancing Scheme for Data Centers Using P4 Switches Presenter:Hung-Yen Wang Authors:Jin-Li Ye, Yu-Huang Chu, Chien Chen.
2019/10/19 Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware Architectures Author: Eva Papadogiannaki, Lazaros Koromilas, Giorgos.
MEET-IP Memory and Energy Efficient TCAM-based IP Lookup
Presentation transcript:

SDN-Guard: DoS Attacks Mitigation in SDN Networks 2019/5/12 SDN-Guard: DoS Attacks Mitigation in SDN Networks Author: Lobna Dridi, Mohamed Faten Zhani Presenter: Yi-Hsien Wu Conference: 2016 5th IEEE International Conference on Cloud Networking (Cloudnet) Date: 2017/1/4 Department of Computer Science and Information Engineering National Cheng Kung University, Taiwan R.O.C. CSIE CIAL Lab 1

Outline Introduction Related Work Proposed Solution Experimental Results Conclusion National Cheng Kung University CSIE Computer & Internet Architecture Lab

2019/5/12 Introduction Deny-of-Service Attacks (DoS) are the most popular and inevitable threats to SDN networks as they have always been to traditional networks. More specifically, a DoS attack in an SDN network can lead to the following issues: 1. Overloading the SDN controller 2. Exhausting the control plane bandwidth 3. Switch TCAM memory overflow 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

Introduction Overloading the SDN controller : 2019/5/12 Introduction Overloading the SDN controller : If the controller is overloaded, packet-in messages will be stuck in the controller’s queue and no more routing decisions can be taken for the new incoming flows. Exhausting the control plane bandwidth : When the switch-to-controller links are congested, some packet-in messages might then be lost, which will delay the decision regarding the waiting flows. Switch TCAM memory overflow: DoS attacks can purposely create a large number of new flows that might saturate the flow forwarding tables of the switches . When this happens, switches are forced to constantly add and remove flow entries and to send more packet-in messages towards the controller. 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

Related Work FlowRanger : (L. Wei and C. Fung) 2019/5/12 Related Work FlowRanger : (L. Wei and C. Fung) It is implemented at the controller side and consists of three components. (1)Trust management component that calculates a trust value for each packet-in message based on its source. (2) Queuing management component that places the message in the priority queue corresponding to its trust value (3) Message scheduling component that process messages according to a weighted Round Robin strategy. FlowRanger can reduce the impact of DoS attacks on network performance by guaranteeing that legitimate flows are served first in the controller. However, it does not prevent flooding the controller and switch CAM tables overload. WRR Queue排程算法在Queue之間進行輪流排程,保證每個Queue都得到一定的服務時間。以端口有8 個輸出Queue為例,WRR 可為每個Queue配置一個加權值(依次為w7、w6、w5、w4、w3、w2、w1、w0),加權值表示獲取資源的比重。如 一個100M的端口,配置它的WRR Queue排程算法的加權值為5、5、3、3、1、1、1、1(依次對應w7、w6、w5、w4、w3、w2、w1、w0 ),這樣可以保證最低優先級Queue至少獲得5Mbit/s 帶寬,避免了採用SP 排程時低優先級Queue中的封包可能長時間得不到服務的缺點。WRR Queue還有一個優點是,雖然多個Queue的排程是輪詢進行的,但對每個Queue不是固定地分配服務時間片——如果某個Queue為空,那麼馬上換到下一個Queue排程,這樣帶寬資源可以得到充分的利用。 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

Related Work IP filtering : (Dao et al.) 2019/5/12 Related Work IP filtering : (Dao et al.) It analyzes user behavior and uses it to assign the timeouts for the flow entries. Short timeout are assigned for malicious users flows and long timeouts are used for trusted ones. This solution forces entries of malicious traffic to be quickly removed from switches CAM tables. However, this may lead to new packet-in messages to be sent to the controller if the flow duration is higher than the set timeout. 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

Related Work Self-management scheme : (Sahay et al.) 2019/5/12 Related Work Self-management scheme : (Sahay et al.) The ISP collects threat information provided by customers in order to use it to enforce security policies and update flow tables in the network. If a flow is considered legitimate by the customers, the ISP controller will tag it with a high priority value so that it takes a path with higher quality. However, if there is a doubt about the legitimacy of the flow, the ISP controller will assign a low priority to the flow and direct through the path designated for malicious flow. This method can reduce the impact of the DoS attack on the network performance by balancing the load across different paths ,but it does not mitigate the risks of overloading the controller and flooding flow tables in the switches. 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

2019/5/12 Related Work 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

2019/5/12 Proposed Solution SDN-Guard constantly communicates with an Intrusion Detection System (IDS) that analyzes packet-in messages and informs SDN-Guard about the threat probability of each flow. National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

Proposed Solution Flow management module 2019/5/12 Proposed Solution Flow management module It is responsible for selecting the routing paths for each of the flows and deciding the hard timeout of their corresponding TCAM entries based on the threat probability of the flow to manage flows so as to mitigate the impact of the DoS attack. Rule aggregation module It is in charge of aggregating flow entries of malicious traffic in order to reduce the number of entries used in the switches TCAMs. Monitoring module It is responsible for permanently collecting multiple statistics about flows, switches and links, (e.g., flow throughput, switch TCAM usage and link bandwidth usage) so that they can be used by other modules. Hard timeout : 不論有無match , package(rule) 都會remove National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

Proposed Solution 1.Threat-based routing 2019/5/12 Proposed Solution 1.Threat-based routing SDN-Guard redirects malicious traffic through the path having the least-utilized links in terms of bandwidth consumption and switch TCAMs. (These two parameters are known to the flow management module thanks to the statistics collected by the monitoring module.) 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

Proposed Solution 2.Timeout management 2019/5/12 Proposed Solution 2.Timeout management The flow management module assigns the timeout value of each of the flow rules according to the threat probability. Because the switch will have to communicate with the controller whenever the hard timeout expires, a small hard timeout will result in much more communication traffic with the controller. This will not only increase the switch-to-controller bandwidth consumption but also overload the controller. Hence, if the incoming flow is considered malicious, SDN-Guard assigns its forwarding rules a high timeout. The reason behind this decision is to ensure that the same flow does not trigger many communications between the switch and the controller. 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

Proposed Solution 3. Malicious flow rule aggregation 2019/5/12 Proposed Solution 3. Malicious flow rule aggregation As malicious flows are assigned a large hard timeouts, such flow entries will remain for a long time in the TCAM table of switches. This might increase the number of used entries in the flow tables and might overload them. In order to deal with this issue, flow rules entries of malicious flows at a particular switch are automatically aggregated by the flow aggregation module if they have some shared properties (e.g., same source and destination) and forwarded to the same outgoing link. 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

2019/5/12 Proposed Solution Malicious flow (threat probability is above a predefined threshold) The flow management module assigns a large hard timeout value to the flow rule and selects the least-utilized links in terms of bandwidth consumption and switch TCAMs to ensure that this flow does not compete with legitimate flows and impact their performance. The aggregation module analyzes the generated rules for such malicious traffic and tries, when possible, to merge the rules in order to reduce their number, and thereby minimize the flow table usage. When a switch receives a new flow that cannot be matched with any rule in its flow table, it inquires the controller for a rule in order to efficiently forward the flow to its destination. The packet-in messages are permanently sent to the IDS to analyze the flows and measure their threat probabilities. The threat probability is used by the flow management module to take a decision about the routing of each of the flows and the timeout for its corresponding entries. in the switches’ TCAMs National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

Proposed Solution Legitimate flow (threat probability is low) 2019/5/12 Proposed Solution Legitimate flow (threat probability is low) The flow management module assigns a regular hard timeout value to the flow rule and routes the flow through the shortest path. 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

Experimental Results Experimental setup 2019/5/12 Experimental Results Experimental setup We run our experiments on a server running Ubuntu 14.04 with a CPU Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz x 8 and 8 GB of RAM. To emulate the network topology, we used Mininet 2.3.0. OpenVSwitch (OVS) is used as the implementation for the OpenFlow switches. The created network is controlled by Floodlight 1.2 which is a widely-used java-based OpenFlow controller. Furthermore, the communication between the switches and the Floodlight controller uses OpenFlow protocol version 1.3. 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

2019/5/12 Experimental Results 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

2019/5/12 Experimental Results In our experiment, the host h1 is considered as an attacker whereas the host h6 is the server targeted by the DoS attack. We first send normal traffic consisting of TCP flows from all sources to all destinations. The DoS attack starts afterward and lasts for ten minutes during which the server h6 is flooded with a large number of new TCP flows. To launch the DoS attack, we send TCP traffic using hping3 network tool which floods the server h6 with a large number of TCP SYN packets with different IP source addresses. Such traffic emulates a distributed DoS attack coming from multiple sources. 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

Experimental Results Controller incoming throughput 2019/5/12 Experimental Results Controller incoming throughput During the attack, there is a surge in the packet-in number received by the controller. However, compared with the baseline, we can see that SDN-Guard succeeds in reducing this throughput by up to 32%. This is mainly because SDN-Guard sets high hard timeouts to the forwarding rules associated with the malicious flow, and thereby significantly reduces the need to re-inquire the controller for new flow rules. 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

2019/5/12 Experimental Results 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

Experimental Results Average switch table size 2019/5/12 Experimental Results Average switch table size With SDN-Guard, the number of flow rules in the table of the switch S1 decreases by up to 26% compared to the baseline. This is achieved because (i)the malicious traffic is forwarded through the least-utilized links, which means that flow entries will be inserted through switches of different paths (ii) the aggregation module makes sure to minimize the number of flow entries of the malicious flow by aggregating them using common properties (e.g., same source and destination, same next hop). 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

2019/5/12 Experimental Results 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

Experimental Results Throughput from source to destination 2019/5/12 Experimental Results Throughput from source to destination With SDN-Guard, the received throughput is relatively less affected by the attack and still higher than the baseline case This decrease in the packet loss is achieved by SDN-Guard because malicious traffic is balanced across the least-utilized links, which reduces congestion risks. We find that, with the baseline, there is 40% packet loss compared to 35% with our solution. 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

2019/5/12 Experimental Results 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

Experimental Results Impact on average RTT 2019/5/12 Experimental Results Impact on average RTT We can see from Fig. 7 that the average RTT value decreases by up to 23% when SDN-Guard is activated. This is because hard timeouts are set high for malicious traffic. Hence, the switches do not have to request new flow rules much often for the same flow. This eliminates the time needed to send the request to the controller and waiting the flow entry. 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

2019/5/12 Experimental Results 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab

2019/5/12 Conclusion We proposed SDN-Guard, a comprehensive SDN solution that is able to mitigate SDN-specific threats related to DoS attacks Indeed, SDN-Guard is able to efficiently protect SDN networks against attacks by dynamically rerouting potential malicious traffic, adjusting flow timeouts and aggregating flow rules associated with the malicious traffic. 近期因為ruleset size快速成長,因此ruleset複雜度造成一般封包分類方法memory表現很差 Swintop是一種將ruleset去分類的方式 National Cheng Kung University CSIE Computer & Internet Architecture Lab CSIE CIAL Lab