Mitigation of DDoS attack instigated by compromised switches on SDN controller by analyzing the flow rule request traffic

  • Authors

    • Sanjeetha R
    • Shikhar Srivastava
    • Rishab Pokharna
    • Syed Shafiq
    • Dr Anita Kanavalli
    2018-03-11
    https://doi.org/10.14419/ijet.v7i2.6.10065
  • Controller, DDoS, flow table, hard time out, idle timeout, SDN.
  • Abstract

    Software Defined Network (SDN) is a new network architecture which separates the data plane from the control plane. The SDN controller implements the control plane and switches implement the data plane. Many papers discuss about DDoS attacks on primary servers present in SDN and how they can be mitigated with the help of controller. In our paper we show how DDoS attack can be instigated on the SDN controller by manipulating the flow table entries of switches, such that they send continuous requests to the controller and exhaust its resources. This is a new, but one of the possible way in which a DDoS attack can be performed on controller. We show the vulnerability of SDN for this kind of attack. We further propose a solution for mitigating it, by running a DDoS Detection module which uses variation of flow entry request traffic from all switches in the network to identify compromised switches and blocks them completely.

  • References

    1. [1] ] Goransson, Paul, Chuck Black, and Timothy Culver. Software defined networks: a comprehensive approach. Morgan Kaufmann, 2016.

      [2] Fan, Yinghong, Hossam Hassanein, and Pat Martin. "Proactively defeating distributed denial of service attacks." In Electrical and Computer Engineering, 2003. IEEE CCECE 2003. Canadian Conference on, vol. 2, pp. 1047-1050. IEEE, 2003.

      [3] Mousavi, Seyed Mohammad, and Marc St-Hilaire. "Early detection of DDoS attacks against SDN controllers." In Computing, Networking and Communications (ICNC), 2015 International Conference on, pp. 77-81. IEEE, 2015.

      [4] Safko, Gregory. "Defending against Denial of Service Attacks using a Modified Priority Queue: Bouncer." In SoutheastCon, 2006. Proceedings of the IEEE, pp. 114-119. IEEE, 2005.

      [5] Jantila, Saksit, and KornchawalChaipah. "A Security Analysis of a Hybrid Mechanism to Defend DDoS Attacks in SDN."Procedia Computer Science 86 (2016): 437-440.

      [6] Yoon, MyungKeun. "Using whitelisting to mitigate DDoS attacks on critical internet sites." IEEE Communications Magazine 48, no. 7 (2010).

  • Downloads

  • How to Cite

    R, S., Srivastava, S., Pokharna, R., Shafiq, S., & Anita Kanavalli, D. (2018). Mitigation of DDoS attack instigated by compromised switches on SDN controller by analyzing the flow rule request traffic. International Journal of Engineering & Technology, 7(2.6), 46-49. https://doi.org/10.14419/ijet.v7i2.6.10065

    Received date: 2018-03-11

    Accepted date: 2018-03-11

    Published date: 2018-03-11