Skip to main content

2020 | OriginalPaper | Buchkapitel

Adaptive Detection Method for Packet-In Message Injection Attack in SDN

verfasst von : Xinyu Zhan, Mingsong Chen, Shui Yu, Yue Zhang

Erschienen in: Algorithms and Architectures for Parallel Processing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Packet-In message injection attack is severe in Software Defined Network (SDN), which will cause a single point of failure of the centralized controller and the crash of the entire network. Nowadays, there are many detection methods for it, including entropy detection and so on. We propose an adaptive detection method to proactively defend against this attack. We establish a Poisson probability distribution detection model to find the attack and use the flow table filter to mitigate it. We also use the EWMA method to update the expectation value of the model to adapt the actual network conditions. Our method has no need to send additional packets to request the switch information. The experiment results show that there is 92% true positive rate in case of attack with random destination IP packets injected, and true positive rate is 98.2% under the attack with random source IP packets injected.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cui, Y., et al.: SD-Anti-DDoS: fast and efficient DDoS defense in software-defined networks. J. Netw. Comput. Appl. 68, 65–79 (2016)CrossRef Cui, Y., et al.: SD-Anti-DDoS: fast and efficient DDoS defense in software-defined networks. J. Netw. Comput. Appl. 68, 65–79 (2016)CrossRef
2.
Zurück zum Zitat Akhunzada, A., Ahmed, E., Gani, A.: Securing software defined networks: taxonomy, requirements, and open issues. IEEE Commun. Mag. 53(4), 36–44 (2015)CrossRef Akhunzada, A., Ahmed, E., Gani, A.: Securing software defined networks: taxonomy, requirements, and open issues. IEEE Commun. Mag. 53(4), 36–44 (2015)CrossRef
3.
Zurück zum Zitat Kreutz, D., Ramos, F., Verissimo, P.: Towards secure and dependable software-defined networks. In: Proceedings of the Second Workshop on Hot Topics in Software Defined Networking (HotSDNb12), pp. 55–60 (2013) Kreutz, D., Ramos, F., Verissimo, P.: Towards secure and dependable software-defined networks. In: Proceedings of the Second Workshop on Hot Topics in Software Defined Networking (HotSDNb12), pp. 55–60 (2013)
4.
Zurück zum Zitat Yu, S., Tian, Y., Guo, S., Wu, D.O.: Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25(9), 2245–2254 (2014)CrossRef Yu, S., Tian, Y., Guo, S., Wu, D.O.: Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25(9), 2245–2254 (2014)CrossRef
5.
Zurück zum Zitat Gao, D., Liu, Z., Liu, Y., Heng, C., Ting, F., Chao, Z.H.: Defending against Packet-In messages flooding attack under SDN context. Soft. Comput. 22(20), 6797–6809 (2018)CrossRef Gao, D., Liu, Z., Liu, Y., Heng, C., Ting, F., Chao, Z.H.: Defending against Packet-In messages flooding attack under SDN context. Soft. Comput. 22(20), 6797–6809 (2018)CrossRef
6.
Zurück zum Zitat Hong, S., Xu, L., Wang, H., Gu, G.: Poisoning network visibility in software-defined networks: new attacks and countermeasures. In: Internet Society (2015) Hong, S., Xu, L., Wang, H., Gu, G.: Poisoning network visibility in software-defined networks: new attacks and countermeasures. In: Internet Society (2015)
7.
Zurück zum Zitat Deng, S., Gao, X., Lu, Z., Gao, X.: Packet injection attack and its defense in software-defined networks. IEEE Trans. Inf. Forensics Secur. 13(3), 695–705 (2018)CrossRef Deng, S., Gao, X., Lu, Z., Gao, X.: Packet injection attack and its defense in software-defined networks. IEEE Trans. Inf. Forensics Secur. 13(3), 695–705 (2018)CrossRef
8.
Zurück zum Zitat You, X., Feng, Y., Sakurai, K.: Packet in message based DDoS attack detection in SDN network using OpenFlow. In: International Symposium on Computing & Networking. IEEE Computer Society (2017) You, X., Feng, Y., Sakurai, K.: Packet in message based DDoS attack detection in SDN network using OpenFlow. In: International Symposium on Computing & Networking. IEEE Computer Society (2017)
9.
Zurück zum Zitat Sunny, B., Krishan, K., Monika, S.: Discriminating flash events from DDoS attacks: a comprehensive review. Int. J. Netw. Secur. 19(5), 734–741 (2017) Sunny, B., Krishan, K., Monika, S.: Discriminating flash events from DDoS attacks: a comprehensive review. Int. J. Netw. Secur. 19(5), 734–741 (2017)
10.
Zurück zum Zitat Shui, Y., Zhou, W., Guo, S., Guo, M.: A feasible IP traceback framework through dynamic deterministic packet marking. IEEE Trans. Comput. 65(5), 1418–1427 (2016)MathSciNetCrossRef Shui, Y., Zhou, W., Guo, S., Guo, M.: A feasible IP traceback framework through dynamic deterministic packet marking. IEEE Trans. Comput. 65(5), 1418–1427 (2016)MathSciNetCrossRef
11.
Zurück zum Zitat Kalkan, K., Altay, L., Gur, G., Alagoz, F.: JESS: joint entropy based DDoS defense scheme in SDN. IEEE J. Sel. Areas Commun. 36, 2358–2372 (2018)CrossRef Kalkan, K., Altay, L., Gur, G., Alagoz, F.: JESS: joint entropy based DDoS defense scheme in SDN. IEEE J. Sel. Areas Commun. 36, 2358–2372 (2018)CrossRef
12.
Zurück zum Zitat Kumar, P., Tripathi, M., Nehra, A., Conti, M., Lal, C.: Safety: early detection and mitigation of TCP SYN flood utilizing entropy in SDN. IEEE Trans. Netw. Serv. Manag. 15, 1545–1559 (2018)CrossRef Kumar, P., Tripathi, M., Nehra, A., Conti, M., Lal, C.: Safety: early detection and mitigation of TCP SYN flood utilizing entropy in SDN. IEEE Trans. Netw. Serv. Manag. 15, 1545–1559 (2018)CrossRef
13.
Zurück zum Zitat Yu, S., Zhou, W., Doss, R., Jia, W.: Traceback DDoS attacks using entropy variations. IEEE Trans. Parallel Distrib. Syst. 22(3), 412–425 (2011)CrossRef Yu, S., Zhou, W., Doss, R., Jia, W.: Traceback DDoS attacks using entropy variations. IEEE Trans. Parallel Distrib. Syst. 22(3), 412–425 (2011)CrossRef
14.
Zurück zum Zitat La-Lin, J., Xia, P., Bing, X.: Performance evaluation of SDN controllers based on hybrid queuing model. Computer Engineering Science (2017) La-Lin, J., Xia, P., Bing, X.: Performance evaluation of SDN controllers based on hybrid queuing model. Computer Engineering Science (2017)
15.
Zurück zum Zitat Yu, S., Zhou, W., Jia, W., Guo, S., Xiang, Y., Tang, F.: Discrim-inating DDoS attacks from flash crowds using flow correlation coefficient. IEEE Trans. Parallel Distrib. Syst. 23(6), 1073–1080 (2012)CrossRef Yu, S., Zhou, W., Jia, W., Guo, S., Xiang, Y., Tang, F.: Discrim-inating DDoS attacks from flash crowds using flow correlation coefficient. IEEE Trans. Parallel Distrib. Syst. 23(6), 1073–1080 (2012)CrossRef
16.
Zurück zum Zitat Mousavi, S.M., St-Hilaire, M.: Early detection of DDoS attacks against SDN controllers. In: 2015 International Conference on Computing, Networking and Communications (ICNC). IEEE Computer Society (2015) Mousavi, S.M., St-Hilaire, M.: Early detection of DDoS attacks against SDN controllers. In: 2015 International Conference on Computing, Networking and Communications (ICNC). IEEE Computer Society (2015)
17.
Zurück zum Zitat Yu, S., Guo, S., Stojmenovic, I.: Fool me if you can: mimicking attacks and anti-attacks in cyberspace. IEEE Trans. Comput. 64(1), 139–151 (2015). (Spotlight paper of the issue) Yu, S., Guo, S., Stojmenovic, I.: Fool me if you can: mimicking attacks and anti-attacks in cyberspace. IEEE Trans. Comput. 64(1), 139–151 (2015). (Spotlight paper of the issue)
18.
Zurück zum Zitat Yu, S., Wang, G., Zhou, W.: Modeling malicious activities in cyber space. IEEE Netw. 29(6), 83–87 (2015)CrossRef Yu, S., Wang, G., Zhou, W.: Modeling malicious activities in cyber space. IEEE Netw. 29(6), 83–87 (2015)CrossRef
19.
Zurück zum Zitat Feng, B., Zhang, H., Zhou, H., Yu, S.: Locator/identifier split networking: a promising future internet architecture. IEEE Commun. Surv. Tutor. 19(4), 2927–2948 (2017). (Impact factor 17.2) Feng, B., Zhang, H., Zhou, H., Yu, S.: Locator/identifier split networking: a promising future internet architecture. IEEE Commun. Surv. Tutor. 19(4), 2927–2948 (2017). (Impact factor 17.2)
20.
Zurück zum Zitat Chen, J., et al.: A parallel random forest algorithm for big data in a spark cloud computing environment. IEEE Trans. Parallel Distrib. Syst. 28(4), 919–933 (2017)CrossRef Chen, J., et al.: A parallel random forest algorithm for big data in a spark cloud computing environment. IEEE Trans. Parallel Distrib. Syst. 28(4), 919–933 (2017)CrossRef
21.
Zurück zum Zitat Yu, S., Liu, M., Dou, W., Liu, X., Zhou, S.: Networking for big data: a survey. IEEE Commun. Surv. Tutor. 19(1), 531–549 (2017). (Impact factor 17.2) Yu, S., Liu, M., Dou, W., Liu, X., Zhou, S.: Networking for big data: a survey. IEEE Commun. Surv. Tutor. 19(1), 531–549 (2017). (Impact factor 17.2)
22.
Zurück zum Zitat Mousavi, S.-M., St-Hilaire, M.: Early detection of DDoS attacks against SDN controllers. In: International Conference on Computing, Networking and Communications, pp. 77–81, (2015) Mousavi, S.-M., St-Hilaire, M.: Early detection of DDoS attacks against SDN controllers. In: International Conference on Computing, Networking and Communications, pp. 77–81, (2015)
Metadaten
Titel
Adaptive Detection Method for Packet-In Message Injection Attack in SDN
verfasst von
Xinyu Zhan
Mingsong Chen
Shui Yu
Yue Zhang
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-38961-1_42

Premium Partner