Skip to main content

2019 | OriginalPaper | Buchkapitel

Mitigating Link-Flooding Attack with Segment Rerouting in SDN

verfasst von : Lixia Xie, Ying Ding, Hongyu Yang

Erschienen in: Cyberspace Safety and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Link-flooding attack (LFA) is a new type of DDoS attack used to flood and congest the crucial network links, which has severely damaged enterprise networks. LFA can be launched by large-scale low-rate legitimate data flows with quite a low cost and is difficult to detect. While target areas in a network can be easily isolated since the crucial links are unavailable. SDN architecture provides new opportunities to address this critical network security problem with its global view of traffic monitoring enabled by the separation of data plane and control plane. Recently, segment routing (SR), which is an evolution of source routing, has been viewed as a promising technique for flow rerouting and failure recovery. Segment routing is a lightweight easy-deployed scheme known for its flexibility, scalability, and applicability. Therefore, in this paper, we try to mitigate LFA with segment rerouting within the SDN architecture. With the comprehensive network-wide view of the data flows and links, we first design a monitoring mechanism to detect LFA based on the availability of the crucial links. Then we use segment routing to detour the congested flows and alleviate the burden on the crucial links. Finally. the LFA bots will be identified and the malicious traffic will be blocked. Sufficient evaluations demonstrate that our LFA defense can efficiently detect LFA and preserve the network services, while only introduce a little signaling overhead between the controllers and data plane.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
11.
Zurück zum Zitat Shin, S., Porras, P.A., Yegneswaran, V., Fong, M.W., Gu, G., Fresco, M.T.: Modular composable security services for software-defined networks. In: Proceedings of Distributed System Security Symposium (NDSS) (2013) Shin, S., Porras, P.A., Yegneswaran, V., Fong, M.W., Gu, G., Fresco, M.T.: Modular composable security services for software-defined networks. In: Proceedings of Distributed System Security Symposium (NDSS) (2013)
12.
Zurück zum Zitat Shin, S., Yegneswaran, V., Porras, P., Gu, G.: AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 413–424. ACM (2013) Shin, S., Yegneswaran, V., Porras, P., Gu, G.: AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 413–424. ACM (2013)
13.
Zurück zum Zitat Hu, H., Han, W., Ahn, G.J., Zhao, Z.: FLOWGUARD: building robust firewalls for software-defined networks. In: Proceedings of the Workshop on Hot Topics in Software Defined Networking, pp. 97–102 (2014) Hu, H., Han, W., Ahn, G.J., Zhao, Z.: FLOWGUARD: building robust firewalls for software-defined networks. In: Proceedings of the Workshop on Hot Topics in Software Defined Networking, pp. 97–102 (2014)
14.
Zurück zum Zitat Fayaz, S.K., Tobioka, Y., Sekar, V., Bailey, M.: Bohatei: flexible and elastic DDoS defense. In: Proceedings of 24th USENIX Security Symposium (USENIX Security 15), pp. 817–832 (2015) Fayaz, S.K., Tobioka, Y., Sekar, V., Bailey, M.: Bohatei: flexible and elastic DDoS defense. In: Proceedings of 24th USENIX Security Symposium (USENIX Security 15), pp. 817–832 (2015)
15.
Zurück zum Zitat Xue, L., Luo, X., Chan, E.W., Zhan, X.: Towards detecting target link flooding attack. In: Proceedings of the 28th Large Installation System Administration Conference (LISA14), pp. 90–105 (2014) Xue, L., Luo, X., Chan, E.W., Zhan, X.: Towards detecting target link flooding attack. In: Proceedings of the 28th Large Installation System Administration Conference (LISA14), pp. 90–105 (2014)
16.
Zurück zum Zitat Lee, S.B., Kang, M.S., Gligor, V.D.: CoDef: collaborative defense against large-scale link-flooding attacks. In: Proceedings of the 9th ACM Conference on Emerging Networking Experiments and Technologies, pp. 417–428. ACM (2013) Lee, S.B., Kang, M.S., Gligor, V.D.: CoDef: collaborative defense against large-scale link-flooding attacks. In: Proceedings of the 9th ACM Conference on Emerging Networking Experiments and Technologies, pp. 417–428. ACM (2013)
17.
Zurück zum Zitat Kang, M.S., Gligor, V.D., Sekar, V.: SPIFFY: inducing cost-detectability tradeoffs for persistent link-flooding attacks. In: Proceedings of Network and Distributed System Security Symposium (NDSS) (2016) Kang, M.S., Gligor, V.D., Sekar, V.: SPIFFY: inducing cost-detectability tradeoffs for persistent link-flooding attacks. In: Proceedings of Network and Distributed System Security Symposium (NDSS) (2016)
18.
Zurück zum Zitat Gillani, F., Al-Shaer, E., Lo, S., Duan, Q., Ammar, M., Zegura, E.: Agile virtualized infrastructure to proactively defend against cyber attacks. In: Proceedings of 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 729–737. IEEE (2015) Gillani, F., Al-Shaer, E., Lo, S., Duan, Q., Ammar, M., Zegura, E.: Agile virtualized infrastructure to proactively defend against cyber attacks. In: Proceedings of 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 729–737. IEEE (2015)
19.
Zurück zum Zitat Aydeger, A., Saputro, N., Akkaya, K., Rahman, M.: Mitigating crossfire attacks using SDN-based moving target defense. In: Proceedings of IEEE Conference on Local Computer Networks (LCN), pp. 627–630 (2016) Aydeger, A., Saputro, N., Akkaya, K., Rahman, M.: Mitigating crossfire attacks using SDN-based moving target defense. In: Proceedings of IEEE Conference on Local Computer Networks (LCN), pp. 627–630 (2016)
20.
Zurück zum Zitat Wang, L., Li, Q., Jiang, Y., Wu, J.: Towards mitigating link flooding attack via incremental SDN deployment. In: Proceedings of IEEE Symposium on Computers and Communication (ISCC), pp. 397–402 (2016) Wang, L., Li, Q., Jiang, Y., Wu, J.: Towards mitigating link flooding attack via incremental SDN deployment. In: Proceedings of IEEE Symposium on Computers and Communication (ISCC), pp. 397–402 (2016)
21.
Zurück zum Zitat Liaskos, C.K., Kotronis, V., Dimitropoulos, X.: A novel framework for modeling and mitigating distributed link flooding attacks. In: Proceedings of 2015 IEEE Conference on Computer Communications (INFOCOM) (2016) Liaskos, C.K., Kotronis, V., Dimitropoulos, X.: A novel framework for modeling and mitigating distributed link flooding attacks. In: Proceedings of 2015 IEEE Conference on Computer Communications (INFOCOM) (2016)
Metadaten
Titel
Mitigating Link-Flooding Attack with Segment Rerouting in SDN
verfasst von
Lixia Xie
Ying Ding
Hongyu Yang
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-37337-5_6