APPLICATION OF MULTI-LEVEL FAIR QUEUE MECHANISM FOR MITIGATING DENIAL-OF-SERVICE ATTACKS ON SOFTWARE-DEFINED NETWORKS

Author(s):  
Михаил Юрьевич Рытов ◽  
Руслан Юрьевич Калашников ◽  
Алексей Алексеевич Горелов

Концепция программно-конфигурируемых сетей (SDN) стремительно набирает популярность в управлении сетевой инфраструктурой центров обработки данных и операторов связи. К её ключевым функциям относятся мониторинг, детальное управление, гибкость и масштабируемость. Но вместе с тем, централизованное управление SDN делает его уязвимым для различных типов атак, таких как спуфинг и отказ в обслуживании (DoS). DoS-атаки оказывают наиболее серьезное воздействие, поскольку они снижают производительность сети из-за перегрузки ее различных компонентов, то есть контроллера, коммутатора и канала управления. Существующие подходы справляются с DoS-атаками в SDN либо путем отбрасывания вредоносных пакетов, либо путем объединения правил потока, что приводит к потерям легитимного трафика. Для уменьшения последствий DoS-атак в этой статье предлагается использование механизма многоуровневой справедливой очереди, который обеспечивает совместное использование ресурсов контроллера с несколькими уровнями очередей, которые могут динамически расширяться и агрегироваться в зависимости от загруженности сети. Предлагаемый подход оценивается путем сравнения его с базовым контроллером SDN. Результаты моделирования показывают, что предлагаемый подход увеличивает производительность SDN с точки зрения использования пропускной способности канала управления. The concept of Software Defined Networking (SDN) is rapidly gaining popularity in the management of the network infrastructure of data centers and telecom operators. Its key functions include monitoring, granular control, flexibility and scalability. But at the same time, the centralized management of SDN makes it vulnerable to various types of attacks, such as spoofing and denial of service (DoS). DoS attacks have the most serious impact because they degrade network performance by overloading various components such as the controller, switch, and control channel. Existing approaches deal with SDN DoS attacks either by dropping malicious packets or by combining flow rules, which leads to the loss of legitimate traffic. To mitigate the impact of DoS attacks, this article proposes the use of a tiered fair queuing mechanism, which allows the sharing of controller resources with multiple queue tiers that can dynamically expand and aggregate based on network congestion. The proposed approach is evaluated by comparing it to a basic SDN controller. Simulation results show that the proposed approach increases SDN performance in terms of control channel bandwidth utilization.

Author(s):  
Huseyin Polat ◽  
Onur Polat

Despite many advantages of software defined networking (SDN) such as manageability, scalability, and performance, it has inherent security threats. In particular, denial of service (DoS) attacks are major threats to SDN. The controller’s processing and communication abilities are overwhelmed by DoS attacks. The capacity of the flow tables in the switching device is exhausted due to excess flows created by the controller because of malicious packets. DoS attacks on the controller cause the network performance to drop to a critical level. In this paper, a new SDN controller component was proposed to detect and mitigate DoS attacks in the SDN controller. POX layer three controller component was used for underlying a testbed for PacketIn messages. Any packet from the host was incremented to measure the rate of packet according to its device identification and its input port number. Considering the rate of packets received by the controller and threshold set, malicious packets could be detected and mitigated easily. A developed controller component was tested in a Mininet simulation environment with an hping3 tool to build artificial DoS attacks. Using the enhanced controller component, DoS packets were prevented from accessing the controller and thus, the data plane (switching devices) was prevented from being filled with unwanted flows.


2015 ◽  
Vol 4 (2) ◽  
pp. 390 ◽  
Author(s):  
Alaa Zain ◽  
Heba El-khobby ◽  
Hatem M. Abd Elkader ◽  
Mostafa Abdelnaby

A Mobile Ad-Hoc Networks (MANET) is widely used in many industrial and people's life applications, such as earth monitoring, natural disaster prevention, agriculture biomedical related applications, and many other areas. Security threat is one of the major aspects of MANET, as it is one of the basic requirements of wireless sensor network, yet this problem has not been sufficiently explored. The main purpose of this paper is to study different MANETs routing protocols with three scenarios of Denial of Service (DoS) attacks on network layer using proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocols like Ad hoc On-Demand Distance Vector (AODV), Hybrid routing protocols like Geographic Routing Protocol (GRP). Moreover, a comparative analysis of DoS attacks for throughput, Data loss, delay and network load is taken into account. The performance of MANET under the attack is studied to find out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The simulation is done using OPNET 17.


2021 ◽  
Vol 13 (0203) ◽  
pp. 110-116
Author(s):  
Sunil Kumar ◽  
Maninder Singh

A Mobile Ad Hoc Network (MANET) is much more vulnerable to various security attacks due to its high mobility, multi-hop communication and the absence of centralized administration. In this paper, we investigate the impact of Jellyfish periodic dropping attack on MANETs under different routing protocols. This investigate is under the class of denial-of-service attack and targets closed loop flows which results in delay and data loss. In this paper, the simulation results are gathered using OPNET network simulator and its effect on network performance is studied by analysing re-transmission attempts, network load and throughput. The results have shown that the impact of Jellyfish periodic dropping attack which reduces the network performance. Performance shows OLSR performs better than AODV under periodic drop attack.


2020 ◽  
pp. 399-410
Author(s):  
Jawad Dalou' ◽  
Basheer Al-Duwairi ◽  
Mohammad Al-Jarrah

Software Defined Networking (SDN) has emerged as a new networking paradigm that is based on the decoupling between data plane and control plane providing several benefits that include flexible, manageable, and centrally controlled networks. From a security point of view, SDNs suffer from several vulnerabilities that are associated with the nature of communication between control plane and data plane. In this context, software defined networks are vulnerable to distributed denial of service attacks. In particular, the centralization of the SDN controller makes it an attractive target for these attacks because overloading the controller with huge packet volume would result in bringing the whole network down or degrade its performance. Moreover, DDoS attacks may have the objective of flooding a network segment with huge traffic volume targeting single or multiple end systems. In this paper, we propose an entropy-based mechanism for Distributed Denial of Service (DDoS) attack detection and mitigation in SDN networks. The proposed mechanism is based on the entropy values of source and destination IP addresses of flows observed by the SDN controller which are compared to a preset entropy threshold values that change in adaptive manner based on network dynamics. The proposed mechanism has been evaluated through extensive simulation experiments.


Author(s):  
Thangavel M. ◽  
Nithya S ◽  
Sindhuja R

Cloud computing is the fastest growing technology in today's world. Cloud services provide pay as go models on capacity or usage. For providing better cloud services, capacity planning is very important. Proper capacity planning will maximize efficiency and on the other side proper control over the resources will help to overcome from attacks. As the technology develops in one side, threats and vulnerabilities to security also increases on the other side. A complete analysis of Denial of Service (DOS) attacks in cloud computing and how are they done in the cloud environment and the impact of reduced capacity in cloud causes greater significance. Among all the cloud computing attacks, DOS is a major threat to the cloud environment. In this book chapter, we are going to discuss DOS attack in the cloud and its types, what are the tools used to perform DOS attack and how they are detected and prevented. Finally it deals with the measures to protect the cloud services from DOS attack and also penetration testing for DOS attack.


Information ◽  
2019 ◽  
Vol 10 (3) ◽  
pp. 106 ◽  
Author(s):  
Pedro Manso ◽  
José Moura ◽  
Carlos Serrão

The current paper addresses relevant network security vulnerabilities introduced by network devices within the emerging paradigm of Internet of Things (IoT) as well as the urgent need to mitigate the negative effects of some types of Distributed Denial of Service (DDoS) attacks that try to explore those security weaknesses. We design and implement a Software-Defined Intrusion Detection System (IDS) that reactively impairs the attacks at its origin, ensuring the “normal operation” of the network infrastructure. Our proposal includes an IDS that automatically detects several DDoS attacks, and then as an attack is detected, it notifies a Software Defined Networking (SDN) controller. The current proposal also downloads some convenient traffic forwarding decisions from the SDN controller to network devices. The evaluation results suggest that our proposal timely detects several types of cyber-attacks based on DDoS, mitigates their negative impacts on the network performance, and ensures the correct data delivery of normal traffic. Our work sheds light on the programming relevance over an abstracted view of the network infrastructure to timely detect a Botnet exploitation, mitigate malicious traffic at its source, and protect benign traffic.


Author(s):  
Thangavel M. ◽  
Nithya S ◽  
Sindhuja R

Cloud computing is the fastest growing technology in today's world. Cloud services provide pay as go models on capacity or usage. For providing better cloud services, capacity planning is very important. Proper capacity planning will maximize efficiency and on the other side proper control over the resources will help to overcome from attacks. As the technology develops in one side, threats and vulnerabilities to security also increases on the other side. A complete analysis of Denial of Service (DOS) attacks in cloud computing and how are they done in the cloud environment and the impact of reduced capacity in cloud causes greater significance. Among all the cloud computing attacks, DOS is a major threat to the cloud environment. In this book chapter, we are going to discuss DOS attack in the cloud and its types, what are the tools used to perform DOS attack and how they are detected and prevented. Finally it deals with the measures to protect the cloud services from DOS attack and also penetration testing for DOS attack.


Author(s):  
Dang Nguyen Duc ◽  
Kwangjo Kim

In this chapter, the authors discuss the impact of providing tag privacy on the performance of an RFID system, in particular the complexity of identifying the tags being queried at the back-end server. A common technique to provide tag privacy is to use pseudonyms. That is, for each authentication session, a tag uses a temporary and random-looking identifier so that it is infeasible for attackers to relate two authentication sessions. A natural question which should arise here is how the server can identify a tag given that the tag’s identity is changing all the time. This problem becomes even more serious when the shared secret key between a tag and the server is updated after every authentication session to provide forward privacy. In the first part of this chapter, the authors review different techniques to deal with this problem. They then point out that most of the existing techniques lead to vulnerability of the back-end server against Denial-of-Service (DoS) attacks. They illustrate some of these attacks by describing methods which attackers can use to abuse the server’s computational resources in several popular RFID authentication protocols. Finally, the authors discuss some techniques to address the privacy vs. performance dilemma so that DoS attacks can be prevented while keeping tag identification efficient.


2019 ◽  
Vol 2019 ◽  
pp. 1-15
Author(s):  
Yunming Wang ◽  
Bo Chen ◽  
Weidong Li ◽  
Duoping Zhang

Influential nodes act as a hub for information transmission in a command and control network. The identification of influential nodes in a network of this nature is a significant and challenging task; however, it is necessary if the invulnerability of the network is to be increased. The existing k-shell method is problematic in that it features a coarse sorting granularity and does not consider the local centrality of nodes. Thus, the degree of accuracy with which the influential nodes can be identified is relatively low. This motivates us to propose a method based on an integral k-shell to identify the influential nodes in a command and control network. This new method takes both the global and local information of nodes into account, introduces the historical k-shell and a 2-order neighboring degree, and refines the k-shell decomposition process in a network. Simulation analysis is carried out from two perspectives: to determine the impact on network performance when influential nodes are removed and to obtain the correlation between the integral k-shell value and its propagation value. The simulation results show that the integral k-shell method, which employs an algorithm of lower complexity, accurately identifies the influence of those nodes with the same k-shell values. Furthermore, the method significantly improves the accuracy with which the influential nodes can be identified.


2021 ◽  
pp. 1-15
Author(s):  
Chunye Wang ◽  
Jian Sun ◽  
Xiaoxin Xu ◽  
Bin Zou ◽  
Min Zhang ◽  
...  

 The denial-of-service (DoS) attacks block the communications of the power grids, which affects the availability of the measurement data for monitoring and control. In order to reduce the impact of DoS attacks on measurement data, it is essential to predict missing measurement data. Predicting technique with measurement data depends on the correlation between measurement data. However, it is impractical to install phasor measurement units (PMUs) on all buses owing to the high cost of PMU installment. This paper initializes the study on the impact of PMU placement on predicting measurement data. Considering the data availability, this paper proposes a scheme for predicting states using the LSTM network while ensuring system observability by optimizing phasor measurement unit (PMU) placement. The optimized PMU placement is obtained by integer programming with the criterion of the node importance and the cost of PMU deployment. There is a strong correlation between the measurement data corresponding to the optimal PMU placement. A Long-Short Term Memory neural network (LSTM) is proposed to learn the strong correlation among PMUs, which is utilized to predict the unavailable measured data of the attacked PMUs. The proposed method is verified on an IEEE 118-bus system, and the advantages compared with some conventional methods are also illustrated.


Sign in / Sign up

Export Citation Format

Share Document