FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks Conference Paper uri icon

abstract

  • 2015 IEEE. This paper addresses one serious SDN-specific attack, i.e., data-to-control plane saturation attack, which overloads the infrastructure of SDN networks. In this attack, an attacker can produce a large amount of table-miss packet-in messages to consume resources in both control plane and data plane. To mitigate this security threat, we introduce an efficient, lightweight and protocol-independent defense framework for SDN networks. Our solution, called FloodGuard, contains two new techniques/modules: proactive flow rule analyzer and packet migration. To preserve network policy enforcement, proactive flow rule analyzer dynamically derives proactive flow rules by reasoning the runtime logic of the SDN/OpenFlow controller and its applications. To protect the controller from being overloaded, packet migration temporarily caches the flooding packets and submits them to the OpenFlow controller using rate limit and round-robin scheduling. We evaluate FloodGuard through a prototype implementation tested in both software and hardware environments. The results show that FloodGuard is effective with adding only minor overhead into the entire SDN/OpenFlow infrastructure.

name of conference

  • 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks

published proceedings

  • 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks

author list (cited authors)

  • Wang, H., Xu, L., & Gu, G.

citation count

  • 244

complete list of authors

  • Wang, Haopei||Xu, Lei||Gu, Guofei

publication date

  • January 2015