Cross-domain DoS link-flooding attack detection and mitigation using SDN prin- ciples

نویسندگان

  • Dimitrios Gkounis
  • Vasileios Kotronis
چکیده

The Denial of Service (DoS) attacks pose a major threat to Internet users and services. Since the network security ecosystem is expanding over the years, new types of DoS attacks emerge. The DoS link-flooding attacks target to severely congest certain network links disrupting Internet accessibility to certain geographical areas and services passing through these links. Since crucial services like financial and government services depend on real-time Internet availability, the consequences of DoS link-flooding attacks become detrimental. Among the diverse DoS link-flooding attacks, the Crossfire attack is worthwhile to focus on when designing a DoS link-flooding attack countermeasure due to its effectiveness while it remains undetected. In this master thesis, we propose a detection and mitigation technique by combining Software Defined Networking (SDN) and network security principles. Since current defence solutions and techniques are unable to deal with the Crossfire attack, we use SDN features, such as flow rerouting, flow-level management and control and monitoring centralization, which provide by definition higher flexibility in defeating such complex DoS attacks. We design an online traffic engineering mechanism based on a strategy that enables both mitigation and detection of the Crossfire attack. A working prototype is implemented based on the proposed technique and evaluated on an emulated pure SDN environment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Denial-of-service detection and mitigation for SIP communication networks

The Session Initiation Protocol (SIP) is the multimedia communication protocol of the future. Used for Voice-over-IP (VoIP), Internet Multimedia Subsystem (IMS) and Internet Protocol Television (IPTV), its concepts are based on mature and open standards and its use is increasing rapidly within recent years. However, with its acceptance as a mainstream communication platform, security concerns b...

متن کامل

Towards Defeating the Crossfire Attack using SDN

In this work, we propose online traffic engineering as a novel approach to detect and mitigate an emerging class of stealthy Denial of Service (DoS) link-flooding attacks. Our approach exploits the Software Defined Networking (SDN) paradigm, which renders the management of network traffic more flexible through centralised flow-level control and monitoring. We implement a full prototype of our s...

متن کامل

A Survey of SDN Security Research

Software defined networking (SDN) has established a new method for creating and administering networks, but has also changed the attack surface that is presented by networks. SDN provides several features that allow for easy mitigation of certain types of attacks, such as DoS, and allows for mitigation of other attacks with more work. However, SDN also introduces new vulnerabilities that are no...

متن کامل

Experimental Demonstration of DDoS Mitigation over a Quantum Key Distribution (QKD) Network Using Software Defined Networking (SDN)

We experimentally demonstrate, for the first time, DDoS mitigation of QKD-based networks utilizing a software defined network application. Successful quantum-secured link allocation is achieved after a DDoS attack based on real-time monitoring of quantum parameters. OCIS codes: (060.0060) Fiber optics and optical communications; (060.1155) All-optical networks (060.5565); Quantum cryptography; ...

متن کامل

Analysis of the SYN Flood DoS Attack

The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol) segments when SYN flag is ON, which gives space for a DoS (Denial of Service) attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014