Vous êtes sur la page 1sur 5

2015 Ninth International Conference on Frontier of Computer Science and Technology

A Defense Mechanism for Distributed Denial of Service Attack in Software-Defined


Networks

Shibo Luo, Jun Wu, Member,IEEE, and Jianhua Li Bei Pei


School of Electronic Information and Electrical Key Lab of Information Network Security
Engineering Ministry of Public Security
Shanghai Jiao Tong University Shanghai, China
Shanghai, China
luoshibo.pla@sjtu.edu.cn, junwuhn@sjtu.edu.cn

AbstractDistributed Denial of Service (DDoS) attack is a There are some exact cases in past few years. A spate of
major threat to Internet based killer applications, such as DDoS attacks against Amazon, Yahoo, eBay, and other
independent news web sites, e-business and online games. major sites in February 2000 caused an estimated cumulative
Detecting and blocking such clever attacks has become loss of US$1.2 billion, according to the Yankee Group. And
difficult. Software-Defined Networks (SDN) has emerged as a in January 2001, Microsoft lost approximately US$500
future communication network architecture which decouples million over the course of a few days from a DDoS attack on
network control and forwarding. It has some particular its site.
features such as central control and programmability to
Along with high revenue losses, DDoS attacks spread
combat against DDoS attack. In this paper, we survey DDoS
attacks and existing defense mechanisms, and draw a
widely. Many DDoS flooding attacks had been launched
conclusion of the needs of defense mechanism for successful against different organizations since the summer of 1999,
combating against DDoS. Then, we analyze the particular according the news in [2][3][4][5][6][7][8][9].
features of SDN and conclude it is conducive to DDoS attacks are so widely spread and impactful that
countermeasure DDoS attack. According the analysis, we many works have been done to combat against DDoS
construct a defense mechanism for DDoS in SDN. At last, we attacks. To combat against DDoS attacks, many solutions
illustrate how this mechanism could combat against DDoS have been proposed, such as in [11][12][13]. However, they
attacks through a working example. have met with limited success.
While with the evolving of SDN, there appear new
Keywords- Software-Defined Networks; Distributed Denial of opportunities to combat against DDoS attacks.
Service; Central Control; Programmability In this paper, we propose a defense mechanism for DDoS
attacks in SDN. The rest of the paper is organized as follows:
I. INTRODUCTION We analyze the DDoS attacks and the needs of a successful
defense mechanism in Section II. Section III presents the
In computing, a denial-of-service (DoS) or distributed features of SDN and its advantages to combat against DDoS
denial-of-service (DDoS) attack is an attempt to make a attacks. Proposed defense mechanism for DDoS attacks are
machine or network resource unavailable to its intended discussed in Section IV. In Section V, a working example is
users. DDoS attacks have been known to the network illustrated. Finally, we conclude the paper in Section VI.
research community since the early 1980s. In the summer of
1999, the Computer Incident Advisory Capability reported II. ANALYSIS OF DDOS ATTACKS AND DEFENSE
the first DDoS attack incident [2] and most of the DoS MECHANISMS
attacks since then have been distributed in nature.
Most of the DDoS attacks launched to date have tried to A. Survey of DDoS Attacks
make the victims services unavailable, leading to revenue
There are lots of DDoS attack instances in the past year.
losses and increased costs of mitigating the attacks and
But in all of the attacks, the attackers try to do one or both of
restoring the services.
the following things [1].
According to the findings of the Ponemon Institutes
The first one is to disrupt a legitimate users connectivity
research [10], on average DDoS attacks are costing
by exhausting bandwidth, router processing capacity or
companies approximately $3.5 million annually. The average
network resources. And the second one is to disrupt a
amount of downtime following a DDoS attack is 54 minutes
legitimate users services by exhausting the server resources;
and the average cost for each minute of downtime was about
The attacks of the former type are essentially
$22,000. However, the cost can range from as little as $1 to
network/transport-level flooding attacks [14]. And the
more than $100,000 per minute of downtime. Estimates from
attacks of the latter type are essentially application-level
Forrester, IDC, and the Yankee Group predict the cost of a
flooding attacks [15].
24-hour outage for a large e-commerce company would
According to the analysis, we can classify DDoS attacks
approach US$30 million.
into two categories based on the protocol level. The complete
category structure of DDoS attacks is illustrated in Fig. 1.

978-1-4673-9295-2/15 $31.00 2015 IEEE 326


325
DOI 10.1109/FCST.2015.11
a large volume of network traffic since DNS response
messages may be substantially larger than DNS query
messages. Then this large volume of network traffic is
directed towards the targeted system to paralyze it.
z HTTP flooding attacks
HTTP flooding attack disables the victimized Web server
by sending a large number of HTTP requests. There are four
types of attacks in this category. They are session flooding
attacks, request flooding attacks, asymmetric attacks, and
slow request/response attacks. More details about all these
attacks refer to [2].
B. Analysis of DDoS defense mechanisms
According to the analysis of DDoS attacks as
Fig. 1. A category structure of DDoS attacks aforementioned, an ideal comprehensive DDoS defense
mechanism must have specific features to combat DDoS
And its details are listed as follows: attacks. These features are listed as follows:
1) Network/transport-level DDoS attacks z More nodes in the network should be involved in
The network/transport-level DDoS attacks have been defense mechanism to DDoS flooding attacks.
mostly launched using TCP, UDP, ICMP and DNS protocol z There should be collaboration and cooperation
packets. There are four sub catagories of attacks in this among the nodes in the network defense architecture.
category: z The sources of the network traffic can be confirmed
z Flooding attacks more easily so that malicious users could be
In flooding attacks, attackers makes use of the way of identified .
exhausting victim networks bandwidth to disrupt legitimate z All the nodes in the network defense architecture
users connectivity. must keep consistency .
z Protocol exploitation flooding attacks Combining source address authentication, capability
In protocol exploitation flooding attacks, attackers exploit mechanisms, and filtering mechanisms could be the most
specific features or implementation bugs of some of the effective and efficient way to address the DDoS attacks in a
victims protocols. By this means, it consumes excess distributed cooperative/collaborative DDoS defense
amounts of the victims resources. mechanism.
z Reflection-based flooding attacks III. ANALYSIS OF SDN
In reflection-based flooding attacks, attackers usually
send forged requests instead of direct requests to a large A. Definition and Features of SDN
number of reflectors. Then, these reflectors send their Software-defined networking (SDN) [16] is an emerging
massive replies to the victim and exhaust victims resources. networking paradigm that gives hope to change the
z Amplification-based flooding attacks limitations of current network infrastructures.
Attackers exploit services to generate large messages or Firstly, it breaks the vertical integration by separating the
multiple messages for each message they receive to amplify networks control logic from the underlying routers and
the traffic towards the victim.. switches that forward the traffic.
2) Application-level DDoS flooding attacks Secondly, with the separation of the control and data
These attacks focus on disrupting legitimate users planes, network switches become simple forwarding devices
services by exhausting the server resources. Application-
and the control logic is implemented in a logically
level DDoS attacks generally consume less bandwidth. But
application-level DDoS flooding attacks usually have the centralized controller, simplifying policy enforcement and
same impact to the services since they target specific network (re)configuration and evolution. A view of this
characteristics of applications such as HTTP, DNS, or architecture is shown in Fig. 2.
Session Initiation Protocol (SIP). The SDN architecture has four distinct features:
z Reflection/amplification based flooding attacks 1) The control and data planes are decoupled
These attacks use the same techniques as their Control functionality is removed from network devices
network/transport-level peers. For instance, the DNS that will become simple forwarding elements.
amplification attack employs both reflection and 2) Forwarding decisions are flow based
amplification techniques. The attackers generate small DNS A flow is broadly defined by a set of packet field values
queries with forged source IP addresses which can generate acting as a match criterion and a set of actions. In the SDN

326
327
context, a flow is a sequence of packets between a source threats. Centralized control of SDN makes it possible to
and a destination. Flow programming enables dynamically quarantine compromised hosts and authenticate
unprecedented flexibility, limited only to the capabilities of legitimate hosts based on the information obtained through
the implemented flow tables. requesting end hosts and remote authentication dial in user
3) Control logic is moved to an external entity service (RADIUS) servers for users authentication
The controller is a software platform that runs on information and system scanning during registration.
commodity server technology and provides the essential 3) Programmability of the network by external
resources and abstractions to facilitate the programming of applications
forwarding devices based on a logically centralized, abstract The programmability of SDN supports a process of
network view. Its purpose is therefore similar to that of a harvesting intelligence from existing intrusion detection
traditional operating system. systems and intrusion prevention systems. More intelligent
4) The network is programmable algorithms can be flexibly used based on different DDoS
The network is programmable through software attacks.
applications running on top of the controller that interact 4) Software-based traffic analysis
with the underlying data plane devices. This is a Software-based traffic analysis greatly enables innovation,
fundamental characteristic of SDN, considered as its main as it can be performed using all kinds of intelligent
value proposition. algorithms, databases, and any other software tools.
5) Dynamic updating of forwarding rules and flow
App A App B App C abstraction
Dynamic updating of forwarding rules assists in the
Common Northbound API prompt response to DDoS attacks. Based on the traffic
analysis, new or updated security policy can be propagated
Controller across the network in the form of flow rules to block the
attack traffic without delay.

IV. PROPOSED DEFENSE MECHANISM FOR DDOS

A. Framework of Defense Mechanism


1 2 3
According to the analysis as mentioned above, we
propose a framework of defense mechanism for DDoS
6 5 4 based on the work of [18]. The framework is illustrated in
Fig. 2. A architecture view of SDN Fig. 3:

B. Advantages of SDN for defending against DDoS Attack


SDN has many distinct features as aforementioned, and
these distinct features offer many advantages for defeating
DDoS attacks.
1) Separation of the control plane from the data plane
SDN decouples the data plane from the control plane, and
thus makes it possible to easily establish large scale attack
and defense experiments.
The high configurability of SDN offers clear separation
among virtual networks, permitting experimentation in a
real environment. Progressive deployment of new ideas can
be performed through a seamless transition from an
experimental phase to an operational phase.
This feature of SDN offers great convenience in putting
forward new thoughts and methods for DDoS attack
mitigation.
2) A centralized controller and view of the network
Fig. 3. Framework of defense mechanism
The controller has network-wide knowledge of the system
and global views to build consistent security policies and to
monitor or analyze traffic patterns for potential security The framework mainly consists of script language,

327
328
predefined modules and enforcement component. something that can be used to warn the mechanism that
Network administrators use the script language to define suspicious behavior happen in the network. The framework
the detection and mitigation method at high level. There are queries for the port statistics of each switch in the networks
many abstract modules are predefined for network periodically to monitor byte rate and packet rate of ports in
administrators to define their method. So, network switches. And the framework uses the values to make
administrators have no obligations to learn more details of decision.
the method and network. 5) Flow statistic queries module
There are many predefined abstract and elementary In order to safely insert security flow into the switch, the
modules in the framework. These modules are atom actions framework needs to know existing flow entries that reside at
for detection and mitigation for DDoS attacks. The details each switch. This step is necessary to make sure that there
of these modules are discussed in latter section. will not be overlapping or conflict flow rules in the switch.
The scripts are translated into exact switch rules and To do this, the framework periodically queries the switches
deployed into switches by the enforcement component. The with their state of flow table. Then the framework looks up
enforcement component performs this job by the controller for malicious flow entries, deletes them, and inserts counter
northbound APIs. flow entries to block the attacks.
The enforcement component offers several important
features to ensure that flow rules derived from security V. WORKING EXAMPLE
services are prioritized and enforced over competing flow We use a spoofed UDP flood attack as our example. In
rules produced by other applications. The enforcement the case, the attacker startups UDP flood attack using IP
component includes three main functions. They are rule spoofing to overload networks and devices with packets that
source identification, rule conflict detection, and conflict appear to be from legitimate source IP addresses.
resolution. More details about the enforcement component Fig. 4 shows a scenario example of DDoS defense
refer to [18]. mechanism.
B. Key Modules in Framework
...
DDoS Defense
The predefined modules can be defined according actual Application

environment. Some key modules are listed as follows [17]:


1) Binding module
All of these nodes can be the source of the threats that
happen in the network, so knowing the identity of each node
is important. Profiting from the central control and global Sub network

view of SDN logic controller, the binding module collect


the information of all the nodes in the network. The Sub network
Bot
information includes the nodes exact IP addresses, etc. So, Sub network

using binding module, the mechanism can monitor the


Victim
network easily. Bot
2) Location tracking module
Knowing the location of hosts can ease the process of Sub network
blocking the detected attacks. Also profiting from the
central control and global view of SDN logic controller, the
application records and saves the position of each connected Attacker
Fig. 4. Scenario of DDoS defense mechanism
node in the network.
3) Packets filtering module
In SDN, packets that do not match any of the flow entries At the startup phase, the framework collects the
that reside in the switch will be sent to the controller for information of the network. At run time of the network, it
further analysis. Then, controller can use this message to periodically updates the information through the controller.
generate specific messages to the switch so that the The attacker sends command to the bots to perform
subsequent packets will not be sent to controller. The spoofed UDP flooding attack targeting the victim.
controller generates order message based on the result of the The bots accepts the command and send large volume
inspection. It will forward legitimate packets and drop UDP packets with spoofed IP to the victim.
malicious spoofed packets. The port statistic queries module periodically to monitor
4) Port statistic queries module byte rate and packet rate of ports in switches. And it finds
To detect the DDoS attacks, the framework must be able there are large volume UDP packets suddenly in the
to detect the events of DDoS attacks. The events mean network.

328
329
The port statistic queries module notifies the binding Incident Advisory Capability (CIAC), UCRL-ID-136939, Rev. 1.,
Lawrence Livermore National Laboratory, February 14, 2000.
module to audit the IP address. The binding module finds
[3] Yahoo on Trail of Site Hackers, Wired.com, Feb. 8, 2000, [online]
these UDP packets are spoofed according the registered IP http://www.wired.com/news/business/0,1367,34221,00.html.
address information of the network. [4] Powerful Attack Cripples Internet, Oct. 23, 2002, [online]
The binding module notifies the framework that there are http://www.greenspun.com/bboard/qandafetchmsg.tcl?msg
a DDoS attack is occurring and tells the framework the id=00A7G7.
properties of the attack including the victims IP address and [5] Mydoom lesson: Take proactive steps to prevent DDoS attacks, Feb.
6, 2004, [online]
bots IP address. http://www.computerworld.com/s/article/89932/Mydoom lesson Take
The framework firstly orders the packets filtering module proactive steps to prevent DDoS attacks?taxonomyId=017
to drop the attack packets based on the victims IP address. [6] Lazy Hacker and Little Worm Set Off Cyberwar Frenzy, July 8,
2009, [online] http://www.wired.com/threatlevel/2009/07/mydoom/.
And then it notifies the location tracking module to find the
[7] New cyber attacks hit S Korea, July 9, 2009, [online]
attackers exact IP address. http://news.bbc.co.uk/2/hi/asia-pacific/8142282.stm.
The location tracking module picks the attackers exact IP [8] Operation Payback cripples MasterCard site in revenge for
address based on the global view of the network and the WikiLeaks ban, Dec. 8, 2010, [online]
bots IP address. After finding the attackers node, the http://www.guardian.co.uk/media/2010/dec/08/operationpayback
mastercardwebsitewikileaks.
framework notifies the flow statistic queries module to put
[9] T. Kitten, DDoS: Lessons from Phase 2 Attacks, Jan. 14, 2013,
the node offline. [online]http://www.bankinfosecurity.com/ddos-attacks-lessons-from-
At last, the network is peaceful. phase-2-a-5420/op-1.
[10] Ponemon Institute, Cyber Security on the Offense: A Study of IT
VI. CONCLUSIONS Security Experts, Nov. 2012.
This paper proposed a defense mechanism for DDoS [11] Paulo E. Ayres, Huizhong Sun, H. Jonathan Chao, and Wing Cheong
Lau, ALPi: A DDoS Defense System for High-Speed Networks,
attacks in SDN. Firstly, we analyze the DDoS attacks and IEEE Journal on Selected Areas in Communications, vol. 24, no. 10,
draw the needs of defense mechanism for DDoS attacks. pp. 1864-1876, Oct. 2006.
Secondly, we analyze the properties of SDN and find SDNs [12] Zahid Anwar, and Asad Waqar Malik, Can a DDoS Attack
advantages to construct defense mechanism for DDoS Meltdown My Data Center? A Simulation Study and Defense
Strategies, IEEE Commu. Letters, vol. 18, no. 7, pp. 1175-1178, Jul.
attacks. Then, we propose a framework of defense 2014.
mechanism for DDoS attacks. More details about key [13] Yu Chen, Kai Hwang, and Wei-Shinn Ku, Collaborative Detection
modules in the framework are discussed. At last, we of DDoS Attacks over Multiple Network Domains, IEEE Trans. on
demonstrate a working example to verify our proposed Parallel and Distributed Systems, vol. 18, no. 12, Dec. 2007.
framework. [14] J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS
defense mechanisms, ACM SIGCOMM Computer Communications
Review, vol. 34, no. 2, pp. 39-53, April 2004.
ACKNOWLEDGMENT
[15] S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, DDoS-
This work is supported by Key Lab of Information Resilient Scheduling to Counter Application Layer Attacks under
Network Security, Ministry of Public Security, China. Imperfect Detection, IEEE INFOCOM06, 2006.
[16] Open Networking Foundation, "Software-Defined Networking: The
New Norm for Networks," Open Networking Foundation, Apr. 2012.
REFERENCES [17] Oktian, SangGon Lee, and Hoonjae Lee, Mitigating Denial of
Service (DoS) attacks in OpenFlow networks, In Information and
[1] Saman Taghavi Zargar, James Joshi, and David Tipper, A Survey of Communication Technology Convergence (ICTC), 2014, pp. 325-
Defense Mechanisms Against Distributed Denial of Service (DDoS) 330, Oct. 2014.
Flooding Attacks, IEEE Comm. Survey & Tutorials, vol. 15, no. 4,
[18] Seugwon Shin, Phillip Porras, Vinod Yegneswaran, Martin Fong,
pp. 2046-2069, Fourth Quater 2013
Guofei Gu, and Mabry Tyson, FRESCO: Modular Composable
[2] P. J. Criscuolo, Distributed Denial of Service, Tribe Flood Network Security Services for Software-Defined Networks, NDSS, 2013.
2000, and Stacheldraht CIAC-2319, Department of Energy Computer

329
330

Vous aimerez peut-être aussi