You are on page 1of 3

Distributed Denial of Service (DDoS) attack on Software Defined

Networks (SDN): A survey


A B M Ahasan Ullah Hussien Dahir Md. Faisal Ahmed Shamsher Morshed
Student ID: 012202043, Student ID: 012203062 Student ID: 012191002, Student ID: 012193030,
Program: MSCSE Program: MSCSE Program: MSCSE Program: MSCSE
UIU, Dhaka, Bangladesh UIU, Dhaka, Bangladesh UIU, Dhaka, Bangladesh UIU, Dhaka, Bangladesh
aullah202043@mscse.uiu.ac.bd habdi203062@mscse.uiu.ac.bd mahmed191002@mscse.uiu.ac.bd smorshed193030@mscse.uiu.ac.bd

Abstract— SDN has become a significant networking of the network. The control layer correlates with the applying
concept which already made remarkable changes in network layer to perform various kinds of network functions that is
architectures. As a newly introduced technology, It is offering routing, load balancing, and intrusion detection, etc. A
exceptional programmability which allows the users to network software system installed within the controller maps
manage and configure how they want. SDN recommends a
the entire network to other services and applications
flexible and controlled networking traffic management by its
implemented within the application layer. Network
high programmability of the separated control and data
planes. The main idea of the principal of this method to figure administrators can achieve high network control automation
out the control plane into a central controller guilty of taking and optimization with SDN applications. Among the present
all networking routing decisions. The separation of those visible representation of the SDN standard, OpenFlow is that
planes gives a centralized point of virtual control in the the most generally embraced. More specifically, enterprises
system and parrally precise the barriers of main physical adopt OpenFlow as a communication protocol to build a
appliances. on the other hand, SDN shows up with new secured and efficient communication between switches and
attacks and difficulties and travels long packet postponement therefore the controller. OpenFlow outlines the precise API
and huge packet loss ratio when it gets stuck in between for communication in between the information plane and
communication of two planes which aimed at DoS/DDoS
control plane; moreover, it initiates the concepts of flows,
attacks with high table miss packets. DoS/DDoS attacks has
identifies network traffic, and also the idea of flow tables.
always been considered as a big threat for the networks
because of their capabilities to flood switch MAC tbales by Each OpenFlow at enabled network device, called OpenFlow
leading to a serious discomfort for the performance of the switch, must maintain a flow table organized during a
network. Here we may study and segregate several research pipeline. As laid out in the OpenFlow protocol, switches must
papers about DoS/DDoS attacks in SDN as well as forward a packet-in request to the controller after receiving a
technologies refer to it. replacement packet (an indication of recent flow) that they
Keywords— SDN, DoS, DDoS, Security Architecture are doing not have any corresponding information within the
I. INTRODUCTION flow table to forward the packet. Flow tables describe that
OpenFlow switch will perform based on a given network
Conventional specification of network has endured mostly
flow. The control plane has two options to program the flow
unchanged since the past few decades as to be proved
tables of the OpenFlow switches, proactively or reactively.
cumbersome. SDN is the appeared architecture idyllic for the Firstly, the controller will break down the network policies
extraordinary bandwidth, vigorous nature of today
into few rules for the proactive mode and install them in
application level solutions. It has a dynamic view along with
switches during the network bootstraps.
the quality of easily manageable, adaptability, and cost-
On the other hand, For the reactive mode, if the switch
effective. DoS/DDoS is very old attack since the beginning
explicitly requests it, then the controller establishes and
of the network attacks. We have found that, DoS/DDoS
compute the rules. It permits switches to acclimate to network
attack can be also active in case of SDN infrastructure, and it
subtleties swiftly and is suitable for environments where
can attack in different layer of the SDN. In each case, the
changes occur very frequently in endpoints; location. For this
whole SDN will be affected. As currently, financial institute,
reason, it’s a significant process in SDN.
hospital and others major networks are converting their
DDoS attacks have a lot of variations. Particularly, flooding
traditional network to SDN infrastructure, we find that,
based DoS attacks, like ICMP, UDP, and TCP SYN sends the
identifying the attack vectors of DoS/DDoS is crucial for the
vast amount of faux packets to the victim, which successively
ultimate utilization of SDN. This is the motivation to choose
deletes computing resources like CPU, memory, and network
this topic.
bandwidth of the target network. for instance, ICMP and
SDN offers a transparent shift from the normal network
UDP flooding attacks consume the victim bandwidth, while
infrastructure by separating the network logic layer, called
within the case of TCP SYN flooding, the attacker exhausts
the control plane, and also the data layer, called the info
the victim connection table by sending SYN packets. Instead,
plane, into distinct entities. Such separation delivers some
the detection of layer 7 or application layer attack is
advantages: it allows the development of network control
incredibly much complicated. These application level DoS
systems, which are virtually centralized and directly
flooding attacks some specified application characteristics
programmable; it also reduces network devices; intricacy by
like DNS, HTTP, etc.. An example can be like that, a slow
providing management applications an intangible depiction
HTTP GET flood are often combined with a UDP flood,

1
which misleads the victim to a UDP attack, while the HTTP later be used for unauthorized activities such as bringing the
flood slowly depletes the HTTP server resources. DDoS network down.
attacks’ detection in Software Defined Network introduces The architecture of SDN is a layered approach, as shown in
three significant challenges; first, an OpenFlow security figure 1. [1] A detailed diagram is also displayed in figure 2.
[2], SDN has three layers – i) (Network) Application layer,
application generally implements far more complex logic
ii) Control layer and iii) Infrastructure or data forwarding
rather than simplifying halting or forwarding a flow. Such layer. The application layer and the control layer
applications can integrate stateful flow rule production logic communicate between them using the Northbound API. The
to apply complex quarantine procedures or malicious control layer and the data forwarding layer communicates
connection migration purposes that may redirect adversarial using the Southbound API. OpenFlow protocol is the most
network flows in ways which is found hard in perceiving by common form of Southbound API in use. Different layers of
the flow participant. Second, OpenFlow security applications SDN along with their various components and functions are
must be adopted supported the controller type. Thus creating briefly
a security application is platform dependent. Third, to date, stated below –
it’s quite challenging to spot all possible attack scenarios
which create a focal point on a dynamic environment like Network Application(s)
SDN using easy classification techniques.
Open northbound API
We have organized the paper in following frameworks,
Section I, Introduction, contains the motivation for the works, Controller Platform
general discussion which contains scope and problem
statement, Section II describes the background of SDN, DoS, Open southbound API
DDoS; SDN working architecture, DDoS attack in SDN
environment, Section III describes the comparative study of
the papers which we have reviewed, as well as a comparison
table, Section IV describes the taxonomy and analysis of the
paper, Section V describes the challenges of the work,
Section VI describes the conclusion and followed by
references at Section VII.

II. BACKGROUND
SDN has security issues, and among them, the most impactful
one is the Denial of Service (DoS) attack. When launched
successfully, the Denial of Service (DoS) attack or the more
deadly ones, the Distributed Denial of Service (DDoS) attack
can halt the complete network by incapacitating the
Network Infrastructure/Data Forwarding
controller, or can significantly downgrade the network
performance by restricting network components such as a Figure 1: SDN Architecture
switch. A typical DoS attack on any network including SDNs
engulfs computing resources and/or network resources
making network devices like routers and switches unable to • (Network) Application Layer – This layer facilitates
perform their usual designated task. An effective DoS attack user application interacting with the network. It also
can be achieved by overflowing the target infrastructure with provides standard services, for example, creating,
a huge number of requests to execute. discharging and terminating communication with
A. SDN Architecture each other, and any specific services that
Some key features of SDN include the capability of applications use.
configuring virtual networks, dynamic policy enforcement • Control Layer – This layer hosts the main core of the
for networks, and a wider control for managing networks network, the controller. This layer forwards the
through a well laid out centralized console. The overall information to the application layer as needed.
operational cost is also significantly lower than in Applications of SDN are built-in within the
conventional ways. It isolates the control logic from the application layer as per the information provided by
network devices (switches and routers) aiming at substituting the controller. The controller interprets the
the conventional networks. Centralized control plane puts an requirements of applications, regulate different
extra burden on administrators ensuring overall network elements of the network and deliver necessary
security and usual functionality. Compromised network
information to SDN applications. Additionally, the
objects can be a source to repossess delicate information
regarding network structure and users. That information can controller may shape the needs of competing

2
Only two pages were converted.
Please Sign Up to convert the full document.

www.freepdfconvert.com/membership

You might also like