SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke

Slides:



Advertisements
Similar presentations
An Improved TCP for transaction communications on Sensor Networks Tao Yu Tsinghua University 2/8/
Advertisements

SCTP v/s TCP – A Comparison of Transport Protocols for Web Traffic CS740 Project Presentation by N. Gupta, S. Kumar, R. Rajamani.
Camarillo / Schulzrinne / Kantola November 26th, 2001 SIP over SCTP performance analysis
Transport Layer – TCP (Part2) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Transmission Control Protocol (TCP)
Intermediate TCP/IP TCP Operation.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Fundamentals of Computer Networks ECE 478/578 Lecture #20: Transmission Control Protocol Instructor: Loukas Lazos Dept of Electrical and Computer Engineering.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Performance Improvement of TCP in Wireless Cellular Network Based on Acknowledgement Control Osaka University Masahiro Miyoshi, Masashi Sugano, Masayuki.
1 A Comparison of Load Balancing Techniques for Scalable Web Servers Haakon Bryhni, University of Oslo Espen Klovning and Øivind Kure, Telenor Reserch.
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
Aleksandar Kuzmanovic & Edward W. Knightly A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols.
The Transport Layer Chapter 6. The Transport Service Services Provided to the Upper Layers Transport Service Primitives Berkeley Sockets An Example of.
1 An Overlay Scheme for Streaming Media Distribution Using Minimum Spanning Tree Properties Journal of Internet Technology Volume 5(2004) No.4 Reporter.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
1 Proceeding the Second Exercises on Computer and Systems Engineering Professor OKAMURA Laboratory. Othman Othman M.M.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Othman Othman M.M., Koji Okamura Kyushu University 1.
Transmission Control Protocol TCP. Transport layer function.
Copyright 2002, S.D. Personick. All Rights Reserved.1 Telecommunications Networking II Topic 20 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Authors: Haowei Yuan and Patrick Crowley Publisher: 2013 Proceedings IEEE INFOCOM Presenter: Chia-Yi Chu Date: 2013/08/14 1.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Performance Validation of Mobile IP Wireless Networks Presented by Syed Shahzad Ali Advisor Dr. Ravi Pendse.
DoS/DDoS attack and defense
Transmission Control Protocol (TCP) BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
5. The Transport Layer 5.1 Role of Transport Layer It bridge the gab between applications and the network layer. Provides reliable cost-effective data.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
4343 X2 – The Transport Layer Tanenbaum Ch.6.
© 2002, Cisco Systems, Inc. All rights reserved..
Transport Layer1 TCP Connection Management Recall: TCP sender, receiver establish “connection” before exchanging data segments r initialize TCP variables:
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
The Transport Layer Dr. ir. S.S. Msanjila RIS 251.
An Introduction To ARP Spoofing & Other Attacks
SDN and Security Security as a service in the cloud
Chapter 9: Transport Layer
Unit-7 The Transport Layer.
Instructor Materials Chapter 9: Transport Layer
NET 536 Network Security Firewalls and VPN
COMP2322 Lab 6 TCP Steven Lee Mar 29, 2017.
Network Anti-Spoofing with SDN Data plane Authors:Yehuda Afek et al.
Reddy Mainampati Udit Parikh Alex Kardomateas
Chapter 6: Transport Layer (Part I)
Introduction to Networking
SCTP v/s TCP – A Comparison of Transport Protocols for Web Traffic
CS 5565 Network Architecture and Protocols
Transport Layer Unit 5.
CCNA 2 v3.1 Module 10 Intermediate TCP/IP
The IP, TCP, UDP protocols
Timed Consistent Network Updates in Software-Defined Networks
CS 5565 Network Architecture and Protocols
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
IIT Indore © Neminath Hubballi
SDN-Guard: DoS Attacks Mitigation in SDN Networks
Process-to-Process Delivery: UDP, TCP
Transport Layer 9/22/2019.
TCP Connection Management
Presentation transcript:

SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke DATE:2018/01/05

Outline INTRODUCTION RELATED WORK LIMITATIONS OF THE RELATED WORK SOLUTION: LINESWITCH EVALUATION CONCLUSION

INTRODUCTION Software Defined Networking (SDN) SDN proposes a marked shift from the current network infrastructure by decoupling the network logic layer, called the control plane, and the data layer, called the data plane, into separate entities.

INTRODUCTION (Cont’d) SDN also introduces a serious vulnerability which can be exploited to overload the controller with flow requests. This attack is called control plane saturation Control plane saturation can be easily performed, for example, through SYN flooding

RELATED WORK Avant-Guard Avant-Guard modifies the standard OpenFlow protocol and adds two extensions: (1) a Connection Migration module (2) the Actuating Trigger module

LIMITATIONS OF THE RELATED WORK Avant-Guard is indeed a valid solution against the control plane saturation attack. Unfortunately, it introduces new vulnerabilities too. the scheme of a possible attack for Avant-Guard of the above points: A. Proxying Requires State B. TCP Ports and Limit on Connections Number C. Connection Migration Transparency D. Consequences of Breaking End-to-End Semantics

consider a situation where a host A initiates a TCP connection with another host B. Let R be an intermediate OpenFlow switch Host A sends a SYN packet to host B with a sequence number ISNA. Switch R intercepts the incoming packet, and replies to host A with a SYN-ACK packet with a spoofed address,i.e., using host B address. The ACK number will be ISNA + 1 and the sequence number will be a random number ISNR. • Host A replies with an ACK packet with the acknowledgment number ISNR + 1. From now on, A will expect incoming packets from host B to have a sequence number ISN’ R = ISNR +payload bytes Upon receiving the permission to migrate the connection, switch R will start an handshake with host B by sending a SYN packet with sequence number ISNA.

Buffer Saturation Attack the attacker just needs to open several complete TCP connections through the target OpenFlow switch to a given host. Note that each of these connections will need state to be stored on the switch for translation. Therefore, if the number of connections is large enough, the portion of memory dedicated to that data structure will be saturated.

SOLUTION: LINESWITCH LineSwitch An OpenFlow module deployed on edge OpenFlow switches LineSwitch proxies all incoming TCP connections from a given IP until one is completed Subsequent connections are proxied only with a very small probability

Key Advantages Higher Resiliency to Buffer Saturation Reduced Use of Proxy Reduced Overhead

EVALUATION all experiments using the Mininet network simulator in a virtual machine. Compare the performance of OpenFlow, Avant-Guard and LineSwitch : under regular use-case scenario under SYN flooding attack under buffer saturation attack

Figure 6 presents the setup of our simulation includes : two client hosts an HTTP server an OpenFlow switch a local controller

Regular Traffic Scenario Link 1, Link 2 and Link 3 are setup with a bandwidth = 10 Mbps a Round Trip Time (RTT) between nodes = 80 ms the probability for LineSwitch Pp = 0.05 time required to retrieve a web page size = 1 KByte average over 500 separate runs.

SYN Flooding Scenario Run the experiments varying the bandwidth of Link 2, i.e., the attacker’s link

Buffer Saturation Scenario configure the system with different buffer sizes and run the attack at different rates. show that: The attack rate required to successfully incapacitate an OpenFlow switch running AVANT-GUARD grows linearly with the size of the buffer. Using AVANT-GUARD, it is easily successfully complete the attack achievable, even with larger buffers. LineSwitch offers an extremely high resiliency to the buffer saturation attack, and can be further configured through the Pp parameter to address the specific needs of the network.

Configuring the Proxy Probability LineSwitch efficacy depends partially on the value assigned to the proxying parameter Pp estimate the average attack detection time dt as: v is the attack speed s is the size of each packet Pp is the adopted proxy probability s

CONCLUSION Analyzed the effects of the control plane saturation attack based on SYN flooding. considered AVANT-GUARD, which is, to the best of our knowledge. Proposed LineSwitch, a solution based on probability and blacklisting which offers both resiliency against SYN flooding- based control plane saturation attacks and protection from buffer saturation vulnerabilities.

REFERENCES M. Ambrosin, M. Conti, F. De Gaspari and R. Poovendran, "LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking," in IEEE/ACM Transactions on Networking, vol. 25, no. 2, pp. 1206-1219, April 2017.