Mitigating DDoS Attacks using OpenFlow-based Software Defined Networking
|
|
|
- Victor Clarke
- 9 years ago
- Views:
Transcription
1 Mitigating DDoS Attacks using OpenFlow-based Software Defined Networking Mattijs Jonker and Anna Sperotto Design and Analysis of Communication Systems (DACS) Centre for Telematics and Information Technology (CTIT) University of Twente, Enschede, The Netherlands {m.jonker, Abstract. Over the last years, Distributed Denial-of-Service (DDoS) attacks have become an increasing threat on the Internet, with recent attacks reaching traffic volumes of up to 500 Gbps. To make matters worse, web-based facilities that offer DDoS-as-a-service (i.e., Booters) allow for the layman to launch attacks in the order of tens of Gbps in exchange for only a few euros. A recent development in networking is the principle of Software Defined Networking (SDN), and related technologies such as OpenFlow. In SDN, the control plane and data plane of the network are decoupled. This has several advantages, such as centralized control over forwarding decisions, dynamic updating of forwarding rules, and easier and more flexible network configuration. Given these advantages, we expect SDN to be well-suited for DDoS attack mitigation. Typical mitigation solutions, however, are not built using SDN. In this paper we propose to design and to develop an OpenFlow-based mitigation architecture for DDoS attacks. The research involves looking at the applicability of OpenFlow, as well as studying existing solutions built on other technologies. The research is as yet in its beginning phase and will contribute towards a Ph.D. thesis after four years. 1 Introduction While Distributed Denial-of-Service (DDoS) attacks have been long noted in the literature, it was not until a large group of attacks referred to as operation payback in 2010 by WikiLeaks supporters that the general public better understood the power of such attacks. As part of this group of attacks, the websites of MasterCard and Visa were brought down entirely, and PayPal s website was notably disrupted [1,2]. Ever since, we have seen a rapid increase in DDoS attacks in occurrence and magnitude. The Spamhaus attack is a notorious example [3]. While its 300 Gbps traffic peak created the largest-ever-seen DDoS attack at the time, it has since been surpassed by attacks up to sheer volumes of 500 Gbps [4,5]. These types of attacks use core parts of the Internet infrastructure to amplify traffic (e.g., the Domain Name System (DNS)) and can be launched without an underlying botnet. As they operate at the network and transport layers [6], they are nearly impossible to mitigate with strictly onpremise solutions. To make matters worse, the ability to launch such attacks is
2 nowadays no longer limited to people with advanced technical skills. Contrarily, DDoS-as-a-Service providers, i.e., Booters [7], allow anyone to perform attacks in the order of tens of Gbps in exchange for only a few euros. As a result of the increased threat of DDoS attacks, a market for mitigation solutions was created, which gave rise to DDoS Protection Service (DPS) providers such as Akamai Prolexic [8], CloudFlare [9] and Verisign [10]. A recent development in networking technology that has attracted a lot of attention from the research community is the Software Defined Networking (SDN) principle [11, 12]. In SDN, the control plane and data plane of the network are decoupled. This decoupling has many advantages, such as centralized control over forwarding decisions, dynamic updating of forwarding rules, and easier and more flexible network configuration. OpenFlow [13] is the most commonly deployed SDN technology. Considering the characteristics of SDN, we expect it to be well-suited for DDoS attack mitigation [14]. Despite SDN s potential for DDoS attack mitigation [15], we observe that existing solutions rely on other techniques. For example, solutions offered by cloud-based DPS providers rely on DNS anycast and Border Gateway Protocol (BGP) announcements. Moreover, there are challenges when it comes to SDN itself, such as the performance of programmable devices, and its susceptibility to attacks [16, 17]. The aim of this research, therefore, is to investigate the applicability of OpenFlow-enabled SDN for DDoS attack mitigation, and to propose and develop an architecture to this end. The remainder of this paper is organized as follows. In Section 2 the research questions and approach for this work are detailed. Some of the preliminary steps taken are presented in Section 3, and in Section 4 we conclude this paper. 2 Goal, Research Questions and Approach The goal of this research is to evaluate OpenFlow for use in DDoS attack mitigation, and to design and to develop a mitigation architecture. By using the advantages of OpenFlow, such an architecture is expected to allow for attacks to be mitigated in an early stage, i.e., closer to the Internet backbone and further away from the target, in a flexible and scalable manner. In addition, an OpenFlow-based architecture may allow, to some extent, the protected entity to control routing, which could have benefits. In support of achieving this goal we have defined the following main research question. RQ M : Can we use OpenFlow in a DDoS attack mitigation architecture, and how will such an architecture operate? Our approach to answering RQ M is primarily measurement-based, in which measurements are first focussed on assessing the applicability of OpenFlowenabled devices for DDoS mitigation, and later shift towards the architecture operation. In the subsections to follow we will divide the main research question in sub-questions, and discuss, for every sub-question, the envisioned approach.
3 2.1 The Applicability of OpenFlow-based SDN In the context of researching the applicability of OpenFlow-based SDN for a mitigation architecture, the following sub-questions are defined. RQ M.1 : What do DDoS attack mitigation solutions based on technologies other than SDN look like, and how do they operate? The purpose of this research question is to thoroughly study other solutions, and investigate where OpenFlow-based SDN can excell, and where it may fall short in comparison. Typical solutions based on BGP and DNS anycast, for example, re-route all traffic at the network layer (L3) through scrubbing centers, i.e., data centers where traffic is cleansed. This way of operating needs to be studied for comparative purposes. RQ M.2 : How applicable is OpenFlow to the end of DDoS attack mitigation, in terms of flexibility, performance, and scalability? The specification of OpenFlow may be different from the performance and scalability actually offered by OpenFlow implementations. This question serves to quantify the flexibility, performance, and scalability of OpenFlow. To approach RQ M.1, we will study mitigation solutions offered by DPS providers; solutions deployed at backbone providers, ISPs, and National Research and Education Networks (NREN); and other type of solutions, such as traditional firewalls or vendor-specific solutions. Part of this study will include large-scale measurements using DNS, which will reveal statistics about which domains use (or migrate to) cloud-based DPS providers. Furthermore, using DNS we can study how parts of DPS architectures based on DNS anycast (e.g., CloudFlare) operate and behave. We will also perform comparative benchmarks between transport layer (L4) filtering with OpenFlow and traditional firewalls or vendor-specific implementations, such those based on [18]. We will also perform measurements to study if re-routing everything at L3 is efficient. Our approach for RQ M.2 will include benchmarks of specific OpenFlow-enabled device implementations, for example to see how well forwarding devices behave when rules are frequently dynamically modified. This type of benchmarks will be done in lab settings, as well as in production networks. 2.2 Architecture Requirements In the context of architecture requirements, the following sub-question is defined. RQ M.3 : What are the requirements of an OpenFlow-based mitigation architecture for DDoS attacks? This research question serves to get a thorough technical understanding of how an architecture needs to operate, what its performance requirements are, and how it can be scalable and be flexible. Its design should also account for the notion that multiple organisations are likely to be involved, which will give rise to legal and ethical questions, such as about net neutrality.
4 The approach we will take to answer RQ M.3 involves interviewing operators of software defined networks [12] to reveal how current SDN topologies are deployed, what the challenges are, if and how control over routing is currently realized, and under which conditions dynamic routing allows for DDoS attack mitigation. Non-technical issues (e.g., ethical and legal) can also be identified this way. The approach also involves measurements of preliminary architecture setups in a lab setting to measure how different parts interact. This will allow us to benchmark architecture designs, review requirements, and steer architecture design choices. The overall approach, as identified in the preceding sections, will be iterative. This is due to several reasons. First, the consequences of design choices may affect architecture scalability and performance. Second, results from one research question may lead to revisiting others. 3 Preliminary steps This section briefly describes some preliminary steps taken to achieve the goal of the proposed research. We recently deployed a large-scale measurement framework based on DNS. It uses the full.com,.net and.org zones to perform DNS queries for about 142 million domain names daily. Given that several record types are of interest, billions of queries are performed per day. The measurement framework is used for different research efforts, but in the context of this work it is used as follows. By mapping address responses of domains (i.e., A and AAAA) to Autonomous System (AS) numbers, the use of DPS providers (e.g., CloudFlare) can be identified. Name Server (NS) responses can be used to the same end. This type of analysis allows us to evaluate statistics on the use of, and migration over time to, DPS providers. 4 Final considerations During the first four months of this Ph.D research, the preliminary steps presented in Section 3 were taken. The main goal of this work (as described in Section 2) should be achieved within a period of four years, as part of a Ph.D thesis. During this time, this research is expected to benefit from the network of contacts the University of Twente (UT) has, such as those in the context of EU FP7 FLAMINGO NoE. Acknowledgments This research is funded by FLAMINGO, a Network of Excellence project (318488) supported by the European Commission under its Seventh Framework Programme and by the NWO Project D3.
5 References 1. Esther Addley and Josh Halliday: WikiLeaks supporters disrupt Visa and Master- Card sites in Operation Payback s. dec/08/wikileaks-visa-mastercard-operation-payback/ Accessed on January 13th, Andry Greenberg: WikiLeaks Supporters Aim Cyberattacks At PayPal. wikileaks-supporters-aim-cyberattacks-at-paypal/ Accessed on January 13th, John Markoff and Nicole Pelroth: Firm Is Accused of Sending Spam, and Fight Jams Internet. online-dispute-becomes-internet-snarling-attack.html?_r=0 Accessed on January 13th, Steven Musil: Record-breaking DDoS attack in Europe hits 400Gbps. cnet.com/news/record-breaking-ddos-attack-in-europe-hits-400gbps/ Accessed on January 13th, Parmy Olson: The Largest Cyber Attack In History Has Been Hitting Hong Kong Sites. the-largest-cyber-attack-in-history-has-been-hitting-hong-kong-sites/ Accessed on January 13th, Zimmermann, H.: OSI reference model The ISO model of architecture for open systems interconnection. IEEE Transactions on Communications 28(4) (1980) Karami, M., McCoy, D.: Understanding the Emerging Threat of DDoS-as-a- Service. In: Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET 13. (2013) 8. Prolexic, A.: Prolexic: DDoS Protection and Mitigation. com/ Accessed on January 13th, CloudFlare: CloudFlare: The web performance & security company. cloudflare.com/ Accessed on January 13th, Verisign: Verisign: Internet Security and Web Domain Names. verisigninc.com/ Accessed on January 13th, Shenker, S., Casado, M., Koponen, T., McKeown, N.: The future of networking, and the past of protocols, Presented at the Open Networking Summit (2011) 12. Bezerra, J.A.: Migrating AmLight from legacy to SDN: Challenges, Results and Next Step, Presented at NANOG 63 (2015) 13. McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: OpenFlow: enabling innovation in campus network. ACM SIGCOMM Computer Communication Review 38(2) (2008) François, J., Dolberg, L., Festor, O., Engel, T.: Network Security through Software Defined Networking: a Survey. In: Proceedings of the 7th ACM conference on Principles, Systems and Applications of IP Telecommunications, IPTComm 14. (2014) 15. Vizváry, M., Vykopal, J.: Future of DDoS Attacks Mitigation in Software Defined Networks. In: Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 14. (2014) 16. Sezer, S., Scott-Hayward, S., Kaur, P.C., Fraser, B., Lake, D., Finnegan, J., Viljoen, N., Miller, M., Roa, N.: Are We Ready for SDN? Implementation Challenges for Software-Defined Networks. ACM SIGCOMM Computer Communication Review 51(7) (2013) 36 43
6 17. Kreutz, D., Ramos, F., Verissimo, P.: Towards secure and dependable softwaredefined networks. In: Proceedings of the 2nd ACM SIGCOMM workshop on Hot topics in software defined networking. (2013) 18. Juniper: Junos OS: Network operating system for routing, switching, and security. Accessed on January 22nd, 2015.
SDN Security Design Challenges
Nicolae Paladi SDN Security Design Challenges SICS Swedish ICT! Lund University In Multi-Tenant Virtualized Networks Multi-tenancy Multiple tenants share a common physical infrastructure. Multi-tenancy
SDN. What's Software Defined Networking? Angelo Capossele
SDN What's Software Defined Networking? Angelo Capossele Outline Introduction to SDN OpenFlow Network Functions Virtualization Some examples Opportunities Research problems Security Case study: LTE (Mini)Tutorial
Future of DDoS Attacks Mitigation in Software Defined Networks
Future of DDoS Attacks Mitigation in Software Defined Networks Martin Vizváry, Jan Vykopal Institute of Computer Science, Masaryk University, Brno, Czech Republic {vizvary vykopal}@ics.muni.cz Abstract.
A Method for Load Balancing based on Software- Defined Network
, pp.43-48 http://dx.doi.org/10.14257/astl.2014.45.09 A Method for Load Balancing based on Software- Defined Network Yuanhao Zhou 1, Li Ruan 1, Limin Xiao 1, Rui Liu 1 1. State Key Laboratory of Software
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
DDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail
DDoS Attack Mitigation Report Media & Entertainment Finance, Banking & Insurance Retail DDoS Attack Mitigation Report Media & Entertainment Attack on Spanish-Language News Site is Abandoned When Traffic
An Introduction to Software-Defined Networking (SDN) Zhang Fu
An Introduction to Software-Defined Networking (SDN) Zhang Fu Roadmap Reviewing traditional networking Examples for motivating SDN Enabling networking as developing softwares SDN architecture SDN components
Security improvement in IoT based on Software Defined Networking (SDN)
Security improvement in IoT based on Software Defined Networking (SDN) Vandana C.P Assistant Professor, New Horizon College of Engineering Abstract With the evolving Internet of Things (IoT) technology,
Autonomicity Design in OpenFlow Based Software Defined Networking
GC'12 Workshop: The 4th IEEE International Workshop on Management of Emerging Networks and Services Autonomicity Design in OpenFlow Based Software Defined Networking WANG Wendong, Yannan HU, Xirong QUE,
Multiple Service Load-Balancing with OpenFlow
2012 IEEE 13th International Conference on High Performance Switching and Routing Multiple Service Load-Balancing with OpenFlow Marc Koerner Technische Universitaet Berlin Department of Telecommunication
Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013
the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered
Making the Internet fast, reliable and secure. DE-CIX Customer Summit - 2014. Steven Schecter <[email protected]>
Making the Internet fast, reliable and secure DE-CIX Customer Summit - 2014 Steven Schecter What is a Content Distribution Network RFCs and Internet Drafts define a CDN as: Content
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
DDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
Implementation of Address Learning/Packet Forwarding, Firewall and Load Balancing in Floodlight Controller for SDN Network Management
Research Paper Implementation of Address Learning/Packet Forwarding, Firewall and Load Balancing in Floodlight Controller for SDN Network Management Raphael Eweka MSc Student University of East London
Limitations of Current Networking Architecture OpenFlow Architecture
CECS 572 Student Name Monday/Wednesday 5:00 PM Dr. Tracy Bradley Maples OpenFlow OpenFlow is the first open standard communications interface that enables Software Defined Networking (SDN) [6]. It was
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, University of Padua, Italy {surname}@math.unipd.it
DDoS Threat Report. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
DDoS Threat Report Insights on Finding, Fighting, and Living with DDoS Attacks v1.1 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News - 2014 DDoS Trends
Software Defined Networks
Software Defined Networks Damiano Carra Università degli Studi di Verona Dipartimento di Informatica Acknowledgements! Credits Part of the course material is based on slides provided by the following authors
Michael Jarschel, Thomas Zinner, Tobias Hoßfeld, Phuoc Tran Gia University of Würzburg, Institute of Computer Science, Würzburg, Germany.
2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising
SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network
SDN AND SECURITY: Why Take Over the s When You Can Take Over the Network SESSION ID: TECH0R03 Robert M. Hinden Check Point Fellow Check Point Software What are the SDN Security Challenges? Vulnerability
Software Defined Networking Architecture
Software Defined Networking Architecture Brighten Godfrey CS 538 October 8 2013 slides 2010-2013 by Brighten Godfrey The Problem Networks are complicated Just like any computer system Worse: it s distributed
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Automated Mitigation of the Largest and Smartest DDoS Attacks
Datasheet Protection Automated Mitigation of the Largest and Smartest Attacks Incapsula secures websites against the largest and smartest types of attacks - including network, protocol and application
DDoS Attacks Can Take Down Your Online Services
DDoS Attacks Can Take Down Your Online Services Dr. Bill Highleyman Managing Editor, Availability Digest Continuity Insights New York 2014 October 8, 2014 [email protected] Who Am I? Dr. Bill
A Study on Software Defined Networking
A Study on Software Defined Networking Yogita Shivaji Hande, M. Akkalakshmi Research Scholar, Dept. of Information Technology, Gitam University, Hyderabad, India Professor, Dept. of Information Technology,
Software Defined Networking What is it, how does it work, and what is it good for?
Software Defined Networking What is it, how does it work, and what is it good for? slides stolen from Jennifer Rexford, Nick McKeown, Michael Schapira, Scott Shenker, Teemu Koponen, Yotam Harchol and David
Software Defined Networking for Telecom Operators: Architecture and Applications
2013 8th International Conference on Communications and Networking in China (CHINACOM) Software Defined Networking for Telecom Operators: Architecture and Applications Jian-Quan Wang China Unicom Research
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX
Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Shie-Yuan Wang Hung-Wei Chiu and Chih-Liang Chou Department of Computer Science, National Chiao Tung University, Taiwan Email: [email protected]
AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.
CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. Threat > The number and size of cyberattacks are increasing rapidly Website availability and rapid performance are critical factors in determining the success
The Many Faces of SDN: An Industry Perspective
The Many Faces of SDN: An Industry Perspective Kenneth Duda CTO / SVP Software Arista Networks, Inc. Face 1: SDN is for Experimentation Today, there is almost no practical way to experiment with new network
Information- Centric Networks. Section # 13.2: Alternatives Instructor: George Xylomenos Department: Informatics
Information- Centric Networks Section # 13.2: Alternatives Instructor: George Xylomenos Department: Informatics Funding These educational materials have been developed as part of the instructors educational
OpenFlow: Enabling Innovation in Campus Networks
OpenFlow: Enabling Innovation in Campus Networks Nick McKeown Stanford University Presenter: Munhwan Choi Table of contents What is OpenFlow? The OpenFlow switch Using OpenFlow OpenFlow Switch Specification
Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks
1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion
KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks
KASPERSKY DDOS PROTECTION Discover how Kaspersky Lab defends businesses against DDoS attacks CYBERCRIMINALS ARE TARGETING BUSINESSES If your business has ever suffered a Distributed Denial of Service (DDoS)
Software Defined Networks
Software Defined Networks Inspired from the article Software-defined Networking: A Comprehensive Survey by Diego Kreutz, Fernando M. V. Ramos, Paulo Verissimo, Christian Esteve Rothenberg, Siamak Azodolmolky
A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC. September 18, 2014.
A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC September 18, 2014 Charles Sun www.linkedin.com/in/charlessun @CharlesSun_ 1 What is SDN? Benefits
DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking
DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking Bing Wang Yao Zheng Wenjing Lou Y. Thomas Hou Virginia Polytechnic Institute and State University, Blacksburg, VA, USA
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
How To Understand The Power Of The Internet
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461
Stop DDoS Attacks in Minutes
PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)
A collaborative model for routing in multi-domains OpenFlow networks
A collaborative model for routing in multi-domains OpenFlow networks Xuan Thien Phan, Nam Thoai Faculty of Computer Science and Engineering Ho Chi Minh City University of Technology Ho Chi Minh city, Vietnam
Software Defined Networking
Software Defined Networking Richard T. B. Ma School of Computing National University of Singapore Material from: Scott Shenker (UC Berkeley), Nick McKeown (Stanford), Jennifer Rexford (Princeton) CS 4226:
SecurityDAM On-demand, Cloud-based DDoS Mitigation
SecurityDAM On-demand, Cloud-based DDoS Mitigation Table of contents Introduction... 3 Why premise-based DDoS solutions are lacking... 3 The problem with ISP-based DDoS solutions... 4 On-demand cloud DDoS
Testing Challenges for Modern Networks Built Using SDN and OpenFlow
Using SDN and OpenFlow July 2013 Rev. A 07/13 SPIRENT 1325 Borregas Avenue Sunnyvale, CA 94089 USA Email: Web: [email protected] www.spirent.com AMERICAS 1-800-SPIRENT +1-818-676-2683 [email protected]
Xperience of Programmable Network with OpenFlow
International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 2013 Xperience of Programmable Network with OpenFlow Hasnat Ahmed, Irshad, Muhammad Asif Razzaq, and Adeel Baig each one is
Towards Autonomic DDoS Mitigation using Software Defined Networking
Towards Autonomic DDoS Mitigation using Software Defined Networking Authors: Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar NDSS Workshop on Security of Emerging Networking Technologies (SENT
Various Alternatives to achieve SDN. Dhruv Dhody, Sr. System Architect, Huawei Technologies
Various Alternatives to achieve SDN Dhruv Dhody, Sr. System Architect, Huawei Technologies Huawei India R&D Dhruv Dhody Who? A multinational networking and telecommunications equipment and services company
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
Designing Virtual Network Security Architectures Dave Shackleford
SESSION ID: CSV R03 Designing Virtual Network Security Architectures Dave Shackleford Sr. Faculty and Analyst SANS @daveshackleford Introduction Much has been said about virtual networking and softwaredefined
How To Block A Ddos Attack On A Network With A Firewall
A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial
SDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
COMPSCI 314: SDN: Software Defined Networking
COMPSCI 314: SDN: Software Defined Networking Nevil Brownlee [email protected] Lecture 23 Current approach to building a network Buy 802.3 (Ethernet) switches, connect hosts to them using UTP cabling
Defense4All: Anti-DoS for OpenDaylight. July 18, 2013
Defense4All: Anti-DoS for OpenDaylight July 18, 2013 Introducing Defense4All Defense4All offers DDoS attack detection engine and a traffic diversion mechanism based solely on the programmable characteristics
Can Software Defined Networks (SDN) manage the dependability of the service provided to selected customers?
Can Software Defined Networks (SDN) manage the dependability of the service provided to selected customers? Gianfranco Nencioni Dipartimento di Ingegneria dell Informazione Università di Pisa Mini-seminar
Project 3 and Software-Defined Networking (SDN)
Project 3 and Software-Defined Networking (SDN) EE122 Fall 2011 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues
SIMPLE NETWORKING QUESTIONS?
DECODING SDN SIMPLE NETWORKING QUESTIONS? Can A talk to B? If so which what limitations? Is VLAN Y isolated from VLAN Z? Do I have loops on the topology? SO SDN is a recognition by the Networking industry
Open Source Network: Software-Defined Networking (SDN) and OpenFlow
Open Source Network: Software-Defined Networking (SDN) and OpenFlow Insop Song, Ericsson LinuxCon North America, Aug. 2012, San Diego CA Objectives Overview of OpenFlow Overview of Software Defined Networking
Why ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast
Why ISPs need SDN: SDN-based Network Chaining and Software-defined Multicast ZKI Herbsttagung, Kaiserslautern, Germany, 24. Sept. 2014 Jeremias Blendin, Julius Rückert, David Hausheer Department of Electrical
Cloud Security In Your Contingency Plans
Cloud Security In Your Contingency Plans Jerry Lock Security Sales Lead, Greater China Contingency Plans Avoid data theft and downtime by extending the security perimeter outside the data-center and protect
OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?
OpenFlow and Onix Bowei Xu [email protected] [1] McKeown et al., "OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, 38(2):69-74, Apr. 2008. [2] Koponen et al., "Onix: a Distributed Control
How to launch and defend against a DDoS
How to launch and defend against a DDoS John Graham-Cumming October 9, 2013 The simplest way to a safer, faster and smarter website DDoSing web sites is... easy Motivated groups of non-technical individuals
Why Is DDoS Prevention a Challenge?
ANALYST BRIEF Why Is DDoS Prevention a Challenge? PROTECTING AGAINST DISTRIBUTED DENIAL-OF-SERVICE ATTACKS Authors Andrew Braunberg, Mike Spanbauer Overview Over the past decade, the threat landscape has
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
Available online at www.sciencedirect.com. ScienceDirect. Procedia Computer Science 32 (2014 ) 1050 1055
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 32 (2014 ) 1050 1055 2nd International Workshop on Survivable and Robust Optical Networks (IWSRON) A Comparison of Software
Campus LAN at NKN Member Institutions
Campus LAN at NKN Member Institutions RS MANI [email protected] 1/7/2015 3 rd Annual workshop 1 Efficient utilization Come from: Good Campus LAN Speed Segregation of LANs QoS Resilient Access Controls ( L2 and
CS6204 Advanced Topics in Networking
CS6204 Advanced Topics in Networking Assoc Prof. Chan Mun Choon School of Computing National University of Singapore Aug 14, 2015 CS6204 Lecturer Chan Mun Choon Office: COM2, #04-17 Email: [email protected]
Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio [email protected] May 2013
Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec Leonardo Serodio [email protected] May 2013 Distributed Denial of Service (DDoS) Attacks DDoS attack traffic consumes
The OpenDNS Global Network Delivers a Secure Connection Every Time. Everywhere.
The OpenDNS Global Network Delivers a Secure Connection Every Time. Everywhere. Network Performance Users devices create multiple simultaneous connections each time we exchange data with other Internet
Mitigating DDoS Attacks at Layer 7
Mitigating DDoS Attacks at Layer 7 Detect, Localize and Mitigate using DNS GSLB Allan Jude ScaleEngine Inc. Introductions Allan Jude 12 Years as FreeBSD Server Admin Architect of the ScaleEngine CDN (HTTP
FAQ to ENISA s report on technologies to improve the resilience of communication networks
FAQs to reports on technologies to improve the resilience of communication networks FAQ to ENISA s report on technologies to improve the resilience of communication networks This FAQ covers the latest
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Hope is Not a Strategy
Neustar Insights Hope is Not a Strategy 2012 Annual DDoS Attack and Impact Survey: A Year-to-Year Analysis Contents Survey methodology 3 Frequency of attacks 3 Financial impact 4 Attack size 5 Length of
Leveraging SDN and NFV in the WAN
Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined
Software Defined Networking Basics
Software Defined Networking Basics Anupama Potluri School of Computer and Information Sciences University of Hyderabad Software Defined Networking (SDN) is considered as a paradigm shift in how networking
How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address
DNS Amplification Are YOU Part of the Problem? (RIPE66 Dublin, Ireland - May 13, 2013) Merike Kaeo Security Evangelist, Internet Identity [email protected] INTRO Statistics on DNS Amplification
libnetvirt: the network virtualization library
libnetvirt: the network virtualization library Daniel Turull, Markus Hidell, Peter Sjödin KTH Royal Institute of Technology, School of ICT Stockholm, Sweden Email: {danieltt,mahidell,psj}@kth.se Abstract
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control
Carrier-grade Network Management Extensions to the SDN Framework
Carrier-grade Network Management Extensions to the SDN Framework Alisa Devlic, Wolfgang John Ericsson Research Kista, Sweden {alisa.devlic, wolfgang.john}@ericsson.com Pontus Sköldström Acreo AB Kista,
Software-Defined Networking for the Data Center. Dr. Peer Hasselmeyer NEC Laboratories Europe
Software-Defined Networking for the Data Center Dr. Peer Hasselmeyer NEC Laboratories Europe NW Technology Can t Cope with Current Needs We still use old technology... but we just pimp it To make it suitable
Expert Reference Series of White Papers. Is Network Functions Virtualization (NFV) Moving Closer to Reality?
Expert Reference Series of White Papers Is Network Functions Virtualization (NFV) Moving Closer to Reality? 1-800-COURSES www.globalknowledge.com Is Network Functions Virtualization (NFV) Moving Closer
Network provider filter lab
Network provider filter lab Olof Hagsand Pehr Söderman KTH CSC Group Nr Name 1 Name 2 Name 3 Name 4 Date Instructor s Signature Table of Contents 1 Goals...3 2 Introduction...3 3 Preparations...3 4 Lab
Effective disaster recovery using Software defined networking
Effective disaster recovery using Software defined networking Thyagaraju, Mrs. Jyothi. K.S, Girish.L PG Student, Associate professor, Assistant Professor Dept of CSE, Cit, Gubbi, Tumkur Abstract In this
Steroid OpenFlow Service: Seamless Network Service Delivery in Software Defined Networks
Steroid OpenFlow Service: Seamless Network Service Delivery in Software Defined Networks Aaron Rosen and Kuang-Ching Wang Holcombe Department of Electrical and Computer Engineering Clemson University Clemson,
VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK
HANDBOOK VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK CONSIDERATIONS FOR SERVICE ADOPTION Version 1.0 July 2014 VerisignInc.com CONTENTS 1. WHAT IS A DDOS PROTECTION SERVICE? 3 2. HOW CAN VERISIGN
www.prolexic.com Stop DDoS Attacks in Minutes
www.prolexic.com Stop DDoS Attacks in Minutes Prolexic gives us the strong insurance policy against DDoS attacks that we were looking for. Mark Johnson, Chief Financial Officer, RealVision You ve seen
Pushing Enterprise Security Down the Network Stack
Pushing Enterprise Security Down the Network Stack Ankur Nayak, Alex Reimers, Russ Clark, Nick Feamster School of Computer Science, Georgia Tech ABSTRACT Network security is typically reactive: Networks
The Internet: A Remarkable Story. Inside the Net: A Different Story. Networks are Hard to Manage. Software Defined Networking Concepts
The Internet: A Remarkable Story Software Defined Networking Concepts Based on the materials from Jennifer Rexford (Princeton) and Nick McKeown(Stanford) Tremendous success From research experiment to
