Towards Load Balancing in SDN Networks During DDoS attacks



Similar documents
On real-time delay monitoring in software-defined networks

SDN_CDN Documentation

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage

8. 網路流量管理 Network Traffic Management

Game-based Analysis of Denial-of- Service Prevention Protocols. Ajay Mahimkar Class Project: CS 395T

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

The Internet: A Remarkable Story. Inside the Net: A Different Story. Networks are Hard to Manage. Software Defined Networking Concepts

Restorable Logical Topology using Cross-Layer Optimization

Routing in packet-switching networks

Acquia Cloud Edge Protect Powered by CloudFlare

CloudFlare advanced DDoS protection

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

EE627 Lecture 22. Multihoming Route Control Devices

Software Defined Networks

Distributed Denial of Service Attacks & Defenses

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Frenetic: A Programming Language for OpenFlow Networks

Software Defined Networking What is it, how does it work, and what is it good for?

Securing Local Area Network with OpenFlow

Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency

Network Security Demonstration - Snort based IDS Integration -

DoS: Attack and Defense

The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet

Project 4: SDNs Due: 11:59 PM, Dec 11, 2014

Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity

How To Understand The Power Of The Internet

Introduction to LAN/WAN. Network Layer

CS335 Sample Questions for Exam #2

Route Discovery Protocols

Using VDOMs to host two FortiOS instances on a single FortiGate unit

Security in Structured P2P Systems

Filtering Based Techniques for DDOS Mitigation

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

Configuring a Load-Balancing Scheme

On the Deficiencies of Active Network Discovery Systems

DNS amplification attacks

What is VLAN Routing?

Iperf Tutorial. Jon Dugan Summer JointTechs 2010, Columbus, OH

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

OpenFlow Based Load Balancing

IT 3202 Internet Working (New)

Denial of Service (DOS) Testing IxChariot

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

IP Routing Configuring Static Routes

Serro Solutions Enables Managed Security Service Providers to Optimize Networking Performance and Cost

A S B

How To Manage Outgoing Traffic On Fireware Xtm

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Network Security through Software Defined Networking: a Survey

VLANs. Application Note

Project 4: (E)DoS Attacks

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface.

Transport and Network Layer

CS514: Intermediate Course in Computer Systems

A study of denial of service attacks on the Internet p.1/39

Analysis of a DDoS Attack

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks

Routing. Static Routing. Fairness. Adaptive Routing. Shortest Path First. Flooding, Flow routing. Distance Vector

Strategies to Protect Against Distributed Denial of Service (DD

DDoS Overview and Incident Response Guide. July 2014

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME. Scenario

Flow Monitoring With Cisco Routers

Software Defined Networking What is it, how does it work, and what is it good for?

Networking Basics for Automation Engineers

1. Firewall Configuration

Empowering Software Defined Network Controller with Packet-Level Information

Ten Things to Look for in an SDN Controller

Evaluating the SDN control traffic in large ISP networks

Cisco Quality of Service and DDOS

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

A New Forwarding Policy for Load Balancing in Communication Networks

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh

IP-6600 Router Configuration Quickstart Backing Up a Broadband Connection with Dialup

Router and Routing Basics

MikroTik RouterOS Workshop Load Balancing Best Practice. Warsaw MUM Europe 2012

IP Traffic Engineering over OMP technique

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Software Defined Networking (SDN)

The Research and Application of Multi-Firewall Technology in Enterprise Network Security

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

F root anycast: What, why and how. João Damas ISC

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Limitations of Packet Measurement

An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Radware s Attack Mitigation Solution On-line Business Protection

Internet Addresses (You should read Chapter 4 in Forouzan)

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

SAN Conceptual and Design Basics

How Cisco IT Protects Against Distributed Denial of Service Attacks

Data Center Content Delivery Network

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

Transcription:

Towards Load Balancing in SDN Networks During DDoS attacks Mikhail Belyaev St.Petersburg Polytechnic University Svetlana Gaivoronski Moscow State University ARCCN

DDoS - attacks DDoS attack distributed attack causing denial-of-service of victim system. For a lot of scary number, visit arbornetworks.com

DDoS mitigation Mitigation techniques: active mitigation : detection and filtering of attacking machines; survival mitigation : effective load balancing.

Existing Solutions Static load balancing uses a-priori information about system state: Random selection Hash selection (Weighted) round-robin Dynamic load balancing distributes load between servers during runtime: Round-robin A lot of more sophisticated algorithms

SDN load balancing problems Existing solutions do not consider properties of incoming traffic Experiments show that they are not effective during DDoS

SDN load balancing problems Existing solutions do not consider properties of incoming traffic Experiments show that they are not effective during DDoS

SDN load balancing problems Existing solutions do not consider properties of incoming traffic Experiments show that they are not effective during DDoS

Proposed Approach: Idea 2 independent levels of load balancing: L7 load balancing (DNS/NAT) L4 load balancing Local network

Algorithm 1. Acquire the load and topology information for network; 2. Override the routing for the network with static routing information; 3. Iteratively keep splitting (and reapplying) traffic paths for routers that are: 1. Overloaded 2. Have alternate routes available

Pre-phases Phase 1: Needs to be executed before the need of load balancing arises Updates the network load mask M load, where the element! ij corresponds to number of bytes coming from i to j Phase 2: Applied only once to override the default packet routing mechanisms Performed by running Bellman-Ford algorithm on the whole network topology graph

Iterative phase (1/3) M load 1. Update and with current info. Mfree

Iterative phase (1/3) M load 1. Update and with current info. Mfree 2. Find the first overloaded link in M load :! ij + > ij! ij

Iterative phase (1/3) M load 1. Update and with current info. Mfree 2. Find the first overloaded link in M load :! ij + > ij r q 3. Find the first path in T path such that contains link (i, j) T path : {ips src,ip i,path} r q! ij

Iterative phase (2/3) ip i r q 4. For part of, find a new shortest path to server i, assuming than link (i, j) is not presented. Let us call new path path q i

Iterative phase (2/3) ip i r q 4. For part of, find a new shortest path to server i, assuming than link (i, j) is not presented. Let us call new path path q path q i

Iterative phase (2/3) ip i r q 4. For part of, find a new shortest path to server i, assuming than link (i, j) is not presented. Let us call new path path q 5. Calculate maximum additional load for path q, looking up every link path in : M free al = min(m ij :(i, j) 2 path q ) i path q

Iterative phase (3/3) 6. Calculate the new sets of masks ips old and such that they divide into pairs with coef. al/! ij ips new ips src Remove corr. Entry from T path and insert new ones.

Iterative phase (3/3) 6. Calculate the new sets of masks ips old and such that they divide into pairs with coef. al/! ij ips new ips src Remove corr. Entry from T path and insert new ones. {ips old,ip i,path} {ips new,ip i,path q }

Iterative phase (3/3) 6. Calculate the new sets of masks ips old and such that they divide into pairs with coef. al/! ij ips new ips src Remove corr. Entry from T path and insert new ones. 7. Commit the changes in to all switches across and path q. T path path {ips old,ip i,path} {ips new,ip i,path q }

Iterative phase (3/3) 6. Calculate the new sets of masks ips old and such that they divide into pairs with coef. al/! ij Remove corr. Entry from T path ips new ips src and insert new ones. 7. Commit the changes in to all switches across and path q. 8. Wait for timeframe and go to step 1. T path path {ips old,ip i,path} {ips new,ip i,path q }

Implementation CALLOPHRYS DDoS attack detection and mitigation system: Distributed Asynchronous Based on actor model Agent SDN Manager Controller

Implementation Asynchronous context implies: All parts of the balancer are separate asynchronous agents The loop is created using timed messages sent to the balancer The rest of the algorithm doesn t change much

Evaluation CALLOPHRYS has been tested using a virtual network setup q Mininet o Simulated low-spec and slowed down network q Floodlight q Iperf for attack simulation o Combined TCP/UDP mode

Evaluation: results Load balancing was evaluated separately from the detectors Reaching full link & switch employment in 10-60 seconds Up to 3000 rules generated for criticalpath switches

Limitations & Future Work Stale rules in switches may degrade network performance over time We do not employ any asynchronous features of the actor-based solution Algorithm parameters are deduced by handmade experiments We need a real benchmark and evaluation on physical networks!

Mikhail Belyaev: belyaev@kspt.icc.spbstu.ru Svetlana Gaivoronski: s.gaivoronski@gmail.com YOUR QUESTIONS?

Notations (i, j) - channel between switches i and j; a ij - bandwidth of channel (i, j)! ij - current channel load The channel is overloaded if 1,..., K - destination servers!ij + > ij M load!ij a ij! ij - load matrix N x N containing current load values M free - Matrix of available resources -