- This event has passed.
Dissertation Defense: Samer Khamaiseh
October 25, 2019 @ 2:00 pm MDT
Detection and Countermeasure of Saturation Attacks in Software-Defined Networks
When: 2:00 PM 10/25/2019
Location: City Center Plaza, Room 259
Samer Khamaiseh will be the first student from the Computing Ph.D. program to defend his dissertation!
Committee Members: Dianxiang Xu co-chair, Edoardo Serra co-chair, Jyh-haw Yeh, Min Long
The decoupling of control and data planes in software-defined networking (SDN) facilitates orchestrating the network traffic. However, SDN suffers from critical security issues, such as DoS saturation attacks on the data plane. These attacks can exhaust the SDN component resources, including the computational resources of the control plane, create a high packet loss rate and a long delay in delivering the OpenFlow messages due to the bandwidth consumption of the OpenFlow connection channel, and exhaust the buffer memory of the data plane.
Currently, most of the existing machine learning detection methods rely on a predefined time-window to start analyzing the network traffic to detect the saturation attacks caused by TCP-SYN flooding. However, saturation attacks range in duration, and a long-lasting attack can affect the entire SDN network. Therefore, if the time window is too large, the detection method response time will be long, and the attack may have an opportunity to saturate the network. If the time window is too small, the amount of the traffic may be insufficient to provide reliable detection results and the detection method will start frequently, which may cause a huge performance overhead for the SDN environment. Thus, identifying the proper time window for running the detection method and analyzing the traffic is a key concern.
For saturation attacks, the adoption of machine learning detection systems in the “real world” has been very limited. This is partly because of their deficiencies in detecting unknown saturation attacks. An unknown attack is an attack which is not represented in the dataset used to train the attack detection model. Therefore, evaluating the detection performance of the state-of-the-art supervised machine learning and semi-supervised algorithms on unknown saturation attacks is another key concern.
Furthermore, many of the proposed anomaly defense systems are deficient in mitigating the unknown saturation attacks and involve techniques which may not be compatible with OpenFlow protocol, such as modifying the data plane by adding extra devices, migrating the network traffic to a scrubbing center, and/or require extensive computational resources. Thus, an effective solution that is capable of detecting and mitigating the known and unknown saturation attacks is an urgent need.
In this dissertation, we propose a defense framework to mitigate known and unknown saturation attacks for SDN. It resides on the application layer and can protect the computational resources of the control plane and data plane. The proposed system combines (1) a detection module that is capable of detecting both known and unknown saturation attacks by leveraging the proper time window of OpenFlow traffic analysis combined with machine learning to identify the attacks, (2) a victim switch detection module that can detect and identify the victim OpenFlow switches when they are targeted by known and unknown saturation attacks, and (3) a countermeasure module that can mitigate a family of saturation attacks and return the data plane settings to the pre-attack ones.
Implementation and experimental results demonstrate that, in comparison with the state-of-the-art defense systems, the proposed system provides effective protection for the SDN network — control plane, data plane, and OpenFlow connection channel — without extensive control plane computational resources and data plane flow table utilization.