Disrupting SDN via the data plane: Low-rate flow table overflow attack

46Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The emerging Software-Defined Networking (SDN) is being adopted by data centers and cloud service providers to enable flexible control. Meanwhile, the current SDN design brings new vulnerabilities. In this paper, we explore a stealthy data plane based attack that uses a minimum rate of attack packet to disrupt SDN. To achieve this, we propose the LOFT attack that computes the lower bound of attack rate to overflow flow tables based on the inferred network configurations. Particularly, each attack packet always triggers or maintains consumption of one flow rule. LOFT can ensure the attack effect with various network configurations while reducing the possibility of being captured. We demonstrate its feasibility and effectiveness in a real SDN testbed consisting of commercial hardware switches. The experiment results show that LOFT can incur significant network performance degradation and potential network DoS at an attack rate of only tens of Kbps.

Cite

CITATION STYLE

APA

Cao, J., Xu, M., Li, Q., Sun, K., Yang, Y., & Zheng, J. (2018). Disrupting SDN via the data plane: Low-rate flow table overflow attack. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 238, pp. 356–376). Springer Verlag. https://doi.org/10.1007/978-3-319-78813-5_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free