...
首页> 外文期刊>Security and Communications Networks >A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox
【24h】

A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox

机译:通过OpenFlow中间盒为旧网络提供可扩展的异常检测和缓解架构

获取原文
获取原文并翻译 | 示例
           

摘要

In this paper, we investigate the applicability of inserting an OpenFlow middlebox to enhance the remotely triggered black hole routing mechanism, to mitigate distributed denial of service (DDoS) attacks in legacy networks. Specifically, we propose a modular architecture that exploits the network programmability of software-defined networking within the context of network functions virtualization, deploying on-demand virtualized network functions (VNFs) capable to manipulate and filter malicious traffic. Leveraging on the OpenFlow control functionality, we match and handle traffic on a per-flow level, preserving connectivity to/from the victim while pushing the mitigation process upstream, towards the edge of the affected network. To that end, a multilevel anomaly detection and identification mechanism was developed, pinpointing the victim in case an attack is detected. Subsequently, a virtualized network function instructs the edge router to forward all traffic destined to the victim to an OpenFlow switch, acting as a middlebox capable to filter malicious traffic identified by an OpenFlow controller, while preserving benign flows. The proposed architecture was implemented and evaluated based on the combination of datasets containing traces of real DDoS attacks and normal background traffic from our university campus network. Our analysis illustrated a clear clustering of Internet protocol prefixes used by malicious sources; thus, we implemented a longest common prefix aggregation algorithm to enable scaling of the proposed mitigation process, overcoming constraints due to hardware limitations of OpenFlow devices. Our analysis verifies that the proposed modular and scalable schema can efficiently identify DDoS attack victims and filter malicious traffic, without exhausting system and network resources. Copyright (c) 2015 John Wiley & Sons, Ltd.
机译:在本文中,我们研究了插入OpenFlow中间盒以增强远程触发的黑洞路由机制,减轻传统网络中的分布式拒绝服务(DDoS)攻击的适用性。具体来说,我们提出了一种模块化架构,该架构在网络功能虚拟化的环境中利用软件定义网络的网络可编程性,部署能够操纵和过滤恶意流量的按需虚拟化网络功能(VNF)。利用OpenFlow控制功能,我们在每个流级别上匹配和处理流量,在向上游或向受影响的网络边缘推进缓解过程的同时,保持与受害者之间的连接。为此,开发了一种多级异常检测和识别机制,可以在检测到攻击时精确定位受害者。随后,虚拟化网络功能指示边缘路由器将发往受害者的所有流量转发到OpenFlow交换机,充当中间框,该中间盒能够过滤OpenFlow控制器标识的恶意流量,同时保留良性流。所提出的体系结构是根据包含真实DDoS攻击痕迹和来自我们大学校园网络的正常背景流量的数据集的组合来实施和评估的。我们的分析表明,恶意源使用了清晰的Internet协议前缀群集;因此,我们实现了最长的通用前缀聚合算法,以实现提议的缓解过程的扩展,克服了由于OpenFlow设备的硬件限制而带来的限制。我们的分析验证了所提出的模块化和可扩展架构可以有效地识别DDoS攻击受害者并过滤恶意流量,而不会耗尽系统和网络资源。版权所有(c)2015 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号