Elsevier

Computer Networks

Volume 81, 22 April 2015, Pages 308-319
Computer Networks

DDoS attack protection in the era of cloud computing and Software-Defined Networking

https://doi.org/10.1016/j.comnet.2015.02.026Get rights and content

Abstract

Cloud computing has become the real trend of enterprise IT service model that offers cost-effective and scalable processing. Meanwhile, Software-Defined Networking (SDN) is gaining popularity in enterprise networks for flexibility in network management service and reduced operational cost. There seems a trend for the two technologies to go hand-in-hand in providing an enterprise’s IT services. However, the new challenges brought by the marriage of cloud computing and SDN, particularly the implications on enterprise network security, have not been well understood. This paper sets to address this important problem.

We start by examining the security impact, in particular, the impact on DDoS attack defense mechanisms, in an enterprise network where both technologies are adopted. We find that SDN technology can actually help enterprises to defend against DDoS attacks if the defense architecture is designed properly. To that end, we propose a DDoS attack mitigation architecture that integrates a highly programmable network monitoring to enable attack detection and a flexible control structure to allow fast and specific attack reaction. To cope with the new architecture, we propose a graphic model based attack detection system that can deal with the dataset shift problem. The simulation results show that our architecture can effectively and efficiently address the security challenges brought by the new network paradigm and our attack detection system can effectively report various attacks using real-world network traffic.

Introduction

As cloud computing provides on-demand, elastic, and accessible computing services, more and more enterprises begin to embrace this paradigm shift by moving their database and applications into the cloud. At the same time, another epochal concept of the Internet architecture comes to forefront, i.e., Software-Defined Networking (SDN). While cloud computing facilitates the management of computation and storage resources, SDN is proposed to address another laborious issue hindering the evolvement of today’s Internet, i.e., the complicated network management. Besides the fact that SDN has been proposed as a candidate of the next generation Internet architecture, companies like Google have already adopted SDN in their internal data centers. Thus, the arrival of the era when cloud computing and SDN go hand-in-hand in providing enterprise IT services is looming on the horizon.

Besides all the widely perceived benefits, the marriage between cloud computing and SDN may also introduce potential risks, especially on network security. Among all the network security problems, we first take a look at Denial-of-Service (DoS) attack. A DoS attack and its distributed version, Distributed Denial-of-Service (DDoS) attack, attempt to make a service unavailable to its intended users by draining the system or network resource. Although network security experts have been devoting great efforts for decades to address this issue, DDoS attacks continue to grow in frequency and have more impact recently. Existing DDoS attack defense solutions (to list a few [1], [2], [3], [4]) assume a fully controlled network by the network administrators of enterprises. Therefore, the network administrators could place certain hardware pieces in the network to detect or mitigate DDoS attacks. However, in the new network paradigm of cloud computing and SDN, these assumptions no longer stand. Other researchers [5], [6] focus on exploiting the benefits of cloud or SDN to defend DDoS attacks. But their target victims still reside in the traditional network environment, which makes their solutions unsuitable for the new network paradigm. To the best of our knowledge, little effort in research community has been made to look into the potential problems or opportunities to defend DDoS attacks in the new enterprise network environment that adopts both cloud computing and SDN.

In this paper, we first analyze the impact of the combination of cloud computing and SDN on DDoS attack defense. We discuss the potential issues under this new paradigm as well as opportunities of defending DDoS attacks. Based on our analysis, we claim that if designed properly, SDN can actually be exploited to address the security challenges brought by cloud computing and the DDoS attack defense can be made more effective and efficient in the era of cloud computing and SDN. We then propose a new DDoS attack mitigation architecture using software-defined networking (abbreviated as DaMask) to demonstrate and substantiate our findings. DaMask contains two modules: an anomaly-based attack detection module DaMask-D, and an attack mitigation module DaMask-M. We build our DaMask-D module based on a graphical probabilistic inference model. Compared with existing graphical model based detection schemes [7], [8], [9] which only have model training and testing phases, our DaMask-D features an additional model updating phase to address the dataset shift problem in the real world. The dataset shift refers to the fact that the network traffic conditions when we build the model differ from the actual traffic conditions when we use the model. This fact varies from the common assumption used in the existing works where the attack patterns learned from the training data are assumed to be no different from the attack patterns in the future. Our contributions can be summarized as follows:

  • 1.

    To the best of our knowledge, we are among the first to bring the attention of the impact on DDoS attack defense of the new network paradigm, which is a combination of cloud computing and SDN. Based on our analysis, we find that the marriage of SDN and cloud computing provides a unique opportunity to enhance the DDoS attack defense in an enterprise network environment.

  • 2.

    To substantiate our claim, we propose DaMask, a highly scalable and flexible DDoS attack mitigation architecture that exploits SDN technique to address the new security challenges brought by cloud computing, including the extended defense perimeter and the dynamic network topological changes.

  • 3.

    Our DaMask-D module in the DaMask architecture features an additional model update phase, compared to existing graphical-model based network attack detection schemes, which successfully handles the dataset shift problem in the real world and achieves a higher detection rate.

  • 4.

    At last, we implement our proposed structure and performed a simulation based evaluation using the Amazon EC2 cloud service. The results show that our scheme works well under the new network paradigm and incurs limited computation and communication overhead, which is a crucial requirement of DDoS protection in cloud computing and SDN.

Compared with our preliminary NPSec work [10] which presented the DaMask framework, the journal version completes the DDoS attack defense solution by including an attack detection system in Section 4. The attack detection system which is based on the graphical model detection is not only tailored to accommodate the unique requirement of DDoS attack defending in cloud computing, but also manages to address the data shift problem which decreases the detection performance in most machine learning based solutions. We also add performance evaluation results of the detection module in Section 5.3 including the performance of detecting attacks and the ability of adapting the data shift issue. We organize the remainder of the paper as follows. We analyze the impact of cloud computing and SDN on DDoS attack defense in Section 2. Based on our analysis, we formulate the problem and present our DaMask architecture design in Section 3. The technical details of the DaMask-D module is discussed in Section 4. Section 5 presents the simulation setting and the results. Related work are reviewed and compared with our work in Section 6. We draw concluding remarks in Section 7.

Section snippets

Analysis

In this section, we briefly review cloud computing and SDN. Then we analyze the impact of the combined technologies on the network protection against DDoS attacks.

Design overview

Based on the analysis in Section 2, we need to incorporate the DDoS attack defense into cloud computing and SDN. To successfully address the DDoS attack defense challenges in the new network environment, we must achieve the following objectives. First of all, the scheme must be effective. The design should be able to protect the services in both private and public clouds. It also should be able to adapt to the network topology changes and mitigate DDoS attacks efficiently. Secondly, the scheme

Graphical model based detection system

In Section 3, we state that an anomaly-based network attack detection system will fit our DaMask framework well. In this section, we propose our attack detection system which is built on probabilistic inference graphical model. Although other existing attack detection systems are compilable with DaMask, our detection model advances with two features: (1) automatic feature selection; (2) efficient model update. By updating our model efficiently, we are able to address the dataset shift problem

DaMask evaluation

We carried out a thorough performance evaluation of the DaMask architecture under various scenarios. We run detection accuracy test on our attack detection system using real world network traffic The evaluation results are reported in this section.

Related work

Defending DDoS attack in traditional network has been studied for several decades. The surveys [21], [22] have included most of these work. Although our objective shares the similarity with them which is to defend DDoS attacks, our network environment which involves cloud computing and SDN is quite different from theirs. SDN technique has been used to address various network security. Jafarian et al. [23] proposed a random host mutation scheme using OpenFlow to achieve transparent moving target

Conclusion

Cloud computing is already here to stay and SDN is gaining increased popularity. With both of the technology emerging as the future enterprise IT solutions, it is worthwhile to look at the implications of the combination of the two, particularly on the enterprise network security. In this paper, we analyze the impact of cloud computing and SDN on DDoS attack defense. Based on our analysis, we identify the challenges and the benefits raised by these new technologies. We claim that with careful

Acknowledgment

We gratefully acknowledge funding support for this research from U.S. National Science Foundation under Grant CNS-1217889.

Bing Wang received his BS and ME degree in Computer Science from Fudan University and Shanghai Jiao-Tong University, respectively. He is currently working towards Ph.D. degree in Computer Science at Virginia Tech. His research interests are in the areas of applied cryptography and network security, with current focus on secure data service in cloud computing and next generation Internet. He is a student member of the IEEE.

References (28)

  • D. Geneiatakis, G. Portokalidis, A.D. Keromytis, A multilayer overlay network architecture for enhancing IP services...
  • X. Liu et al.

    To filter or to authorize: network-layer DoS defense against multimillion-node botnets

  • P. Mittal, D. Kim, Y.C. Hu, M. Caesar, Mirage: Towards Deployable DDoS Defense for Web Applications, arXiv preprint,...
  • W.G. Morein et al.

    Using graphic turing tests to counter automated DDoS attacks against web servers

  • H. Wang, L. Xu, G. Gu, Of-guard: A DoS Attack Prevention Extension in Software-defined Networks, The Open Network...
  • D. Kreutz et al.

    Towards secure and dependable software-defined networks

  • C. Kruegel et al.

    Bayesian event classification for intrusion detection

  • K.K. Gupta et al.

    Layered approach using conditional random fields for intrusion detection

    IEEE Trans. Dependable Sec. Comput.

    (2010)
  • J. Xu et al.

    Intrusion detection using continuous time bayesian networks

    J. Artif. Intell. Res.

    (2010)
  • B. Wang et al.

    DDoS attack protection in the era of cloud computing and software-defined networking

  • C. Clark, K. Fraser, S. Hand, J.G. Hansen, E. Jul, C. Limpach, I. Pratt, A. Warfield, Live migration of virtual...
  • N. McKeown et al.

    Openflow: enabling innovation in campus networks

    ACM SIGCOMM Comput. Commun. Rev.

    (2008)
  • D. Kollar et al.

    Probabilistic Graphical Models: Principles and Techniques

    (2009)
  • C. Chow et al.

    Approximating discrete probability distributions with dependence trees

    IEEE Trans. Inform. Theory

    (1968)
  • Cited by (325)

    View all citing articles on Scopus

    Bing Wang received his BS and ME degree in Computer Science from Fudan University and Shanghai Jiao-Tong University, respectively. He is currently working towards Ph.D. degree in Computer Science at Virginia Tech. His research interests are in the areas of applied cryptography and network security, with current focus on secure data service in cloud computing and next generation Internet. He is a student member of the IEEE.

    Yao Zheng received the BS degree in microelectronic from Fudan University and the MS degree in electrical engineering from Worcester Polytechnic Institute. He is currently working toward the PhD student at Virginia Tech. His current interest are in android application security and linux kernel development. He is a student member of the IEEE.

    Wenjing Lou is a Professor at Virginia Polytechnic Institute and State University. Prior to joining Virginia Tech in 2011, she was a faculty member at Worcester Poly-technic Institute from 2003 to 2011. She received her Ph.D. in Electrical and Computer Engineering at the University of Florida in 2003. Her current research interests are in cyber security, with emphases on wireless network security and data security and privacy in cloud computing. She was a recipient of the U.S. National Science Foundation CAREER award in 2008.

    Y. Thomas Hou is a Professor in the Bradley Department of Electrical and Computer Engineering, Virginia Tech. His research interest-s are cross-layer optimization for wireless networks. He is also interested in wireless security. Professor Hou is currently serving as an Area Editor of IEEE Transactions on Wireless Communications, an Associate Editor of IEEE Transactions on Mobile Computing, an Editor of IEEE Journal on Selected Areas in Communications, and an Editor of IEEE Wireless Communications. He is the Chair of IEEE INFOCOM Steering Committee.

    View full text