Analysis and a Defense Method for Overflow Vulnerability of Flow Tables in Software Defined Networks

Yadong ZHOU,Kaiyue CHEN,Junyuan LENG,Chengchen HU
DOI: https://doi.org/10.7652/xjtuxb201710009
2017-01-01
Abstract:The capacity of flow tables of software defined network switches is very limited and thus there exists a serious problem of flow table overflow vulnerability.A routing algorithm based on packing optimization is proposed to solve the problem and the algorithm uses new characteristics of software defined networks.A method to defense overflow attacks of flow tables is also presented based on the proposed route aggregation algorithm.Firstly,the traditional algorithm of route aggregation based on radix tree is used to generate initial aggregated nodes of flow tables.Then,the nodes are divided into several different groups with flow table rules,and the new forwarding address for each group is then obtained based on the solution of a packing optimization problem.Finally,the flow table rules are aggregated again after modifying the forwarding addresses,so that the number of flow entries in flow tables of a switch is effectively reduced,and the effect of defensing overflow attack of flow tables is achieved.It is found from experimental results of the proposed defense method that the aggregation rate of flow tables is 54.9%,and is better than that of the classical algorithm based on the radix tree,and that the number of attack packets reaching the overflow attack increases 125.8%.The experimental results show that the proposed method significantly increases the difficulty to reach the flow table overflow attack,so that the problem of flow table overflow vulnerability is effectively alleviated,and the defense ability to related attacks is enhanced.
What problem does this paper attempt to address?