دانلود مقاله ISI انگلیسی شماره 76915
ترجمه فارسی عنوان مقاله

ترکیب OpenFlow و sFlow برای تشخیص ناهنجاری مقیاس پذیر و موثر و مکانیسم کاهش در محیط های SDN

عنوان انگلیسی
Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
کد مقاله سال انتشار تعداد صفحات مقاله انگلیسی
76915 2014 15 صفحه PDF
منبع

Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)

Journal : Computer Networks, Volume 62, 7 April 2014, Pages 122–136

ترجمه کلمات کلیدی
شبکه سازی تعریف شده نرم افزار ؛ SDN - OpenFlow؛ sFlow؛ تشخیص ناهنجاری؛ کاهش خطرات حمله
کلمات کلیدی انگلیسی
Software Defined Networking; SDN; OpenFlow; sFlow; Anomaly detection; Attack mitigation

چکیده انگلیسی

Software Defined Networks (SDNs) based on the OpenFlow (OF) protocol export control-plane programmability of switched substrates. As a result, rich functionality in traffic management, load balancing, routing, firewall configuration, etc. that may pertain to specific flows they control, may be easily developed. In this paper we extend these functionalities with an efficient and scalable mechanism for performing anomaly detection and mitigation in SDN architectures. Flow statistics may reveal anomalies triggered by large scale malicious events (typically massive Distributed Denial of Service attacks) and subsequently assist networked resource owners/operators to raise mitigation policies against these threats. First, we demonstrate that OF statistics collection and processing overloads the centralized control plane, introducing scalability issues. Second, we propose a modular architecture for the separation of the data collection process from the SDN control plane with the employment of sFlow monitoring data. We then report experimental results that compare its performance against native OF approaches that use standard flow table statistics. Both alternatives are evaluated using an entropy-based method on high volume real network traffic data collected from a university campus network. The packet traces were fed to hardware and software OF devices in order to assess flow-based data-gathering and related anomaly detection options. We subsequently present experimental results that demonstrate the effectiveness of the proposed sFlow-based mechanism compared to the native OF approach, in terms of overhead imposed on usage of system resources. Finally, we conclude by demonstrating that once a network anomaly is detected and identified, the OF protocol can effectively mitigate it via flow table modifications.