2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2016
DOI: 10.1109/ntms.2016.7792432
|View full text |Cite
|
Sign up to set email alerts
|

Amplified Distributed Denial of Service Attack in Software Defined Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Each handler can control up to a thousand agents. Now the new threat is something called Amplified Denial of Service (ADOS) [2]. And it's not a new threat as such, it's just a new common threat that's been theorized about for a while.…”
Section: Denial Of Servicementioning
confidence: 99%
“…Each handler can control up to a thousand agents. Now the new threat is something called Amplified Denial of Service (ADOS) [2]. And it's not a new threat as such, it's just a new common threat that's been theorized about for a while.…”
Section: Denial Of Servicementioning
confidence: 99%
“…If a packet triggers the table‐miss event, it will be buffered in the switch, and the OpenFlow request contains only some fraction of the packet header and a buffer ID. If the buffer is full, the entire packet will be sent to the controller, causing the congestion of the OpenFlow channel between the switch and the controller . As a result, a large number of packets pile up in the controller socket interface, and the service for normal users is damaged too. (3) Controller resource saturation.…”
Section: Preliminariesmentioning
confidence: 99%
“…Researchers have shown that the extensive communication between the data and control plane can potentially result in a bottleneck for the whole system, a situation that is exacerbated when a single controller manages a set of OpenFlow switches. Moreover, since the installation of rules on the switches is driven by the traffic generated from network users, an attacker can exploit this behavior to attack the control plane by flooding an OpenFlow switch with a large number of unique flows . Even worse, the control plane saturation attack can be performed through a variety of network protocols, including Transport Control Protocol (TCP), UDP ICMP, or IGMP , …”
Section: Second Dimension: Characteristics Provided By Sdn Controllermentioning
confidence: 99%