GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2022
DOI: 10.1109/globecom48099.2022.10001437
|View full text |Cite
|
Sign up to set email alerts
|

TableGuard: A Novel Security Mechanism Against Flow Table Overflow Attacks in SDN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 19 publications
0
0
0
Order By: Relevance
“…Xu et al [21] proposed a defense model that uses the concept of degree to locate vulnerable switches and deploys token bucket to limit the strength of overflow attacks. Kong et al [55] designed TableGuard, which uses the proactive flow rule number as the detection metric and applies a statistical approach to help filter malicious flows. However, because these methods mitigate or locate overflow attacks based on flow entry consumption rather than attack flow features, they may fail to defend against distributed attacks that exhibit subtle patterns and evade detection by consuming flow entries within the normal range.…”
Section: A Table Management Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Xu et al [21] proposed a defense model that uses the concept of degree to locate vulnerable switches and deploys token bucket to limit the strength of overflow attacks. Kong et al [55] designed TableGuard, which uses the proactive flow rule number as the detection metric and applies a statistical approach to help filter malicious flows. However, because these methods mitigate or locate overflow attacks based on flow entry consumption rather than attack flow features, they may fail to defend against distributed attacks that exhibit subtle patterns and evade detection by consuming flow entries within the normal range.…”
Section: A Table Management Methodsmentioning
confidence: 99%
“…To induce the PPS overflow, we combine 100 background flows and 110 POA flows, leading to the eviction of 10 entries each time. We compare the proposed eviction algorithm with FIFO, LFU, SIFT [38], SAIA [25] and TableGuard [55] in terms of the evction of attack flows. To investigate the impact of attack traffic, we set the packet interval at 1s, 0.1s, 0.01s, and a 1:1 mixture of both.…”
Section: B Evaluation Of Flow Entry Eviction Algorithmmentioning
confidence: 99%
See 1 more Smart Citation