NFV-GUARD: Mitigating Flow Table-Overflow Attacks in SDN Using NFV

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Software Defined Networking (SDN) has recently drawn attention by changing the network control paradigm. SDN devices handle the network traffic based on entries stored in their flow table. However, due to the flow table's limited size, attacks such as DDoS can cause the table to overflow. Some of the current table overflow mitigation methods distribute flow entries to other network devices on the physical infrastructure, which might not be effective in small to medium-sized private networks. Therefore, this research proposes a method to mitigate table overflow attacks on SDN by dynamically filtering attackers using Network Function Virtualization (NFV). Preliminary results show that the proposed approach can effectively mitigate table overflow attacks without relying on network infrastructure.

Original languageEnglish
Title of host publicationProceedings of the 2021 IEEE Conference on Network Softwarization
Subtitle of host publicationAccelerating Network Softwarization in the Cognitive Age, NetSoft 2021
EditorsKohei Shiomoto, Young-Tak Kim, Christian Esteve Rothenberg, Barbara Martini, Eiji Oki, Baek-Young Choi, Noriaki Kamiyama, Stefano Secci
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages263-267
Number of pages5
ISBN (Electronic)9781665405225
DOIs
Publication statusPublished - 2021 Jun 28
Event7th IEEE International Conference on Network Softwarization, NetSoft 2021 - Virtual, Online
Duration: 2021 Jun 282021 Jul 2

Publication series

NameProceedings of the 2021 IEEE Conference on Network Softwarization: Accelerating Network Softwarization in the Cognitive Age, NetSoft 2021

Conference

Conference7th IEEE International Conference on Network Softwarization, NetSoft 2021
CityVirtual, Online
Period21/6/2821/7/2

Keywords

  • NFV
  • SDN
  • Table Overflow

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software
  • Control and Optimization
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'NFV-GUARD: Mitigating Flow Table-Overflow Attacks in SDN Using NFV'. Together they form a unique fingerprint.

Cite this