Elsevier

Computers & Security

Volume 110, November 2021, 102423
Computers & Security

A comprehensive survey of DDoS defense solutions in SDN: Taxonomy, research challenges, and future directions

https://doi.org/10.1016/j.cose.2021.102423Get rights and content

Highlights

  • Identified high quality research articles in the field of SDN-aimed DDoS attacks using a systematic literature review protocol.

  • Revealed vulnerable points exploited by the attacker to launch DDoS attacks on SDN architecture so that root cause of the problem can be identified.

  • Presented the taxonomy of DDoS defense solutions that classified the reviewed articles based on the attack targets, DDoS defense approaches, testing environment, and traffic generation mechanism.

  • Performed critical analysis of existing literature based on attack targets and highlighted key research challenges in the SDN paradigm.

Abstract

The recent emergence of technologies such as Network Functions Virtualization (NFV), Intent based Networking, Internet of Things (IoT), 5G, and Cloud Computing have led to the rapid growth of networks. The inflexibility and vendor-specific nature of traditional network devices are unable to fulfill the requirements of modern data centers. Software-Defined Networking (SDN) has captured data center space due to its innovative features viz. vendor neutrality, programmability, and centralized management. However, SDN is also facing various security threats due to weaknesses in its inherent architecture. This article has attempted to identify various vulnerable points in the SDN framework and has classified the SDN-aimed DDoS attacks based on their impacts. This article presents a systematic literature review on various DDoS defense mechanisms to protect the control plane, data plane, and data-control plane communication channel. In this study, a well-defined methodology is used to select the high-quality research articles of DDoS defense mechanisms in the SDN framework. Among numerous articles published in the last few years, the authors have selected 75 articles with the highest impact factor and citation. Moreover, we present the taxonomy of DDoS defense solutions that classify the reviewed articles based on the attack targets, DDoS defense approaches, testing environment, and traffic generation mechanism. Finally, we identified the research gaps and highlighted various research challenges for future research. This study is intended to serve as a ready reference for the research community to develop more efficient and reliable DDoS defense solutions in the SDN networks.

Introduction

The rapid development of next-generation technologies explicit the need for reconfiguration of network policies and device up-gradation. The conventional networks are not able to fulfill these requirements due to their static architecture. In a conventional network, there is tight coupling between the control plane (Network Operating System), forwarding plane (hardware) and application plane in network devices such as load balancer, firewall, Intrusion Detection System(IDS), Intrusion Prevention System(IPS), as shown in Fig. 1. This property makes the dynamic management of network difficult because introducing new features and up-gradation of existing features requires manual reconfiguration of all the network devices (Kreutz et al., 2015). This is a very tedious and costly process. Moreover, these devices are vendor specific and the network administrator needs to configure all the devices separately. In addition to that, the cost of these network devices is too high. The major part of the cost is not due to the hardware but due to the software, which is called a network operating system.

SDN solves the above mentioned problems in the conventional networks by simplifying and logically centralized the network management (Braun, Menth, 2014, Nunes, Mendonca, Nguyen, Obraczka, Turletti, 2014). The most promising advantages of SDN are programmability, vendor neutrality, greater agility, centralized network supervision, and network automation. This produces many positive outcomes. Firstly, administrators can now manage multiple network devices from a logically centralized controller instead of configuring each device individually. Secondly, it allows easy separation between experimental and production network traffic, ensuing that both does not affect each other. Due to this, researchers can experiment with new ideas on a production network and achieve accurate results. Finally, SDN is inexpensive as compared to the traditional network for many reasons. In SDN, single centralized controller can manage all network devices while in traditional network, administrator need to configure each device individually. This reduces deployment time and management expenses in SDN. In addition, it also fixes the problem of the shortage of human resources because one person can manage all network devices using centralized controller. Moreover, SDN devices are cheaper as compared to proprietary and vendor specific devices as SDN have an open-source network operating system. It is the revolutionary technology that makes the network dynamic and programmable to meet the requirements of modern data centers. SDN came into existence at Stanford University in the early 2000s. Due to its programmable and flexible nature, it is one of the most adopted technologies by both academia and industry.

According to the report of MarketsandMarkets Analysis, the SDN market could grow to USD 28.9 billion in 2023 from USD 8.8 billion in 2018. It represents 26.8% Compound Annual Growth Rate (CAGR) during the forecast period (MARKETSANDMARKETS, 2019). The major growth factor for the market is the requirement of an advanced network management system to handle the increasing network traffic and complexities. Moreover, rising demands for cloud solutions and intent-based networking have a positive impact on the overall market growth of SDN (RESEARCHANDMARKES, 2019). However, with the speedy adoption of the SDN architecture, several security threats are also introduced to interrupt its regular working. SDN is vulnerable to the Distributed Denial of Service Attack (DDoS) as it is easily targeted by the attackers due to the centralized control plane and dumb forwarding devices in the data plane (ROCHAK SWAMI, MAYANK DAVE, 2019). The main purpose of the DDoS attack is to consume the memory, processing, and bandwidth resources of the SDN components which ultimately lead to network performance degradation.

With the speedy growth in internet traffic, there is a significant increase in both the quality and quantity of DDoS attacks. For the last few months, the personal and professional life of people has become more dependent on the internet due to COVID-19. Now almost everybody is using internet for studying, shopping, working from home, entertainment etc. This is a unique phenomena since the inception of the internet. As per the Kaspersky’s report (Oleg Kupreev, 2020), the DDoS attacks in Q1 2020 have doubled as compared to Q4 2019, and have increased by 80% compared to Q1 2019. Since most of the telecommunication companies (AT&T, Verizon Communications, Deutsche Telekom), cloud providers (Google, Amazon AWS, Microsoft Azure) social media platforms (Facebook, Twitter) have started using the SDN technology in their data centers, its security has become a key area of research.

After a extensive review of the existing literature, a few studies have been found which focus on DDoS defense mechanism in SDN. Bawany et al. (2017) exploited the characteristics of SDN to defend against DDoS attacks in a conventional network. One another related study Neelam Dayal, Prasenjit Maity, Shashank Srivastava (0000) identified various security threats on different layers in the SDN framework. Joëlle and Park (2018) highlighted various DDoS defense solutions in SDN framework. Imran et al. (2019c) classified the DDoS defense mechanisms based on the attack detection methodology. Swami and Dave (ROCHAK SWAMI, MAYANK DAVE, 2019) presented the detailed study of DDoS attacks in the SDN. They analysed the conflicting connection between DDoS attacks and SDN. On the one hand, SDN is used to defend against DDoS attacks in traditional networks due to its features of centralized traffic monitoring, dynamic updating of flow rules, and network programmability. The centralized controller keeps the complete information of a network; therefore, it can monitor the network traffic in a more efficient way than the conventional networks. In addition, when a controller identifies any abnormal traffic in the network, defense algorithm configured on a control plane insert rules into SDN switches to drop the attack traffic. On the other hand, SDN is itself suffering from DDoS attacks due to the centralized controller and dumb switches in the data plane. The centralized SDN controller becomes the primary target of attackers because they can downgrade the whole network by overloading the control plane. Besides, due to the lack of intelligence in the forwarding devices, they need to send each new packet to the controller for decision making. It exhausts the memory, processing and network resources of the controller. To make it worse, limited memory available in the forwarding devices makes it vulnerable to DDoS attacks.

Dong et al. (2019) presented the DDoS attacks in the SDN and the cloud environment. Singh and Bhandari (2020) presented the taxonomy of new flow based SDN-aimed DDoS attacks and explored various defense solutions to mitigate these attacks. The latest survey paper (Singh and Behal, 2020) classified the DDoS defense solutions based on the type of detection mechanism. However, the existing survey papers do not follow the systematic review process; therefore such studies fail to provide the in-depth coverage of available literature. Table 1 shows the comparison of proposed study with the existing survey papers in recent years.

The proposed study is different from other related studies as it follows a well-defined methodology and is more focused. An attempt is made to follow a comprehensive approach in the field of DDoS defense in the SDN framework. The traditional review process considered only the part of available literature with the possibility of omitting some high quality research articles. In contrast to traditional review process, a Systematic Literature Review (SLR) provides an extensive coverage of the work related to the specific problem statement. A well-defined search strategy in the SLR, help to reduce the bias related to the final selection of research articles. The first step of SLR is to define the search strategy to increase the probability of finding related research studies. This follows a study selection process in which only those research articles were selected which can answer the defined research questions. At this stage, irrelevant studies are eliminated based on the analysis of title, abstract, and full text. Furthermore, the quality assessment check is performed to extract high quality research articles. The final list of research articles represents the current state-of-the-art research in the specified area. Moreover, the in-depth analysis of these articles helps us to identify the research gaps which provide the future research directions for further analysis. Below are some of the key benefits of SLR over the traditional review process:

  • Well-defined methodology eliminates bias against selection of research articles.

  • Comprehensive search strategy.

  • Extensive coverage of the literature available on a specific problem statement.

  • Digital libraries, websites, and other sources of included research articles are listed.

  • Well-defined inclusion and exclusion criteria.

The systematic review process is quite popular in the area of medicine, educational research, sociology, etc. In computer science, it is widely used in software engineering (Kitchenham, Pretorius, Budgen, Brereton, Turner, Niazi, Linkman, 2010, Tahir, MacDonell, 2012). A limited number of such studies exists in the area of cloud computing (Patel et al., 2013) and traditional networking (Singh et al., 2016). As far as we know, this survey is the first of its kind in the context of SDN security. The main contributions of the paper are:

  • Identified high quality research articles in the field of SDN-aimed DDoS attacks using a systematic literature review protocol.

  • Revealed vulnerable points exploited by the attacker to launch DDoS attacks on SDN architecture so that root cause of the problem can be identified.

  • Presented the taxonomy of DDoS defense solutions that classified the reviewed articles based on the attack targets, DDoS defense approaches, testing environment, and traffic generation mechanism.

  • Performed critical analysis of existing literature based on attack targets and highlighted key research challenges in the SDN paradigm.

The outlines of the paper are: Section 2 explains the steps involved in the systematic review process. Section 3 provides a brief overview of the SDN framework. This section also discusses various vulnerable points for DDoS attacks in SDN framework. Section 4 critically analyzes the various DDoS defense mechanisms to protect the components of the SDN framework. Section 5 identifies various research gaps in the reviewed research studies. Section 6 discusses different research challenges in the SDN environment and Section 7 concludes the paper.

Section snippets

Survey protocol

The purpose of Systematic Literature Review (SLR) is to identify and critically reviewing existing studies that are related to particular research problem using a well-defined search strategy. This work emphasizes on various DDoS defense solutions in the SDN, published from 2015 to June, 2021. The result of SLR is a set of research articles which are categorized based on the attack targets, DDoS defense approaches, testing environment, and traffic generation mechanism. The outcome of this

SDN architecture

SDN is a promising architecture that separates the control functionality from the forwarding hardware and provides flexibility and programmability in todays data center (Jarraya et al., 2014). The SDN is a three layer architecture which consists of control plane (controller), data plane (forwarding plane), and application plane (management plane), as shown in Fig. 4. The data plane contains one or more switches that forward the packets. Most of the switches available in the market are based on

DDoS defense solutions in SDN

In this section, the authors critically reviewed the final set of 75 studies that are obtained from Section 2. The taxonomy of DDoS defense solutions is shown in Fig. 9. In the taxonomy, the reviewed articles were classified based on the attack targets, DDoS defense approaches, testing environments, and traffic generation mechanism. Here, the research articles were classified based on the attack targets in SDN. In the final set of articles, 44 studies provide the DDoS defense solutions for

Analysis of literature and research gaps

After in-depth analysis of DDoS defense solutions, the authors have classified the reviewed articles based on the DDoS defense taxonomy. Tables 9–12 show the classification of reviewed articles based on the attack targets, DDoS defense approaches, testing environment, and traffic generation respectively. Based on the outcomes of these tables, the following research gaps have been identified.

  • After the in-depth analysis of DDoS defense solutions, it has been found out that, majority of the

Integration of SDN with traditional network

The centralized and programmable architecture of SDN makes network management and traffic monitoring more reliable and efficient. In spite of these benefits, organizations are afraid to deploy the pure SDN due to its financial, technical, and business challenges (Sinha et al., 2017). The deployment of the pure SDN network requires replacing all traditional switches with SDN enables switches, which incurs a cost. Therefore, partial deployment of SDN saves cost by placing SDN switches along with

Conclusion

SDN separates the control logic from forwarding hardware that makes this network more reliable and flexible. The uses of open-source network operating system have reduced the cost of network devices. Moreover, traffic monitoring and network management has become easier due to its logically centralized architecture. In spite of the immense advantages of SDN in contrast to the conventional network, organizations are afraid to deploy the pure SDN network due to the various security issues and

Declaration of Competing Interest

None.

Sukhveer Kaur received the B.Tech degree from Punjabi University Patiala and M.Tech degree from Punjab Technical University Jalandhar in Computer Science Engineering. She is currently pursuing her PH.D in Information Technology from UIET, Panjab University Chandigarh. Her research interest is on Software-Defined Networking and Cloud Computing. She has published 20 papers in International & National Conferences. She has got 4 years teaching experience. She is UGC-JRF qualified.

References (174)

  • R.F. Fouladi et al.

    A DDoS attack detection and defense scheme using time-series analysis for SDN

    J. Inf. Secur. Appl.

    (2020)
  • M. Imran et al.

    Toward an optimal solution against denial of service attacks in software defined networks

    Future Gener. Comput. Syst.

    (2019)
  • M. Jammal et al.

    Software defined networking: State of the art and research challenges

    Comput. Netw.

    (2014)
  • M. Karakus et al.

    A survey: control plane scalability issues and approaches in software-defined networking (SDN)

    Comput. Netw.

    (2017)
  • B. Kitchenham et al.

    Systematic literature reviews in software engineering–a tertiary study

    Inf. Softw. Technol.

    (2010)
  • P. Krishnan et al.

    Varman: Multi-plane security framework for software defined networks

    Comput. Commun.

    (2019)
  • W. Li et al.

    A survey on openflow-based software defined networks: Security challenges and countermeasures

    J. Netw. Comput. Appl.

    (2016)
  • AWS, 2020. Shield: threat landscape report-Q1 2020....
  • I.H. Abdulqadder et al.

    Validating user flows to protect software defined network environments

    Secur. Commun. Netw.

    (2018)
  • B. Agborubere et al.

    OpenFlow communications and TLS security in software-defined networks

    Proceedings of the 2017 IEEE International Conference on Internet of Things, IEEE Green Computing and Communications, IEEE Cyber, Physical and Social Computing, IEEE Smart Data, iThings-GreenCom-CPSCom-SmartData 2017

    (2018)
  • S. Ahmad et al.

    Scalability, consistency, reliability and security in SDN controllers: a survey of diverse SDN controllers

    J. Netw. Syst. Manag.

    (2021)
  • M. Ambrosin et al.

    LineSwitch: tackling control plane saturation attacks in software-defined networking

    IEEE/ACM Trans. Netw.

    (2017)
  • R. Amin et al.

    Hybrid SDN networks: a survey of existing approaches

    IEEE Commun. Surv. Tutor.

    (2018)
  • M. Antikainen et al.

    Spook in your network: attacking an SDN with a compromised openflow switch

    Proceedings of the Nordic Conference on Secure IT Systems

    (2014)
  • Badotra, S., Panda, S. N., 2019. Snort based early DDoS detection system using opendaylight and open networking...
  • C. Banse et al.

    A secure northbound interface for SDN applications

    Proceedings of the IEEE Trustcom/BigDataSE/ISPA

    (2015)
  • Barbaschow, A.,. Melbourne IT confirms DDoS attack behind DNS outage....
  • N.Z. Bawany et al.

    DDoS attack detection and mitigation using SDN: methods, practices, and solutions

    Arab. J. Sci. Eng.

    (2017)
  • P. Berde et al.

    ONOS: towards an open, distributed SDN OS

    Proceedings of the ACM SIGCOMM 2014 Workshop on Hot Topics in Software Defined Networking HotSDN 2014

    (2014)
  • P. Berde et al.

    ONOS: towards an open, distributed SDN OS

    Proceedings of the Third Workshop on Hot Topics in Software Defined Networking

    (2014)
  • A.N. Bessani

    From byzantine fault tolerance to intrusion tolerance (a position paper)

    Proceedings of the IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W)

    (2011)
  • S. Bhatia et al.

    Distributed denial of service attacks and defense mechanisms: current landscape and future directions

    Versatile Cybersecurity

    (2018)
  • P.D. Bhole et al.

    Distributed hierarchical control plane of software defined networking

    Proceedings of the 2015 International Conference on Computational Intelligence and Communication Networks, CICN 2015

    (2016)
  • I.Z. Bholebawa et al.

    Performance analysis of SDN/openflow controllers: Pox versus floodlight

    Wirel. Pers. Commun.

    (2018)
  • J. Boite et al.

    Statesec: stateful monitoring for DDoS protection in software defined networks

    Proceedings of the IEEE Conference on Network Softwarization (NetSoft)

    (2017)
  • W. Braun et al.

    Software-defined networking using openflow: protocols, applications and architectural design choices

    Future Internet

    (2014)
  • Calyptix,. DDOS attack on US-based wired telecommunication carrier....
  • X. Chen et al.

    A collaborative intrusion detection system against DDoS for SDN

    IEICE Trans. Inf. Syst.

    (2016)
  • J.C.C. Chica et al.

    Security in SDN: a comprehensive survey

    J. Netw. Comput. Appl.

    (2020)
  • Cluley, G.,. UK national lottery knocked offline by DDoS attack....
  • M. Conti et al.

    Lightweight solutions to counter DDoS attacks in software defined networking

    Wirel. Netw.

    (2019)
  • DDOS, DDOS attack on BBC websites.2019https://www.bbc.com/news/technology-35204915Accessed:...
  • V.T. Dang et al.

    SDN-based SYN proxya solution to enhance performance of attack mitigation under TCP SYN flood

    Comput. J.

    (2019)
  • A. Danping et al.

    Threat analysis for the SDN architecture

    Tech. Recomm.

    (2016)
  • A.B. Dehkordi et al.

    The DDoS attacks detection through machine learning and statistical methods in SDN

    J. Supercomput.

    (2020)
  • Denazis, S., Haleplidis, E., Salim, J. H., Koufopavlou, O., Meyer, D., Pentikousis, K., 2015. Software-defined...
  • S. Dong et al.

    A Survey on Distributed Denial of Service (DDoS) attacks in SDN and cloud computing environments

    IEEE Access

    (2019)
  • S. Dong et al.

    DDoS attack detection method based on improved KNN with the degree of DDoS attack in softwaredefined networks

    IEEE Access

    (2019)
  • R. Durner et al.

    Detecting and mitigating denial of service attacks against the data plane in software defined networks

    Proceedings of the IEEE Conference on Network Softwarization: Softwarization Sustaining a Hyper-Connected World: en Route to 5G, NetSoft 2017

    (2017)
  • D. Erickson

    The beacon openflow controller

    Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking

    (2013)
  • Cited by (18)

    View all citing articles on Scopus

    Sukhveer Kaur received the B.Tech degree from Punjabi University Patiala and M.Tech degree from Punjab Technical University Jalandhar in Computer Science Engineering. She is currently pursuing her PH.D in Information Technology from UIET, Panjab University Chandigarh. Her research interest is on Software-Defined Networking and Cloud Computing. She has published 20 papers in International & National Conferences. She has got 4 years teaching experience. She is UGC-JRF qualified.

    Dr. Krishan Kumar is currently Professor in Department of Information Technology, University Institute of Engineering and Technology, Panjab University, Chandigarh. He has done B. Tech. Computer Science & Engineering from National Institute of Technology, Hamirpur in 1995. He completed his Master of Software Systems from Birla Institute of Technology & Sciences, Pilani in 2001. He finished his regular Ph.D. from Indian Institute of Technology, Roorkee in February, 2008. He has more than 20 years of teaching, research and administrative experience. His general research interests are in the areas of Network Security and Computer Networks. Specific research interests include Intrusion Detection, Protection from Internet Attacks, Web performance, Network architecture/protocols, and Network measurement/ modelling. He has published 2 national and 2 International Books in the field of Computer Science & Network security. He has published more than 120 papers in national / International peer reviewed / Indexed / impact factor Journals and IEEE, ACM and Springer proceedings. His publications are well cited by eminent researchers in the field.

    Naveen Aggarwal is actively working in the area of Computer Vision and Data Mining. He did his PhD from GGSIPU, Delhi in year 2011 and M.Tech. in Computer Science and Engineering from IIT, Kharagpur. Dr. Aggarwal has been awarded with Faculty Innovation award from the Infosys foundations. Different Effort Estimation Model developed by Dr. Aggarwal are appreciated and being used by Axede Corporation, USA and Birlasoft Corp. India. He has over 18 publications in International journals and 55 publications in international and national conferences. He has joined PU as Asstt. professor in Computer Science and Engineering at UIET in February 2005. Earlier, he has worked for three years from 2002 to 2005 in Punjab Engineering College, Chandigarh.

    Dr Gurdeep Singh is currently working in UIET, Panjab University Chandigarh, as Professor in Management. He did his BE in Mechanical Engineering from Govt Engineering College Jabalpur and his MBA and Ph.D from Punjabi University Patiala. Dr Gurdeep has worked in the Corporate sector for seven years and has 23 years of teaching experience. He has also taught in IIM Shillong. He has published various papers in the field of Management and has won first prize in International conference in IIM Raipur and IIM Shillong. Dr Gurdeep is an Oracle Certified Associate (Oracle 9i). His interest areas are Data Warehousing, Data Mining and Business Games.

    View full text