Skip to content

SIFT defense modification for SDN controllers for Slow-TCAM attacks mitigation

License

Notifications You must be signed in to change notification settings

tuliopascoal/sift-defense

Repository files navigation

sift-defense

SIFT defense approach for SDN controllers for Slow-TCAM attacks mitigation.

In order to apply SIFT, you need to add SIFT-related code snippets to your current controller. Basically, it will keep your controller monitoring for TABLE_FULL OpenFlow messages and taking actions against malicious flow entry rules.

For more details and understanding of SIFT and Slow-TCAM attacks, please check my paper called "Slow-TCAM Exhaustion DDoS Attack" in IFIP SEC 2017 [1]:

[1] Pascoal, T. A., Dantas, Y. G., Fonseca, I. E., Nigam, V., 2017. "Slow TCAM Exhaustion DDoS Attack." In 32nd IFIP International Conference on ICT Systems Security and Privacy Protection, pp. 17-31. Springer, Cham, 2017.


Files:

  • sift_uniform.py: SIFT controller with selective strategy (uniform distribution);

  • sift_PPCount.py: SIFT controller with selective strategy based on "packet_count" of flow entry rules; (still under testing)

  • sift_PBCount.py: SIFT controller with selective strategy based on "byte_count" of flow entry rules; (still under testing)

  • cpu_mem_log.sh: shell script for CPU and memory monitoring consumption of SIFT controller;

  • active_count.sh: shell script for keep tracking of installed flow entry rules in TCAM;

  • wget_load: shell script for legitimate clients simulation;

  • client-renewable.py: python script for legitimate clients simulation;

  • clientport2.py: python script for legitimate clients simulation;

  • slowxtcamexhaustionport.py: python script for slow-tcam attack generation;

  • slow-saturationport.py python script for slow-saturation attack generation;

About

SIFT defense modification for SDN controllers for Slow-TCAM attacks mitigation

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published