A Multi-Layered Defence Strategy against DDoS Attacks in SDN/NFV-Based 5G Mobile Networks
Abstract
:1. Introduction
- A three-layered framework is proposed to address two distinct and crucial problems in 5G networks with multiple controllers based on SDN/NFV. The issues include balancing the burden of switches in a multi-controller scenario and presenting an intrusion detection system. Generally, a three-layer architecture is considered an effective perimeter security measure for all communication networks because it provides a balanced approach to addressing security concerns at different network architecture levels. Through the employment of security at the application layer, control layer, and infrastructure layer, various types of security threats can be mitigated. They can effectively ensure confidentiality, integrity, and availability in SDN-enabled networks.
- The proposed framework comprises three layers: forwarding and data transport, management and control, and virtualisation. The management and control layer is divided into main (centralised) and distributed controllers. In the distributed controllers’ sub-layer, entropy detection is employed to classify incoming packets as normal or suspicious. The main controller then forwards the suspicious packets to the virtualisation layer for further processing using an SOM. This process results in the detection and mitigation of DDoS attacks.
- The static allocation of OpenFlow switches (OF-switches) and distributed controllers in SDN/NFV-based 5G networks featuring multiple controllers may overload some controllers and underuse others. This paper proposes an OF-switch relocation approach based on deep reinforcement learning to address this challenge.
2. Related Work
3. Materials and Methods
3.1. Markov Decision Process
3.1.1. Terminologies and Descriptions
State of the System
Action Set
Controller Burden
Controller Burden Ratio
Rate of Balancing Burden of Controller
Switch Relocation Cost
The Reward of the System
Best Approach
3.1.2. Deep Q-Network Model for SDN/NFV-Based 5G Networks
3.1.3. DDQN-Based Switch Relocation Approach
- The learning Q-network chooses relocation actions and renews the parameters of the model.
- The target Q-network computes the target value of the Q-function. Afterwards, the target Q-network is renewed occasionally with the parameters of the learning Q-network to boost the training process.
Algorithm 1: The DDQN-based OF-switch relocation approach with multiple controllers. |
Initialisations and General Info Inputs: The system graph , set of controllers (C), no. of iterations , set of actions (A), examination rate () for greedy algorithm, learning rate (), and attenuation coefficient () Output: OF-switch relocation action Initialisations: Initialising the memory, parameters of the target, and learning Q-networks Training stage: Obtain the state of the network and produce the state in a shape of a state matrix periodically Main Algorithm for do the following:
Online Phase:
|
3.2. DDoS Attack Detection and Mitigation
3.2.1. Traffic Collection in Forwarding Layer
3.2.2. Initial Anomaly Detection
- The main reason is the limitation in the number of new connections arriving for each 5G user. In SDN-based 5G networks, as soon as a connection is established, packets will not cross distributed controllers if there are no new requests.
- Another reason is the limitation in the number of OF-switches and 5G users that can be connected to each controller.
- The third reason is the computational complexity and the number of calculations performed in every window. Clearly, 50 values can be calculated much quicker than 100, and attack detection in a window with 50 packets can be conducted much faster.
- Lastly, to determine the appropriate window size, we analysed and tested the entropy for five different window sizes and measured the CPU and memory usage. According to Table 1, the memory usage does not change substantially. However, the CPU usage grows as the window size increases.
3.2.3. Virtualisation Layer
4. Proposed System
Evaluation Metrics for Detection Algorithm
- TPs refer to any packet that has been correctly identified as malicious by the switch and subsequently dropped.
- TNs refer to packets that have been correctly identified as benign by the switch and therefore forwarded through a port.
- FPs refer to packets that have been incorrectly identified as malicious and subsequently dropped.
- FNs refer to packets that have been incorrectly identified as benign and allowed to pass through the network instead of blocking them.
5. Performance Evaluation
5.1. Simulation Setup
5.2. Modelling Benign UE Traffic
5.3. Attack Simulation
5.4. Simulation Results
5.4.1. Burden Balancing
Rate of Controller Burden Balancing
Burden Ratio
Balancing Duration
5.4.2. DDoS Attack Detection and Mitigation
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Ayodele, B.; Buttigieg, V. SDN as a defence mechanism: A comprehensive survey. Int. J. Inf. Secur. 2024, 23, 141–185. [Google Scholar] [CrossRef]
- Khan, S. Detection of DoS and DDoS Attacks on 5G Network Slices Using Deep Learning Approach. Ph.D. Thesis, University of Regina, Regina, SK, Canada, 2023. [Google Scholar]
- Yungaicela-Naula, N.M.; Vargas-Rosales, C.; Pérez-Díaz, J.A. SDN/NFV-based framework for autonomous defense against slow-rate DDoS attacks by using reinforcement learning. Future Gener. Comput. Syst. 2023, 149, 637–649. [Google Scholar] [CrossRef]
- Shoaib, F.; Chow, Y.-W.; Vlahu-Gjorgievska, E.; Nguyen, C. Mitigating Timing Side-Channel Attacks in Software-Defined Networks: Detection and Response. Telecom 2023, 4, 877–900. [Google Scholar] [CrossRef]
- Wang, G.; Zhao, Y.; Huang, J.; Wang, W. The Controller Placement Problem in Software Defined Networking: A Survey. IEEE Netw. 2017, 31, 21–27. [Google Scholar] [CrossRef]
- Chen, M.; Ding, K.; Hao, J.; Hu, C.; Xie, G.; Xing, C.; Chen, B. LCMSC: A lightweight collaborative mechanism for SDN controllers. Comput. Netw. 2017, 121, 65–75. [Google Scholar] [CrossRef]
- Zhang, L.; Wang, Y.; Li, W.; Qiu, X.; Zhong, Q. A survivability-based backup approach for controllers in multi-controller SDN against failures. In Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium (APNOMS), Seoul, Korea, 27–29 September 2017; pp. 100–105. [Google Scholar]
- Sheibani, M.; Konur, S.; Awan, I. DDoS Attack Detection and Mitigation in Software-Defined Networking-Based 5G Mobile Networks with Multiple Controllers. In Proceedings of the 9th International Conference on Future Internet of Things and Cloud (FiCloud), Rome, Italy, 22–24 August 2022; pp. 32–39. [Google Scholar]
- Yazici, V.; Sunay, M.O.; Ercan, A.O. Controlling a Software-Defined Network via Distributed Controllers. arXiv 2014, arXiv:cs.NI/1401.7651. [Google Scholar]
- Krishnamurthy, A.; Chandrabose, S.P.; Gember-Jacobson, A. Pratyaastha: An efficient elastic distributed sdn control plane. In Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, Chicago, IL, USA, 22 August 2014; pp. 133–138. [Google Scholar]
- Dixit, A.A.; Hao, F.; Mukherjee, S.; Lakshman, T.V.; Kompella, R.R. ElastiCon; an elastic distributed SDN controller. In Proceedings of the 2014 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Marina del Rey, CA, USA, 20–21 October 2014; pp. 17–27. [Google Scholar]
- Koerner, M.; Kao, O. Multiple service load-balancing with OpenFlow. In Proceedings of the IEEE 13th International Conference on High-Performance Switching and Routing (HPSR), Belgrade, Serbia, 24–27 June 2012; pp. 210–214. [Google Scholar]
- Yao, H.; Qiu, C.; Zhao, C.; Shi, L. A Multicontroller Load Balancing Approach in Software-Defined Wireless Networks. Int. J. Distrib. Sens. Netw. 2015, 11, 4541–4559. [Google Scholar] [CrossRef]
- Kalliola, A.; Lee, K.; Lee, H.; Aura, T. Flooding DDoS Mitigation and Traffic Management with Software Defined Networking. In Proceedings of the IEEE 4th International Conference on Cloud Networking (CloudNet), Niagara Falls, ON, Canada, 5–7 October 2015; pp. 248–254. [Google Scholar]
- Wang, W.; Qi, Q.; Gong, X.; Hu, Y.; Que, X. Autonomic QoS management mechanism in software-defined network. China Commun. 2014, 11, 13–23. [Google Scholar] [CrossRef]
- Gudipati, A.; Perry, D.; Li, E.L.; Katti, S. SoftRAN: Software defined radio access network. In The Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN ’13); Association for Computing Machinery: New York, NY, USA, 2013; pp. 25–30. [Google Scholar]
- Bernardos, C.J.; de la Oliva, A.; Serrano, P.; Banchs, A.; Contreras, L.M.; Jin, H.; Zúñiga, J.C. An architecture for software defined wireless networking. IEEE Wirel. Commun. 2014, 21, 52–61. [Google Scholar] [CrossRef]
- Pentikousis, K.; Wang, Y.; Hu, W. Mobileflow: Toward software-defined mobile networks. IEEE Commun. Mag. 2013, 51, 44–53. [Google Scholar] [CrossRef]
- Li, Z.; Zhou, X.; Gao, J.; Qin, Y. SDN Controller Load Balancing Based on Reinforcement Learning. In Proceedings of the IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), Beijing, China, 23–25 November 2018; pp. 1120–1126. [Google Scholar]
- Mnih, V.; Kavukcuoglu, K.; Silver, D.; Rusu, A.A.; Veness, J.; Bellemare, M.G.; Graves, A.; Riedmiller, M.A.; Fidjeland, A.K.; Ostrovski, G.; et al. Human-level control through deep reinforcement learning. Nature 2015, 518, 529–533. [Google Scholar] [CrossRef] [PubMed]
- Giotis, K.; Argyropoulos, C.; Androulidakis, G.; Kalogeras, D.; Maglaris, V. Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput. Netw. 2014, 62, 122–136. [Google Scholar] [CrossRef]
- Lee, S.; Kim, J.; Shin, S.; Porras, P.; Yegneswaran, V. Athena: A framework for scalable anomaly detection in software-defined networks. In Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, USA, 26–29 June 2017; pp. 249–260. [Google Scholar]
- Mehdi, S.A.; Khalid, J.; Khayam, S.A. Revisiting traffic anomaly detection using software defined networking. In 14th International Symposium on Recent Advances in Intrusion Detection (RAID); Springer: Berlin/Heidelberg, Germany, 2011; pp. 161–180. [Google Scholar]
- Yungaicela-Naula, N.M.; Vargas-Rosales, C.; Perez-Diaz, J.A. SDN-based architecture for transport and application layer DDoS attack detection by using machine and deep learning. IEEE Access 2021, 9, 108495–108512. [Google Scholar] [CrossRef]
- Sauter, M. Beyond 3G-Bringing Networks, Terminals and the Web Together: LTE, WiMAX, IMS, 4G Devices and the Mobile Web 2.0; John Wiley & Sons: Hoboken, NJ, USA, 2011. [Google Scholar]
- Schuba, C.L.; Krsul, I.V.; Kuhn, M.G.; Spafford, E.H.; Sundaram, A.; Zamboni, D. Analysis of a denial-of-service attack on TCP. In Proceedings of the IEEE Symposium on Security and Privacy (Cat. No. 97CB36097), Oakland, CA, USA, 4–7 May 1997; pp. 208–223. [Google Scholar]
- Wang, T.; Liu, F.; Xu, H. An efficient online algorithm for dynamic SDN controller assignment in data center networks. IEEE/ACM Trans. Netw. 2017, 25, 2788–2801. [Google Scholar] [CrossRef]
- Sun, P.; Guo, Z.; Wang, G.; Lan, J.; Hu, Y. MARVEL: Enabling controller load balancing in software-defined networks with multi-agent reinforcement learning. Comput. Netw. 2020, 177, 107230. [Google Scholar] [CrossRef]
- Yao, J.; Han, Z.; Sohail, M.; Wang, L. A robust security architecture for SDN-based 5G networks. Future Internet 2019, 11, 85. [Google Scholar] [CrossRef]
- Bhushan, K.; Gupta, B.B. Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J. Ambient Intell. Humaniz. Comput. 2019, 10, 1985–1997. [Google Scholar] [CrossRef]
Window Size | CPU Usage | Memory Usage (GB) |
---|---|---|
5 | 55 | 1.5 |
50 | 61 | 1.5 |
100 | 66 | 1.5 |
500 | 75 | 1.5 |
5000 | 91 | 1.5 |
Parameters | Value |
---|---|
Network simulations | 100 |
Runtime per network instance | 50 s |
Benign UE | 20 |
Benign UE data throughput | 0.1 data packets per second (pps) |
Malicious UE | 40 |
Malicious UE data throughput | 3.5 pps |
SYN-RECEIVED Timer | 75 s |
SYN-ACK Retransmissions | Loop: 3–6–12s |
Flow cache timeout | 10 s |
Attack detection threshold | 0.5 pps |
TCP Algorithm | TCP Reno |
Parameters | Value |
---|---|
UE Mobility | Stationary |
Packet Flow Direction | Omni-directional |
UE Transmit Power | 26 dBm |
Delayed Acknowledgment (Enabled) | False |
SACK Enabled | False |
Multiple MIMO | True |
Queue size | 1 MiB |
Max Payload (per TTL) | 1 KiB |
Parameters | Value |
---|---|
Resource block allocation | Distributed |
Scheduling strategy | MAXCI |
Traffic direction | Omni-directional |
Transmit Power | 26 dBm |
Queue size | 2 MiB |
Max payload (per TTL) | 3000 KiB |
TCP App | TCPSessionApp |
Approach | Average Burden Ratio of Distributed Controllers |
---|---|
Static | 0.5175 |
RLBBA | 0.5525 |
Proposed Method | 0.6275 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sheibani, M.; Konur, S.; Awan, I.; Qureshi, A. A Multi-Layered Defence Strategy against DDoS Attacks in SDN/NFV-Based 5G Mobile Networks. Electronics 2024, 13, 1515. https://doi.org/10.3390/electronics13081515
Sheibani M, Konur S, Awan I, Qureshi A. A Multi-Layered Defence Strategy against DDoS Attacks in SDN/NFV-Based 5G Mobile Networks. Electronics. 2024; 13(8):1515. https://doi.org/10.3390/electronics13081515
Chicago/Turabian StyleSheibani, Morteza, Savas Konur, Irfan Awan, and Amna Qureshi. 2024. "A Multi-Layered Defence Strategy against DDoS Attacks in SDN/NFV-Based 5G Mobile Networks" Electronics 13, no. 8: 1515. https://doi.org/10.3390/electronics13081515
APA StyleSheibani, M., Konur, S., Awan, I., & Qureshi, A. (2024). A Multi-Layered Defence Strategy against DDoS Attacks in SDN/NFV-Based 5G Mobile Networks. Electronics, 13(8), 1515. https://doi.org/10.3390/electronics13081515