An Accelerated Method for Rules Anomaly Detection in Software Defined Networks

Document Type : Original Article

Authors

1 Faculty of Computer Engineering, University of Isfahan, Iran.

2 Faculty of Computer Engineering, University of Isfahan, Isfahan, Iran.

Abstract

Software defined networks have attracted enormous attention because they simplify the process of setting up the     network. They have been able to leave behind in a short time, most of the technologies that were used in traditional networks by industrialists and researchers. The ease and efficiency are due to the separation of control and data planes from each other such that the control plane is a logically centralized controller and the data plane switches in as the flow table has been implemented. In these networks, network topology adjustment is done using a flow table that has special flow rules and network services, such as Qos, security and etc., which operate as programs on the network. Flow tables can be directly or indirectly changed by any of these services in the network. Although access to the table of current units simplifies network configurations, it could lead to anomalies between flow rules for separate modules. In addition to consuming too much switch memory, these anomalies can cause problems for network security and    applications. Fortunately, so far, some researches on the detection of anomalies in flow tables of software defined  networks has been done but this method is not only imposing a great deal of time and processing on the controller, in some cases only conflict resolution has been performed. In this paper we have shown how to speed up the detection algorithm and then tried to improve the speed of anomaly detection algorithm in the flow table of switches in the    software defined networks using different variables.
 

Keywords


   [1]            Y. Wang and I. Matta, “Sdn management layer: Design requirements and future direction,” in Network Protocols (ICNP), IEEE 22nd International Conference on, 2014.##
   [2]            M. Ghasabi, M. Deypir, and E. Mahdipour, “A New Algorithm Based on Hellinger Distance for Mitigation of DDoS Attacks in Software Defined Networks,” Journal of Electronical & Cyber Defence, vol. 5, pp. 29-41, 2017. (In Persian)##
   [3]            B. A. A. Nunes, M. Mendonca, X.-N. Nguyen, K. Obraczka, and T. Turletti, “A survey of   ##
   [4]      software-defined networking: Past, present, and future of programmable networks,” IEEE Communications Surveys & Tutorials, vol. 16, pp. 1617-1634, 2014.##
   [5]            Y. Jarraya, T. Madi, and M. Debbabi, “A survey and a layered taxonomy of software-defined networking,” IEEE Communications Surveys & Tutorials, vol. 16,  pp. 1955-1980, 2014.##
   [6]            H. Li, F. Wei, and H. Hu, “Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN,” In Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2019.##
   [7]        M. H. Khairi, S. H. Ariffin, N. A. Latiff, A. S. Abdullah, and M. K. Hassan, “A Review of Anomaly Detection Techniques and Distributed Denial of Service (DDoS) on Software Defined Network (SDN),” Engineering, Technology & Applied Science Research, vol. 8, pp. 2724-2730, 2018.##
   [8]            P. Wang, L. Huang, H. Xu, B. Leng, and H. Guo, “Rule Anomalies Detecting and Resolving for Software Defined Networks,” in IEEE Global Communications Conference (GLOBECOM),  2015.##
   [9]            P. Zhang, S. Xu, Z. Yang, H., Li, H. Wang, and C. Hu, “FOCES: Detecting Forwarding Anomalies in Software Defined Networks,” In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), 2018.##
[10]            P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu, “A security enforcement kernel for OpenFlow networks,” in Proceedings of the first workshop on Hot topics in software defined networks, 2012.##
[11]            A. Khurshid, W. Zhou, M. Caesar, and P. Godfrey, “Veriflow: Verifying network-wide invariants in real time,” ACM Sigcomm Computer Communication Review, vol. 42, pp. 467-472, 2012.##
[12]            A. AuYoung et al., “Democratic resolution of resource conflicts between sdn control programs,” in Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014.##
[13]            E. Al-Shaer and S. Al-Haj, “FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures,” in Proceedings of the 3rd ACM workshop on Assurable and usable security configuration, 2010.##
[14]            A. D. Ferguson, A. Guha, C. Liang, R. Fonseca, and S. Krishnamurthi, “Hierarchical policies for software defined networks,” in Proceedings of the first workshop on Hot topics in software defined networks, 2012.##
[15]            G. Zhang, S. Cheng, X. Song, and F. Jiang, “Detecting and Resolving Flow Entries Collisions in Software Defined Networks,” In Proceedings of the 2019 3rd International Conference on Computer Science and Artificial Intelligence, 2019.##
[16]            E. Al-Shaer, H. Hamed, R. Boutaba, and M. Hasan, “Conflict classification and analysis of distributed firewall policies,” IEEE journal on selected areas in communications, vol. 23, pp. 2069-2084, 2005.##
[17]      Q.&nbs