Effective Stateful Firewall in Software-Defined Networking
Aung Htein Maw1
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-8 , Page no. 269-274, Aug-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i8.269274
Online published on Aug 31, 2019
Copyright © Aung Htein Maw . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Aung Htein Maw, “Effective Stateful Firewall in Software-Defined Networking,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.269-274, 2019.
MLA Style Citation: Aung Htein Maw "Effective Stateful Firewall in Software-Defined Networking." International Journal of Computer Sciences and Engineering 7.8 (2019): 269-274.
APA Style Citation: Aung Htein Maw, (2019). Effective Stateful Firewall in Software-Defined Networking. International Journal of Computer Sciences and Engineering, 7(8), 269-274.
BibTex Style Citation:
@article{Maw_2019,
author = {Aung Htein Maw},
title = {Effective Stateful Firewall in Software-Defined Networking},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2019},
volume = {7},
Issue = {8},
month = {8},
year = {2019},
issn = {2347-2693},
pages = {269-274},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4823},
doi = {https://doi.org/10.26438/ijcse/v7i8.269274}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i8.269274}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4823
TI - Effective Stateful Firewall in Software-Defined Networking
T2 - International Journal of Computer Sciences and Engineering
AU - Aung Htein Maw
PY - 2019
DA - 2019/08/31
PB - IJCSE, Indore, INDIA
SP - 269-274
IS - 8
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
335 | 272 downloads | 172 downloads |
Abstract
A firewall is a critical security appliance for the mitigation of the security attacks not only in the traditional network, but also in software-defined networking (SDN). Previous firewall applications over SDN controller are implemented with one of two firewall concepts: centralized firewall and distributed firewall. Centralized firewall method incurs controller overhead problem as the controller acts as a centralized firewall which maintains firewall rules and filters out the traffic. Distributed firewall method comes out the complicated firewall configuration, additional cost in rules maintenance in each switch, and less sensitive to the topology. This system proposes a firewall rules installation based on topology-aware selectively distributed stateful firewall with source-based DoS attack defense mechanism. The purpose of this system is to overcome not only the performance issues but also security issues. This paper finally shows that the stateful firewall application can not only track the TCP flow, but also reduce latency plus table lookup time up to 16% in long-lived flow and 50% in short-lived flow. Moreover, according to the security perspective, the accuracy for the DOS detection and mitigation of stateful firewall application is 98.93 % of SYN flooding attack and 92.09% for UDP flooding attack.
Key-Words / Index Term
Stateless Firewall, Stateful Firewall, SDN
References
[1] Tran, Thuy Vinh, and Heejune Ahn. "Flowtracker: A SDN Stateful Firewall Solution with Adaptive Connection Tracking and Minimized Controller Processing." Software Networking (ICSN), 2016 International Conference on. IEEE, 2016.
[2] Tran, Thuy Vinh, and Heejune Ahn. "A network topology-aware selectively distributed firewall control in SDN." Information and Communication Technology Convergence (ICTC), 2015 International Conference on. IEEE, 2015.
[3] Pena, Justin Gregory V., and William Emmanuel Yu. "Development of a distributed firewall using software defined networking technology" Information Science and Technology (ICIST), 2014 4th IEEE International Conference on. IEEE, 2014.
[4] Arins, Andis. "Firewall as a service in SDN OpenFlow network" Information, Electronic and Electrical Engineering (AIEEE) , 2015 IEEE 3rd Workshop on Advances in. IEEE, 2015.
[5] Rao, S., and S. Rao. "Denial of service attacks and mitigation techniques: Real time implementation with detailed analysis" This paper is from the SANS Institute Reading Room site (2011).
[6] Rajkumar, M. Nene. "A Survey on Latest DoS Attacks: Classification and Defense Mechanisms" IJIRCCE 1.8 (2013).
[7] Ivan Pepelnjak, “What can openflow tables do?”, https://www.youtube.com/watch?v=7R91K0d2r2E.
[8] “Attack Detection and Defense Mechanisms" Juniper Networks, Inc.1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-7 45-2000 www.juniper.net, 2016.
[9] Morzhov, Sergey, Igor Alekseev, and Mikhail Nikitinskiy. "Firewall application for Floodlight SDN controller" Control and Communications (SIBCON), 2016 International Siberian Conference on. IEEE, 2016.
[10] Pena, Justin Gregory V., and William Emmanuel Yu. "Development of a distributed firewall using software defined networking technology" Information Science and Technology (ICIST), 2014 4th IEEE International Conference on. IEEE, 2014.
[11] Suh, Michelle, et al. "Building firewall over the software-defined network controller" Advanced Communication Technology (ICACT), 2014 16th International Conference on. IEEE, 2014.
[12] Trabelsi, Zouheir. "Teaching stateless and stateful firewall packet filtering: A hands-on approach" 16th Colloquium for Information Systems Security Education. 2012.
[13] Dillon, C., and Michael Berkelaar. “OpenFlow (D) DoS Mitigation”. Technical report (February 2014), http://www. delaat. net/rp/2013-2014/p42/report. pdf, 2014.
[14] Low, Christopher. "Icmp attacks illustrated" SANS Institute URL: http://rr. sans. org/threats/ICMP attacks. php (12/11/2001) (2001).
[15] Shieha, Alaauddin. "Application Layer Firewall Using OpenFlow" (2014).
[16] Mininet Network Emulator, http://mininet.org.
[17] Xargs command, Internet:http://man7.org/linux/man-pages/man1 /xargs.1.html.
[18] Hping3 Security Tool[online]. Available from: https://www.hping. org/hping3.html.
[19] D-ITG, Distributed Internet Traffic Generator, http://www.grid.unina.it/software/ITG/.
[20] Tcpdump[online].Availablefrom: https://www.tcpdump.org/manpages/tcpdump.1.html.
[21] Y. Perwej, “The Hadoop Security in Big Data: A Technological Viewpoint and Analysis”, International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.3, pp.1-14, June 2019.
[22] G. Abare, “A Proposed Model for Enhanced Security against Key Reinstallation Attack on Wireless Networks”, International Journal of Scientific Research in Network Security and Communication, Volume-7, Issue-3, ISSN: 2321-3256, Jun 2019.