SDN-based blockchain
SDN-based blockchain
DistBlockNet:
A Distributed Blockchains-Based
Secure SDN Architecture for IoT Networks
Pradip Kumar Sharma, Saurabh Singh, Young-Sik Jeong, and Jong Hyuk Park
Digital Object Identifier: Pradip Kumar Sharma, Saurabh Singh, and Jong Hyuk Park are with Seoul National University of Science and Technology (SeoulTech);
10.1109/MCOM.2017.1700041 Young-Sik Jeong is with Dongguk University.
OrchApp provides the level of adaptability component takes care of the main functionality
sought to adapt to the new and dynamic threats of the network infrastructure as soon as the satu-
and modifies the enterprise network config- ration attack has occurred. Whereas, the packet
urations. The application layer provides a solid migration component sends a benign network
platform that can execute assurances at the stream to the OpenFlow controller without over-
application points all throughout the enterprise. loading. As shown in Fig. 1, the module units
Because the protections are software-controlled, define the flow analyzer as a control applica-
critical hardware deployed at these points of the tion on the controller platform. Furthermore, the
application does not need to be exchanged when migration agent of the migration component is
a new threat or attack technique is exposed or applied to a controller application between the
when new technologies are introduced in the control plane, the data plane, and an element of
industry. Protections should automatically take the cache data plane.
place in the threat landscape without requiring Parser: The attackers use the subset of Open-
manual monitoring of the analysis of a large Flow messages, such as Packetin, Flow_Mod, Fea-
number of opinions and endorsements. This is tures_Reply, and Stats_Reply, in order to change
accomplished by using an automated threat coun- the network’s view of the controller. Thus, to iden-
teractive action control that works together with tify abnormal behavior, we extracted the import-
the management layer that is only essential for ant metadata by monitoring and parsing incoming
human decision-making for when the threat indi- packets.
cators offer less assurance about recognizing an Graph Builder: To identify the attacks in the
attack or threat. security policies resulting from the actual changes
Shelter: Attackers often rank in the network to made to the system data plan, which is linked to
take advantage of the insider’s advantage points, each flowchart and to the topological exchange
and then launch attacks on the internal network. metadata, the graph builder analyzes the parsed
Given that our objective is to assert the appear- dataset to construct and alter the flow diagrams
ance of attacks on the network topology and the that are connected to the network traffic. Our
data plane and the aggression of identity of the model retains the flows of logical and physical
flow rules or the strategies within the SDN, our topologies and Flow_Mod transmission status
threat system perfectly identifies the scenarios messages to identify malicious update metadata.
where the antagonist initiates attacks within the Verifier: We generated path conditions offline
SDN. Thus, we designed the SDNs as a non-open and reactive rules online. In order to reduce the
system. Removing restrictions on unidentified overhead at runtime, we processed the path con-
external communications helps focus our analysis dition generator to navigate the possible paths
only on OpenFlow control packets or messages and to collect all path conditions offline. Online
within the SDN because the OrchApp handles all reactive rule generation monitors and assigns the
of these issues in the DistBlockNet model. current value of the global variables to the sta-
Shelter is composed of a flow control analyzer tus path. The input variables are symbolized in
and packet migration components. The analyzer the path conditions, and the reactive flow rule
6000
4000
3000
2000
Figure 3. DistBlockNet performance on a large-scale network: a) distributed blockchain network with 6 controllers and 6000 nodes;
b) flow table update time vs. packet-in arrival rate.
Bandwidth (Mb/s)
7
1.2
6
1
5
0.8 4
0.6 3
0.4 2
0.2 1
0
300
6 00
9 00
0
420
40
0
120
150
180
210
24 0
270
300
210
252
420
462
84
126
168
29 4
336
378
50
Packet-in arrival rate (attack rate) Packet-in arrival rate (attack rate)
(a) (b)
Figure 4. Effects on bandwidth during different attack rate in: a) software environment; b) hardware environment.
width decreased rapidly with an increase in the et. We used the custom traffic generator, which
attack rate. The bandwidth went down to almost generates 1500 FLOW_MOD/sec. ARP attacks
half when the packet-in arrival rate reached 800 and fake topology are easily identified when the
packets/s. The entire network started malfunc- PACKETiN messages are processed. The detection
tioning when the packet-in arrival rate reached times may fluctuate because in order to recognize
3000 packets/s. On the other hand, using the DDoS/DoS attacks, DistBlockNet occasionally
DistBlockNet model, the bandwidth started at 1.9 runs the flowchart validator and, as a result, the
Gb/s without the presence of an attack, and after flow diagram size increases. In another case, we
the packet-in arrival rate reached 3000 packets used Mininet to increase the number of hosts to
per second, the bandwidth remained practically 30K. Then we propelled DDoS, ARP poising, and
unchanged. fake topology attacks throughout the distributed
Figure 4b shows the results in the hardware blockchain network. We reiterated each examina-
test environment. In the hardware test environ- tion more than 15 times and noticed that under
ment, the bandwidth started at 9.5 Mb/s both the distinctive topologies, DistBlockNet effectively
with and without using the DistBlockNet model recognized each of the issues.
with any attack. In this experiment, we noticed We ran a pessimistic scenario on the false
that the bandwidth without using the DistBlock- alerts raised for a given d using conflicting TCP
Net model went up to half when the attack rate of iperf streams. The fair nature of the TCP will
the packet-in arrival rate reached 1000 packets/s create fluctuations in flow to cause changes in
and started malfunctioning when the attack rate the switches along the flow path, which would
reached 5000 packets/s. While using the Dist- raise some precautions. As shown in Fig. 5a, we
BlockNet model, the bandwidth was maintained observed that with the increase of d, the probabil-
above 9 Mb/s until the packet-in arrival reached ity of false alarms occurring decreases.
1600 packets/s. After that, the bandwidth started The recall and precision are zero due to the
to go down because the ternary content address- absence of a true positive. In these experiment
able memory was not available in our switch. We results, we observed that at the default value of d
used the OpenWRT software tool in place of the = 1.06, there were 7 alarms out of 10 competing
ternary content addressable memory to execute flows over 6 min. We also performed this experi-
a flow rule table. Although a software-based flow ment on our physical testbed and obtained com-
rule table is not able to achieve a similar level of parable results.
performance, we still noticed that DistBlockNet To assess the absence of real alerts for a given
conserves resources and provides significant pro- d, we defined the ratio between the number of
tection. checks that did not raise alerts to the total num-
ber of checks that raised alerts during verifica-
Accuracy tion. We evaluated the above metric among the
We evaluated the accuracy rate of the detection Mininet hosts for controlled flows, which are eight
of DistBlockNet under two different parameters hops apart. As shown in Fig. 5b, we observed
with one in the real-time identification of attacks that the absence of real alerts during verification
and another in the presence various traffic and increases as d increases. For a given d, the recall
many distinctive defects in the system. The Dist- and precision are identical, which is equal to one
BlockNet model has the ability to identify every minus the probability of the absence of real alerts
attack quickly. In the case of real-time identifica- at every data point.
tion, synthetic faults were used in parallel with
the suitable traffic with 6K for the Mininet emul- Overhead Analysis
sified hosts on our physical testbed. Here we To evaluate the performance overhead of our
viewed the detection time as the time required DistBlockNet model, we used l2 learning and l3
for issuing of an alert from the moment when the learning applications and recorded CPU utiliza-
DistBlockNet model received the offending pack- tion during a flooding attack. We simultaneously
0.598
18 flows
0.524 21 flows 0.7
0.449 24 flows 0.6
27 flows
0.374 30 flows 0.5
0.299 0.4
3% loss
0.224 0.3 6% loss
9% loss
0.15 0.2 12% loss
0.075 0.1 15% loss
18% loss
1.10
1.12
1.14
1.16
1.18
0
1.10
1.12
1.14
1.16
1.18
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0
1.0
Figure 5. DistBlockNet accuracy rate: a) probability of false alerts with variation in flows and d; b) probability of absence of real alerts
vs. loss rate and d.
14 18
16
12
14
10
CPU utilization (%)
6 8
6
4
4
2 2
0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0
Time (s) Time (s)
(a) (b)
Figure 6. CPU utilization during flooding attack: a) running l2 learning application; b) running l3 learning application.
executed these two applications and used some protections, including threat prevention, data
clients to act as attackers and propelled the satu- protection, and access control, and mitigate net-
ration attack with a rate of 500 packets/s with a work attacks such as cache poising/ARP spoofing,
DistBlockNet model in the hardware environment. DDoS/DoS attacks, and detect security threats.
For each application, we monitored the consump- The DistBlockNet model also focuses on reducing
tion of the resources. Figure 6 shows the average the attack window time by allowing IoT forwarding
CPU utilization for all the controllers for different devices to quickly check and download the latest
applications with the DistBlockNet model during table of flow rules if necessary. The performance
flooding attacks. The flooding attacks began at evaluation is based on scalability, defense effects,
about 0.5 s, and we noticed that CPU utilization accuracy rates, and the performance overheads of
quickly increased for each application. Then CPU the proposed model. The evaluation results show
usage started to slowly decrease after we installed the efficiency and effectiveness of the DistBlock-
the migration rules of flow. Based on the results, Net model and have met the required design prin-
we observed that DistBlockNet provides effective ciples with minimal overhead.
protection and creates a more secure distribut- In the future, we will extend our research work
ed network without consuming many resources to build a distributed cloud computing architec-
during a saturation attack. ture with secure fog nodes at the edge of the IoT
network.
Conclusion
In this article, based on an analysis of the challeng- Acknowledgments
es that large-scale IoT networks face due to new This work was supported by the National
communication paradigms, DistBlockNet, a new Research Foundation of Korea (NRF) grant
distributed secure IoT network architecture consist- funded by the Korea government (MSIP) (No
ing of an SDN base network using the blockchains 2016R1A2B4011069)
technique, has been proposed to address the
current and future challenges and to satisfy new References
[1] “Top Strategic Predictions for 2017 and Beyond: Surviving
service requirements. DistBlockNet improves a sys- the Storm Winds of Digital Disruption,” https://www.gart-
tem’s performance and capacity. The core role of ner.com/doc/3471568? ref=unauthreader, accessed May
the DistBlockNet model is to generate and deploy 5, 2017