On May 28, 2014, at 3:50 AM, Silvia Fichera <fichera....@gmail.com> wrote:

> Dear all,
> I have a network with an hundred hosts in which most of them perform 
> SYN-Flood attack. My implementation foresees a threshold to detect the attack 
> (Controller tests the source pretending to be the real destination since the 
> source doesn't complete 3-way handshake procedure. Only the honest source can 
> talk to the real destination of the attack) and install a dropping rule on 
> first switch when the threshold exceed. 

This design sounds like potentially a very great amount of traffic gets sent to 
a controller over the OpenFlow connection.

> I am able to count the number of syn received by the controller with a 
> counter that I added in it (I expect this should be equal to the number of 
> the attackers times the threshold, but it is not so ), and if I compare this 
> number with Wireshark capture I see a lot of packets more.

A Wireshark capture of what?  The control traffic, or the normal data plane 
traffic?

> There is a reason for this behavior? Could be because of the responsiveness 
> of the controller?

It certainly could be because of the responsiveness of the controller.

Have you checked the OVS log?  You may find interesting log messages such as 
"dropping packet-in due to queue overflow".

You could try running POX using PyPy and see if your numbers get closer.

> Moreover, I know that Pox is single thread. There is any buffer in which 
> incoming packets are queued?

Within POX, they're handled immediately.  But there are buffers in the system, 
e.g., in the networking stack on the controller machine and the switch machine.

-- Murphy

Reply via email to