(Seyed et al, 2015). With the emergence of new and
larger DDoS attacks, this strategy entails high costs
for companies as it requires to frequently invest in
more efficient and specialized hardware components.
The cost of deploying and maintaining a physical fire-
wall is estimated at 116.000 $ for the first year and an
annual cost of 108.200 $ for a medium-sized US com-
pany with 5Mbps of Internet connectivity. The de-
velopment of Software-Defined Networks (SND) and
virtualized network functions offers opportunities to
reduce security costs and also to provide flexible and
scalable solutions.
Network Function Virtualization (NFV) is a recent
network architecture concept in which network func-
tions (e.g. network address translation, firewalling,
domain name service, etc.) are implemented as soft-
ware and deployed as virtual machines running on
general purpose commodity hardware like x86- or
ARM-based servers (Jakaria et al, 2016). Virtualiza-
tion increases manageability, reliability and perfor-
mance of the network and allows a flexible and dy-
namic implementation of the network services, which
significantly reduces the cost of the infrastructure and
simplifies the deployment of new services. These nu-
merous benefits have convinced operators to largely
embrace virtualization of network functions (Dono-
van, 2014).
NFV offers new possibilities to counter DDoS at-
tacks. In particular, its flexibility and reactivity allows
to postpone the determination of the DDoS defense
architecture to be used after the attack is detected, its
target identified and its volume estimated. This allows
to place adapted defense mechanisms where they are
needed and to launch them depending on the scale of
the attack (Seyed et al, 2015).
The use of virtual network functions (NFV) for
protection against DDoS attacks was investigated in
several recent works. (Seyed et al, 2015) devel-
oped the Bohatei system based on NFV and SDN
(software-defined networking). Their system includes
a resource manager which determines the type, num-
ber and location of virtual machines to be instantiated
based on the available information of the on-going at-
tack so as to minimize the costs related to the ma-
licious flow traffic. They formulate the underlying
optimization problem as a mixed-integer linear pro-
gram and solve it using a two-step heuristic. Note that
their problem modeling assume that the flow of the at-
tack, once detected, can be flexibly routed towards the
launched virtual machines. (Jakaria et al, 2016) also
proposed a DDoS defense architecture based on the
dynamic allocation of filtering NFVs. In their frame-
work, the external traffic to the targeted server is di-
rected by a central dispatcher to one of the activated
NFVs which will stop the malicious traffic and for-
ward the clean one to its destination. The authors
mention that the decision to add or remove filtering
NFVs to/from the active architecture should be based
on a real-time analysis of the inflow traffic but the
question of devising a mechanism to optimally deploy
the NFVs is left for future work.
In the previous works (Seyed et al, 2015) (Jakaria
et al, 2016) using NFV technologies to eliminate sus-
picious packets, the authors considered that the rout-
ing of attacks was known and they assumed the ability
to redirect attacks to filtering agents.
Today, in the context of networks that evolve dy-
namically, these assumptions are no longer realistic.
Indeed, with the advent of 5G networks, ISPs are
preparing to lend “slices” of their physical networks
to service providers. Service providers are likely to
rely on their own, proprietary algorithms to route traf-
fic on their slice of the network.
Therefore, in order to propose a satisfying secu-
rity solutions to operators, it is necessary to develop
approaches that optimize the NFV deployment
without knowing the routing attacks. This is the
purpose of our study.
In the present work, we focus on the deployment
of an architecture based on the NFV technology to
secure networks against DDoS attacks. We assume
that the on-going attack has been detected and that
its ingress points, its volume and its target have been
identified. Based on this information, we seek to de-
termine the optimal number and location of NFVs in
order to remove all the illegitimate traffic while trying
to minimize the total cost of the activated NFVs. An
important feature of our problem is that it tackles sit-
uations where network routing is very dynamic mak-
ing it difficult to know how the illegitimate traffic will
be routed in the network and cannot decide to route
it to one of the instantiated filtering NFVs. This im-
plies that our NFV placement decisions should take
into account all the possible routes that the illegiti-
mate traffic could use between the ingress points and
the target so as to ensure that the attack is stopped in
all cases. Another important aspect of the problem is
that the capacity of the NFVs activated at a given node
of the network might not be enough to filter all the at-
tacking traffic going through it. Therefore, we need a
cumulative elimination process which on each of the
potential paths of the illegitimate traffic, the necessary
NFVs are placed on multiple nodes of the paths to re-
move the entire malicious traffic. These two aspects
greatly increase the hardness of the problem.
We propose in what follows to tackle this opti-
mization problem using mathematical programming
Virtual Network Functions Placement for Defense Against Distributed Denial of Service Attacks
143