Detection and Mitigation of Malicious DDoS Floods in Software Defined Networks
Author:
Ahmad Furqan1, Rehman Ubaid ur2, Saleem Maham1
Affiliation:
1. National Textile University 2. Glasgow Caledonian University Scotland
Abstract
Abstract
Software-defined networking (SDN) has revolutionized network management by providing modular control and data plane attributes for flexible network management. It implies the concept of separating the control and data plane attributes for flexible network management. However, centralized management due to control plane separation in SDN also exposes it to cyber threats such as Distributed Denial-of-service (DDoS) attacks that can compromise the SDN controllers. In recent research, entropy-based attack detection approaches showed much significance among other detection methods but relying on entropy itself can neglect detection in several variables such as variations in flow specification. Based on these limitations, in this work, we have designed a DDoS attack detection framework inside the SDN control plane by integrating the packet flow initiation and its specifications properties with entropy-based algorithm to ensure correct measures of attack detection. The simulation is performed on Mininet network simulator, for implementing SDN architecture and the testbed is created on UDP flood attacks on commonly used data-centric tree topologies. Based on experimentation, this lightweight framework is designed to mitigate DDoS attacks by detecting its effects in the early stages to prevent SDN controller being hijacked due to immense packet flooding Based on the results, the proposed solution assures the SDN-based DDoS attack detection and mitigation under 150 packets maintaining significantly low detection time and high accuracy.accuracy.
Publisher
Research Square Platform LLC
Reference34 articles.
1. Anerousis, N., Chemouil, P., Lazar, A.A., Mihai, N., Weinstein, S.B.: “The Origin and Evolution of Open Programmable Networks and SDN,” IEEE Communications Surveys and Tutorials, vol. 23, no. 3. Institute of Electrical and Electronics Engineers Inc., pp. 1956–1971, Jul. 01, doi: (2021). 10.1109/COMST.2021.3060582 2. Wazirali, R., Ahmad, R., Alhiyari, S.: “Sdn-openflow topology discovery: An overview of performance issues,” Applied Sciences (Switzerland), vol. 11, no. 15. MDPI AG, Aug. 01, doi: (2021). 10.3390/app11156999 3. Benzekki, K., el Fergougui, A., Elbelrhiti Elalaoui, A.: “Software-defined networking (SDN): a survey,” Security and Communication Networks, vol. 9, no. 18, pp. 5803–5833, Dec. doi: (2016). 10.1002/sec.1737 4. Montazerolghaem, A.: “Software-defined load-balanced data center: design, implementation and performance analysis,” Cluster Comput, vol. 24, no. 2, pp. 591–610, Jun. doi: (2021). 10.1007/s10586-020-03134-x 5. Hodo, E., Bellekens, X., Hamilton, A., Tachtatzis, C., Atkinson, R.: “Shallow and Deep Networks Intrusion Detection System:A Taxonomy and Survey.”
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|