Author:
ALASALI Tasnim,DAKKAK Omar
Abstract
Over the course of time, a multitude of security solutions have been proposed in order to safeguard the Internet architecture from an extensive array of malware threats. However, the task of ensuring the security of the Internet and its associated applications remains an ongoing research challenge. Researchers persistently delve into the exploration of innovative network architectures, such as the utilization of HTTP as the narrow waist, the implementation of Named Data Networking (NDN), the development of programmable networks, and the adoption of Software-Defined Networking (SDN), with the aim of designing a more dependable and resilient network infrastructure. Among these alternative approaches, SDN has emerged as a robust and secure solution for countering malicious activities. By separating the control plane from the data plane, SDN provides an array of advantages, including enhanced manageability, improved control, dynamic rule updates, advanced analysis capabilities, and a comprehensive network overview facilitated by a centralized controller. Despite its superiority over conventional IP-based networks, SDN is susceptible to various network intrusions and encounters significant challenges in terms of deployment. The purpose of this paper is to conduct a comprehensive review of approximately 70 prominent mechanisms employed for the detection and mitigation of Distributed Denial of Service (DDoS) attacks in SDN networks. These mechanisms are systematically categorized into four main groups, namely information theory-based methods, machine learning-based methods, approaches based on Artificial Neural Networks (ANN), and other miscellaneous methods. Furthermore, the paper identifies and discusses several unresolved research issues and gaps that exist in the deployment of a secure DDoS defense solution within SDN networks. The objective of this comprehensive review is to provide valuable insights to the research community, assisting in the development of more robust and reliable DDoS mitigation solutions that are specifically tailored for SDN networks.
Reference143 articles.
1. Internet growth usage statistics, 2019, https://www.clickz.com/internetgrowth-usage-stats-2019-time-online-devices-users/235102/.
2. DoS attack report, 2020, https://www.britannica.com/technology/denialof-service-attack.
3. M. Feily, A. Shahrestani, S. Ramadass, A survey of botnet and botnet detection, in: 2009 Third International Conference on Emerging Security Information, Systems and Technologies, IEEE, 2009, pp. 268–273.
4. M. Abu Rajab, J. Zarfoss, F. Monrose, A. Terzis, A multifaceted approach to understanding the botnet phenomenon, in: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, 2006, pp. 41–52.
5. B. Saha, A. Gairola, Botnet: an overview, CERT-In White Paper, CIWP-2005-05, Vol. 240, 2005.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Clustering Techniques in Data Mining: A Survey of Methods, Challenges, and Applications;Computer Science;2024-03-05
2. Exploring Distributed Denial of Service Efficiency Optimisation;2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT);2023-06-16