Software-defined Networking Based DDoS Defense Mechanisms

Author(s):  
Rochak Swami ◽  
Mayank Dave ◽  
Virender Ranga

Distributed Denial of Service attack (DDoS) is recognized to be one of the catastrophic attacks against various digital communication entities. Software-defined networking (SDN) is an emerging technology for computer networks that uses open protocols for controlling switches and routers placed at the network edges by using specialized open programmable interfaces. In this paper, a detailed study on DDoS threats prevalent in SDN is presented. Firstly, SDN features are examined from the perspective of security, and then, a discussion on assessment of SDN security features is done. Further, two viewpoints towards protecting the networks against DDoS attacks are elaborated. In the first view, SDN utilizes its abilities to secure the conventional networks. In the second view, SDN may become a victim of the threats itself because of the centralized control mechanism. The main focus of this research work is towards discovering critical security implications in SDN while reviewing the current ongoing research studies. By emphasizing the available state of the art techniques, an extensive review towards the advancement of the SDN security is provided to the researchers and IT communities.

2020 ◽  
Author(s):  
Rochak Swami ◽  
Mayank Dave ◽  
Virender Ranga

Distributed Denial of Service attack (DDoS) is recognized to be one of the catastrophic attacks against various digital communication entities. Software-defined networking (SDN) is an emerging technology for computer networks that uses open protocols for controlling switches and routers placed at the network edges by using specialized open programmable interfaces. In this paper, a detailed study on DDoS threats prevalent in SDN is presented. Firstly, SDN features are examined from the perspective of security, and then, a discussion on assessment of SDN security features is done. Further, two viewpoints towards protecting the networks against DDoS attacks are elaborated. In the first view, SDN utilizes its abilities to secure the conventional networks. In the second view, SDN may become a victim of the threats itself because of the centralized control mechanism. The main focus of this research work is towards discovering critical security implications in SDN while reviewing the current ongoing research studies. By emphasizing the available state of the art techniques, an extensive review towards the advancement of the SDN security is provided to the researchers and IT communities.


2014 ◽  
Vol 484-485 ◽  
pp. 1063-1066
Author(s):  
Kui Liang Xia

The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using adaptive mechanisms exist loopholes flow through the low-rate periodic attacks on the implementation of high-efficiency attacked by an intruder and not be found, resulting in loss of user data or a computer deadlock. LDos attack since there has been extensive attention of researchers, the attack signature analysis and detection methods to prevent network security have become an important research topic. Some have been proposed for the current attacks were classified LDoS describe and model, and then in NS-2 platform for experimental verification, and then LDoS attack detection to prevent difficulties are discussed and summarized for the future such attacks detection method research work to provide a reference.


2019 ◽  
Vol 8 (4) ◽  
pp. 3002-3007

The internet of things is the decentralized type of network in which sensor devices can join or leave the network when they want. Due to such nature of the network malicious nodes enter the network which affects network performance in terms of certain parameters. This research work is based on the detection and isolation of distributed denial of service attack in internet of things. The distributed denial of service attack is the denial of service type attack which affects network performance to large extent. In the existing techniques there are two main drawbacks. The first drawback is that the technique does not pin point malicious nodes from the network. The second drawback is that the malicious node detection time is very high. In this research, the new technique will be proposed for the isolation of malicious nodes from the network. In this technique, similarity of the traffic is analyzed using the cosine similarity. The sensor node which is generated dissimilar type of traffic is detected as malicious nodes. The proposed technique has been implemented in MATLAB and results have been analyzed in terms of certain parameters. It is expected that proposed technique detect malicious nodes in least amount of time.


Sign in / Sign up

Export Citation Format

Share Document