A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks

被引:6
作者
Jain, Ankit Kumar [1 ]
Shukla, Hariom [1 ]
Goel, Diksha [2 ]
机构
[1] Natl Inst Technol Kurukshetra, Kurukshetra, India
[2] CSIROs Data61, Melbourne, Vic, Australia
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 09期
关键词
Software defined network; Distributed denial of service attack; Machine learning; Honeypot; Blockchain; ATTACK DETECTION; SDN; MACHINE; HONEYPOT;
D O I
10.1007/s10586-024-04596-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software Defined Networking (SDN) has become increasingly prevalent in cloud computing, Internet of Things (IoT), and various environments to optimize network efficiency. While it provides a flexible network infrastructure, it also faces security threats, particularly from Distributed Denial of Service (DDoS) attacks due to its centralized design. This survey comprehensively reviews the efforts of various researchers in safeguarding SDN against DDoS attacks and analyzes different detection and mitigation strategies employed in SDN environments. Furthermore, the survey explores various types of DDoS attacks that can occur across different planes and communication links in SDN. Additionally, emerging security measures for preventing DDoS attacks in SDN are examined. The survey also reviews the datasets, tools, and simulators used for detecting DDoS attacks in SDN. Moreover, the survey identifies various open challenges in detecting and mitigating DDoS attacks in SDN and outlines potential future research directions. Lastly, the survey provides a comprehensive comparative analysis of various DDoS detection techniques based on various essential parameters.
引用
收藏
页码:13129 / 13164
页数:36
相关论文
共 116 条
[1]   The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G [J].
Abdulqadder, Ihsan H. ;
Zou, Deqing ;
Aziz, Israa T. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 141 :339-354
[2]  
Ahuja N., 2020, MENDELEY DATA, V1
[3]  
Al Mhdawi A.K., 2022, 2022 INT C CONTR AUT, P1
[4]   Effectiveness of an Entropy-Based Approach for Detecting Low- and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis [J].
Aladaileh, Mohammad Adnan ;
Anbar, Mohammed ;
Hintaw, Ahmed J. ;
Hasbullah, Iznan H. ;
Bahashwan, Abdullah Ahmed ;
Al-Amiedy, Taief Alaa ;
Ibrahim, Dyala R. .
APPLIED SCIENCES-BASEL, 2023, 13 (02)
[5]   Enhancing DDoS Attack Detection and Mitigation in SDN Using an Ensemble Online Machine Learning Model [J].
Alashhab, Abdussalam Ahmed ;
Zahid, Mohd Soperi ;
Isyaku, Babangida ;
Elnour, Asma Abbas ;
Nagmeldin, Wamda ;
Abdelmaboud, Abdelzahir ;
Abdullah, Talal Ali Ahmed ;
Maiwada, Umar Danjuma .
IEEE ACCESS, 2024, 12 :51630-51649
[6]   A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets [J].
Alhijawi, Bushra ;
Almajali, Sufyan ;
Elgala, Hany ;
Salameh, Haythem Bany ;
Ayyash, Moussa .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 99
[7]  
Alto user guide, 2020, ALTO USER GUIDE OPEN
[8]  
[Anonymous], 2015, OPEN NETWORKING SPEC, V3
[9]  
[Anonymous], 2022, 4 BENEFITS MOVING SO
[10]   A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning [J].
Arturo Perez-Diaz, Jesus ;
Amezcua Valdovinos, Ismael ;
Choo, Kim-Kwang Raymond ;
Zhu, Dakai .
IEEE ACCESS, 2020, 8 :155859-155872