Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks

被引:3
作者
Hirsi, Abdinasir [1 ]
Alhartomi, Mohammed A. [2 ,3 ]
Audah, Lukman [1 ,4 ]
Salh, Adeb [5 ]
Sahar, Nan Mad [4 ]
Ahmed, Salman [6 ]
Ansa, Godwin Okon [7 ]
Farah, Abdullahi [8 ]
机构
[1] Univ Tun Hussein Onn Malaysia, Fac Elect & Elect Engn, ATRC, Parit Raja 86400, Malaysia
[2] Univ Tabuk, Dept Elect Engn, Tabuk 71491, Saudi Arabia
[3] Univ Tabuk, Innovat & Entrepreneurship Ctr IEC, Tabuk 71491, Saudi Arabia
[4] Univ Tun Hussein Onn Malaysia, Fac Elect & Elect Engn, Parit Raja 86400, Malaysia
[5] UTAR, Fac Informat & Commun Technol, Kampar, Malaysia
[6] Univ Tun Hussein Onn Malaysia, Fac Elect & Elect Engn, VLSI & Embedded Technol VEST Focus Grp, Parit Raja 86400, Malaysia
[7] Akwa Ibom State Univ, Fac Phys Sci, Dept Comp Sci, Uyo 520101, Akwa Ibom State, Nigeria
[8] Somtel Telecommun Co, Engn Dept, Bosaso 25290, Bari, Somalia
关键词
Computer crime; Surveys; Denial-of-service attack; Taxonomy; Security; Floods; Anomaly detection; Software defined networking; Reviews; Hardware; Amplification attacks; anomaly detection; botnet attacks; DDoS detection; flooding attacks; protocol attacks; reflection attacks; SDN security; software-defined networking (SDN); taxonomy of DDoS attacks; FLOODING ATTACK DETECTION; DEFENSE-MECHANISMS; DETECTION SYSTEM; BOTNET DETECTION; SDN; OPENFLOW; SERVICE; EFFICIENT; SECURITY; PROGRAMMABILITY;
D O I
10.1109/ACCESS.2025.3535943
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-Defined Networking (SDN) offers significant advantages for modern networks, including flexibility, centralized control, and reduced dependency on vendor-specific hardware. However, these benefits introduce security vulnerabilities, particularly from Distributed Denial-of-Service (DDoS) attacks, which represent some of the most disruptive threats to SDN environments. A review of the literature shows that while various techniques have been proposed to counteract DDoS threats, many studies have focused on single detection methods, with only a few utilizing multiple approaches. This fragmented focus limits a comprehensive approach to addressing DDoS threats across the SDN layers. To bridge this gap, this paper presents the first comprehensive review of DDoS anomaly detection in SDN, examining over 165 primary research articles published between 2020 and 2024. A novel taxonomy of DDoS attacks is introduced, categorizing them by distinct characteristics, and mapping each attack type to relevant detection methods within specific SDN layers. The survey provides a layer-by-layer analysis of DDoS detection techniques, covering the application, control, and infrastructure layers, and offers a structured overview that clarifies the applicability and effectiveness of each method. The paper concludes by synthesizing key findings, identifying unresolved challenges, and outlining future research directions to advance DDoS detection mechanisms in SDN. This roadmap is designed to guide researchers in addressing security vulnerabilities and enhancing SDN resilience against evolving DDoS threats.
引用
收藏
页码:23013 / 23071
页数:59
相关论文
共 293 条
[1]   Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey [J].
Abbasi, Mahmoud ;
Shahraki, Amin ;
Taherkordi, Amir .
COMPUTER COMMUNICATIONS, 2021, 170 :19-41
[2]  
Abdi Abdinasir Hirsi, 2024, 2024 4th International Conference of Science and Information Technology in Smart Administration (ICSINTESA), P552, DOI 10.1109/ICSINTESA62455.2024.10747898
[3]   Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI, and MTD Approaches to Security Solutions [J].
Abdi, Abdinasir Hirsi ;
Audah, Lukman ;
Salh, Adeb ;
Alhartomi, Mohammed A. ;
Rasheed, Haroon ;
Ahmed, Salman ;
Tahir, Ahmed .
IEEE ACCESS, 2024, 12 :69941-69980
[4]   An Intrusion Detection System on Ping of Death Attacks in IoT Networks [J].
Abdollahi, Asrin ;
Fathi, Mohammad .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (04) :2057-2070
[5]   An Analysis of DHCP Vulnerabilities, Attacks, and Countermeasures [J].
AbdulGhaffar, AbdulAziz ;
Paul, Sumit Kumar ;
Matrawy, Ashraf .
2023 BIENNIAL SYMPOSIUM ON COMMUNICATIONS, BSC, 2023, :119-124
[6]   ELBA-IoT: An Ensemble Learning Model for Botnet Attack Detection in IoT Networks [J].
Abu Al-Haija, Qasem ;
Al-Dala'ien, Mu'awya .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (01)
[7]   Enabling traffic forecasting with cloud-native SDN controller in transport networks [J].
Adanza, Daniel ;
Gifre, Lluis ;
Alemany, Pol ;
Fernandez-Palacios, Juan-Pedro ;
Gonzalez-de-Dios, Oscar ;
Munoz, Raul ;
Vilalta, Ricard .
COMPUTER NETWORKS, 2024, 250
[8]   DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges [J].
Adedeji, Kazeem B. ;
Abu-Mahfouz, Adnan M. ;
Kurien, Anish M. .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2023, 12 (04)
[9]  
Adiwal S., 2023, Franklin Open, V2, P100010, DOI [DOI 10.1016/J.FRAOPE.2023.100010, 10.1016/j.fraope.2023.100010]
[10]   The evolution of Mirai botnet scans over a six-year period [J].
Affinito, Antonia ;
Zinno, Stefania ;
Stanco, Giovanni ;
Botta, Alessio ;
Ventre, Giorgio .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 79