Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks

被引:3
作者
Hirsi, Abdinasir [1 ]
Alhartomi, Mohammed A. [2 ,3 ]
Audah, Lukman [1 ,4 ]
Salh, Adeb [5 ]
Sahar, Nan Mad [4 ]
Ahmed, Salman [6 ]
Ansa, Godwin Okon [7 ]
Farah, Abdullahi [8 ]
机构
[1] Univ Tun Hussein Onn Malaysia, Fac Elect & Elect Engn, ATRC, Parit Raja 86400, Malaysia
[2] Univ Tabuk, Dept Elect Engn, Tabuk 71491, Saudi Arabia
[3] Univ Tabuk, Innovat & Entrepreneurship Ctr IEC, Tabuk 71491, Saudi Arabia
[4] Univ Tun Hussein Onn Malaysia, Fac Elect & Elect Engn, Parit Raja 86400, Malaysia
[5] UTAR, Fac Informat & Commun Technol, Kampar, Malaysia
[6] Univ Tun Hussein Onn Malaysia, Fac Elect & Elect Engn, VLSI & Embedded Technol VEST Focus Grp, Parit Raja 86400, Malaysia
[7] Akwa Ibom State Univ, Fac Phys Sci, Dept Comp Sci, Uyo 520101, Akwa Ibom State, Nigeria
[8] Somtel Telecommun Co, Engn Dept, Bosaso 25290, Bari, Somalia
关键词
Computer crime; Surveys; Denial-of-service attack; Taxonomy; Security; Floods; Anomaly detection; Software defined networking; Reviews; Hardware; Amplification attacks; anomaly detection; botnet attacks; DDoS detection; flooding attacks; protocol attacks; reflection attacks; SDN security; software-defined networking (SDN); taxonomy of DDoS attacks; FLOODING ATTACK DETECTION; DEFENSE-MECHANISMS; DETECTION SYSTEM; BOTNET DETECTION; SDN; OPENFLOW; SERVICE; EFFICIENT; SECURITY; PROGRAMMABILITY;
D O I
10.1109/ACCESS.2025.3535943
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-Defined Networking (SDN) offers significant advantages for modern networks, including flexibility, centralized control, and reduced dependency on vendor-specific hardware. However, these benefits introduce security vulnerabilities, particularly from Distributed Denial-of-Service (DDoS) attacks, which represent some of the most disruptive threats to SDN environments. A review of the literature shows that while various techniques have been proposed to counteract DDoS threats, many studies have focused on single detection methods, with only a few utilizing multiple approaches. This fragmented focus limits a comprehensive approach to addressing DDoS threats across the SDN layers. To bridge this gap, this paper presents the first comprehensive review of DDoS anomaly detection in SDN, examining over 165 primary research articles published between 2020 and 2024. A novel taxonomy of DDoS attacks is introduced, categorizing them by distinct characteristics, and mapping each attack type to relevant detection methods within specific SDN layers. The survey provides a layer-by-layer analysis of DDoS detection techniques, covering the application, control, and infrastructure layers, and offers a structured overview that clarifies the applicability and effectiveness of each method. The paper concludes by synthesizing key findings, identifying unresolved challenges, and outlining future research directions to advance DDoS detection mechanisms in SDN. This roadmap is designed to guide researchers in addressing security vulnerabilities and enhancing SDN resilience against evolving DDoS threats.
引用
收藏
页码:23013 / 23071
页数:59
相关论文
共 293 条
[71]  
Dhingra A., 2022, P INT C COMM COMP IN, P1
[72]   SYN Flood Attack Detection and Mitigation using Machine Learning Traffic Classification and Programmable Data Plane Filtering [J].
Dimolianis, Marinos ;
Pavlidis, Adam ;
Maglaris, Vasilis .
2021 24TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN), 2021,
[73]   DDoS attack identification based on SDN [J].
Dobrin, Dobrev ;
Dimiter, Avresky .
2021 IEEE 20TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2021,
[74]   DNSGuard: In-Network Defense Against DNS Attacks [J].
Duan, Guanglin ;
Li, Qing ;
Zhang, Zhengxin ;
Zhao, Dan ;
Xie, Guorui ;
Yang, Yuan ;
Yuan, Zhenhui ;
Jiang, Yong ;
Xu, Mingwei .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) :597-613
[75]   DeMi: A Solution to Detect and Mitigate DoS Attacks in SDN [J].
Eliyan, Lubna Fayez ;
Di Pietro, Roberto .
IEEE ACCESS, 2023, 11 :82477-82495
[76]   OFaaS: OpenFlow Switch as a Service for Multi Tenant Slicing in SD-CDN [J].
Erel-Ozcevik, Muge ;
Canberk, Berk .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (01) :362-373
[77]   Web attack detection using deep learning models [J].
Eunaicy, J. I. Christy ;
Suguna, S. .
MATERIALS TODAY-PROCEEDINGS, 2022, 62 :4806-4813
[78]   IDS Performance Analysis using Anomaly-based Detection Method for DOS Attack [J].
Fadhlillah, Aghnia ;
Karna, Nyoman ;
Irawan, Arif .
2020 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND INTELLIGENCE SYSTEM (IOTAIS), 2021, :18-22
[79]   SDToW: A Slowloris Detecting Tool for WMNs [J].
Faria, Vinicius da Silva ;
Goncalves, Jessica Alcantara ;
Silva, Camilla Alves Mariano da ;
Vieira, Gabriele de Brito ;
Mascarenhas, Dalbert Matos .
INFORMATION, 2020, 11 (12) :1-18
[80]   Security and Privacy Issues in Software-Defined Networking (SDN): A Systematic Literature Review [J].
Farooq, Muhammad Shoaib ;
Riaz, Shamyla ;
Alvi, Atif .
ELECTRONICS, 2023, 12 (14)