DeMi: A Solution to Detect and Mitigate DoS Attacks in SDN

被引:8
作者
Eliyan, Lubna Fayez [1 ]
Di Pietro, Roberto [2 ]
机构
[1] Hamad Bin Khalifa Univ, Coll Sci & Engn, ICT Div, Doha, Qatar
[2] King Abdullah Univ Sci & Technol, RC3 Ctr, CEMSE Div, Thuwal 23955, Saudi Arabia
关键词
SDN; DoS; DDoS; security; detection; mitigation; load balancing; proof-of-work; DDOS ATTACKS; SERVICE ATTACKS; NEURAL-NETWORK; ENTROPY; DEFENSE; CHALLENGES; SCHEME; FLOW;
D O I
10.1109/ACCESS.2023.3301994
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-defined networking (SDN) is becoming more and more popular due to its key features of scalability and flexibility, simplifying network management and enabling innovations in the network architecture and protocols. In SDNs, the most crucial part is the controller, tasked with managing the entire network and configuring routes. Given its critical role, a failure or problem occurring at the controller may degrade and even collapse the entire SDN. A typical threat controllers are subject to is a Denial of Service (DoS) attack. To cope with the above-introduced threat, in this paper we propose a lightweight DoS attack detection and mitigation method (DeMi) as well as a heavy-load management module. The proposed solution for detection leverages a sample entropy approach coupled with an adaptive dynamic threshold considering an exponentially weighted moving average (EWMA); the mitigation approach is based on proof of work (PoW) combined with flow rule installations; and, the heavy-load management method implements a scheduling approach at the SDN controller. Results are staggering: for instance, when DeMi is deployed, in an attack scenario the number of exchanged control packets is roughly similar to the attack-free scenario-without DeMi, the number of control packets in the network is 2,7 times more than what experienced in an attack-free setting. As per the number of re-transmitted packets, again, DeMi is able to achieve a re-transmission rate similar to an attack-free scenario-without DeMi the of packets that need to be re-transmitted is roughly 3,7 times the number of packets re-transmission occurring in an attack-free scenario. Moreover, DeMi does not block legitimate traffic, contrary to other solutions in the literature. The novelty of the approach, the demonstrated complete end-to-end solution, and the quality of the achieved experimental results, other than being interesting on their own, do pave the way for further research in this field.
引用
收藏
页码:82477 / 82495
页数:19
相关论文
共 85 条
[1]  
Ahalawat A., 2019, Proceedings - International Conference on Vision Towards Emerging Trends in Communication and Networking, ViTECoN 2019, P1
[2]   Proposed statistical-based approach for detecting distribute denial of service against the controller of software defined network (SADDCS) [J].
AL-Adaileh, Mohammad A. ;
Anbar, Mohammed ;
Chong, Yung-Wey ;
Al-Ani, Ahmed .
1ST INTERNATIONAL CONFERENCE ON INDUSTRIAL, ELECTRICAL AND ELECTRONICS (ICIEE 2018), 2018, 218
[3]   Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review [J].
Aladaileh, Mohammad A. ;
Anbar, Mohammed ;
Hasbullah, Iznan H. ;
Chong, Yung-Wey ;
Sanjalawe, Yousef K. .
IEEE ACCESS, 2020, 8 :143985-143995
[4]  
[Anonymous], 2010, US
[5]  
[Anonymous], 2019, Proceedings - 2019 4th International Conference on Internet of Things: Smart Innovation and Usages, IoT-SIU 2019, P1
[6]   Detection of DDoS attacks and flash events using novel information theory metrics [J].
Behal, Sunny ;
Kumar, Krishan .
COMPUTER NETWORKS, 2017, 116 :96-110
[7]   On a New Csiszar's f-Divergence Measure [J].
Bhatia, P. K. ;
Singh, Surender .
CYBERNETICS AND INFORMATION TECHNOLOGIES, 2013, 13 (02) :43-57
[8]   Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks [J].
Bhayo, Jalal ;
Shah, Syed Attique ;
Hameed, Sufian ;
Ahmed, Awais ;
Nasir, Jamal ;
Draheim, Dirk .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 123
[9]  
Boite J, 2017, 2017 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (IEEE NETSOFT)
[10]   Entropy-based DoS Attack identification in SDN [J].
Carvalho, Ranyelson N. ;
Bordim, Jacir L. ;
Alchieri, Eduardo A. P. .
2019 IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2019, :627-634