SDNTruth: Innovative DDoS Detection Scheme for Software-Defined Networks (SDN)

被引:23
作者
Linhares, Tiago [1 ]
Patel, Ahmed [1 ]
Barros, Ana Luiza [1 ]
Fernandez, Marcial [1 ]
机构
[1] Univ Estadual Ceara UECE, Comp Sci Program, Dr Silas Munguba 1700,60-714-903, Fortaleza, CE, Brazil
关键词
Software Defined Networks (SDN); Network Functions Virtualization (NFV); Distributed Denial of Service (DDoS); Thread mitigation; Entropy; ATTACK DETECTION; INTRUSION DETECTION; MACHINE; ENTROPY; SYSTEM; ARCHITECTURE; DEFENSE;
D O I
10.1007/s10922-023-09741-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-Defined Networks (SDN) are a trending technology in the modern Internet by splitting control and data planes and using a central controller. An SDN controller provides flexible flow management at wire-speed packet forwarding in the Internet. The centralized control allows to implement detection and mitigation of security attacks inside the SDN controller. Typically, Distributed Denial of Service (DDoS) attacks pose an immense threat to Internet security. However, the prediction and prevention of DDoS attacks in SDN environments are a huge challenge. In this paper, we introduce a mechanism to mitigate DDoS attacks in SDN using statistical analysis and traffic entropy. To validate the proposal, a prototype was built in the Mininet tool. The accuracy and training time were compared against different Machine Learning algorithms. Finally, we expound on the effectiveness and limitation of the proposed solution as well as show our research plans and further research opportunities.
引用
收藏
页数:23
相关论文
共 53 条
[1]  
Andreas B., 2020, SMU Data Sci. Rev, V3, P8
[2]  
[Anonymous], 2017, Intrusion Detection Evaluation Dataset (CIC-IDS2017)
[3]   A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning [J].
Arturo Perez-Diaz, Jesus ;
Amezcua Valdovinos, Ismael ;
Choo, Kim-Kwang Raymond ;
Zhu, Dakai .
IEEE ACCESS, 2020, 8 :155859-155872
[4]   Network traffic classification: Techniques, datasets, and challenges [J].
Azab, Ahmad ;
Khasawneh, Mahmoud ;
Alrabaee, Saed ;
Choo, Kim-Kwang Raymond ;
Sarsour, Maysa .
DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (03) :676-692
[5]  
Barbosa R.R.R., 2010, SIMPLEWEB U TWENTE T
[6]   ENTROPY AND THE CENTRAL-LIMIT-THEOREM [J].
BARRON, AR .
ANNALS OF PROBABILITY, 1986, 14 (01) :336-342
[7]  
Braga R, 2010, C LOCAL COMPUT NETW, P408, DOI 10.1109/LCN.2010.5735752
[8]  
Can. Inst. for Cybersecurity, 2024, DDoS Evaluation Dataset (CIC-DDoS2019)
[9]  
Combs G., 2023, WIRESHARK NETWORK PR
[10]   Towards DDoS detection mechanisms in Software-Defined Networking [J].
Cui, Yunhe ;
Qian, Qing ;
Guo, Chun ;
Shen, Guowei ;
Tian, Youliang ;
Xing, Huanlai ;
Yan, Lianshan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 190