Mitigation Services on SDN for Distributed Denial of Service and Denial of Service Attacks Using Machine Learning Techniques

被引:7
作者
Ramprasath, J. [1 ]
Krishnaraj, N. [2 ]
Seethalakshmi, V. [3 ]
机构
[1] Dr Mahalingam Coll Engn & Technol, Dept Informat Technol, Pollachi, Tamil Nadu, India
[2] Vellore Inst Technol, Sch Comp Sci & Engn, Dept Database Syst, Vellore, Tamil Nadu, India
[3] KPR Inst Engn & Technol, Dept Elect & Commun Engn, Coimbatore, Tamil Nadu, India
关键词
DDoS; DoS; Openflow; Software-defined networking; Traffic analysis;
D O I
10.1080/03772063.2022.2142163
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Software-Defined Networking (SDN) offers an innovative model over the separation of the data plane, control plane and management plane. This separation would result in more effective network management, including cost reductions for hardware and manpower, and the ability to deliver on-demand solutions using programmable SDN approaches. As network policy and on-demand services become more impartial, SDN is becoming more popular. However, there are safety risks associated with the SDN network due to malicious floods such as Distributed Denial of Service (DDoS) attacks and Denial of Service (DoS) attacks directed at the SDN Controller, OpenFlow Virtual Switch (OVS), and end nodes, which must be addressed. Because of these assaults, network throughput is reduced, resulting in a lapse in the availability of network services and a reduction in business operations. The main emphasis of this study is on the detection and mitigation of DDoS and DoS assaults in the SDN network, which is accomplished by the use of both unsupervised and supervised learning approaches. The use of the Dynamic Access Control List (DACL) allows for the performance of mitigation operations in the SDN network, which has been implemented using the mininet. The outcome of the experiment demonstrates that malicious (DDoS and DoS) flood is reduced as a consequence of the mitigation technique.
引用
收藏
页码:70 / 81
页数:12
相关论文
共 25 条
[1]  
Abbas O.G., 2020, INT J ENG RES TECHNO, V9, P2020
[2]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[3]   Feature Extraction-based Medical Image Watermarking Using Fuzzy-based Median Filter [J].
Balasamy, K. ;
Shamia, D. .
IETE JOURNAL OF RESEARCH, 2023, 69 (01) :83-91
[4]   A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD [J].
Balasamy, K. ;
Suganyadevi, S. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (05) :7167-7186
[5]  
Balasamy K., 2021, Smart Healthcare System Design: Security and Privacy Aspects, DOI [10.1002/9781119792253.ch9, DOI 10.1002/9781119792253.CH9]
[6]   SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks [J].
Cui, Yunhe ;
Yan, Lianshan ;
Li, Saifei ;
Xing, Huanlai ;
Pan, Wei ;
Zhu, Jian ;
Zheng, Xiaoyang .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 68 :65-79
[7]  
Das Vipin, 2010, International Journal of Computer Science & Information Technology, V2, P138, DOI 10.5121/ijcsit.2010.2613
[8]   Cost-Efficient Mapping for Fault-Tolerant Virtual Networks [J].
Jarray, Abdallah ;
Karmouch, Ahmed .
IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (03) :668-681
[9]   Implementation of Energy Aware Modified Distance Vector Routing Protocol for Energy Efficiency in Wireless Sensor Networks [J].
Krishnaraj, N. ;
Kumar, R. Bhuvanesh ;
Rajeshwar, D. ;
Kumar, T. Sanjay .
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, :201-204
[10]   A Multihoming ACO-MDV Routing for Maximum Power Efficiency in an IoT Environment [J].
Krishnaraj, N. ;
Smys, S. .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (01) :243-256