A Heterogeneous Defense Method using Fuzzy Decision Making

被引:0
作者
Rezaei, A. A. [1 ]
Mohammadifar, R. [1 ]
Lotfi, E. [2 ]
Khosravi, A. [3 ]
Nahavandi, S. [4 ,5 ]
机构
[1] Payam E Noor Univ, Dept Comp Engn, Tehran, Iran
[2] Islamic Azad Univ, Torbat E Jam Branch, Dept Comp Engn, Torbat E Jam, Iran
[3] Deakin Univ, Ctr Intelligence Syst Res, Geelong, Vic 3217, Australia
[4] Deakin Univ, Engn, 75 Pigdons Rd, Waurn Ponds, Vic 3216, Australia
[5] Deakin Univ, Ctr Intelligent Syst Res, 75 Pigdons Rd, Waurn Ponds, Vic 3216, Australia
来源
2017 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE) | 2017年
关键词
Fuzzy decision making; Software Defined Networks; DDoS attacks; Flood attacks; SOFTWARE-DEFINED NETWORKING; DDOS ATTACKS; FRAMEWORK; OPENFLOW;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Denial of service flood attacks are among the most common and powerful attacks which abuse the computational resources and the bandwidth of a network. In this paper, a heterogeneous defense method is proposed based on a combination of the Software Defined controller and fuzzy decision making. Numerical results show that the proposed method has a lower computational load and response time compared to the traditional methods centralized in the controller.
引用
收藏
页数:8
相关论文
共 44 条
  • [1] [Anonymous], 2014, 2014 AL TA14 017A UD
  • [2] [Anonymous], 2012, P USENIX HOT ICE
  • [3] [Anonymous], 2011, PROCEDIA COMPUTER SC
  • [4] An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
    Bhuyan, Monowar H.
    Bhattacharyya, D. K.
    Kalita, J. K.
    [J]. PATTERN RECOGNITION LETTERS, 2015, 51 : 1 - 7
  • [5] Bojadziev G., 2007, Fuzzy Logic for Business, Finance, and Management Modeling, V2nd
  • [6] Borcoci E., 2013, 5 INT C ADV FUT INT
  • [7] Braga R, 2010, C LOCAL COMPUT NETW, P408, DOI 10.1109/LCN.2010.5735752
  • [8] SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks
    Cui, Yunhe
    Yan, Lianshan
    Li, Saifei
    Xing, Huanlai
    Pan, Wei
    Zhu, Jian
    Zheng, Xiaoyang
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 68 : 65 - 79
  • [9] Statistical approaches to DDoS attack detection and response
    Feinstein, L
    Schnackenberg, D
    Balupari, R
    Kindred, D
    [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, 2003, : 303 - 314
  • [10] OPERETTA: An OPEnflow-based REmedy to mitigate TCP SYNFLOOD Attacks against web servers
    Fichera, Silvia
    Galluccio, Laura
    Grancagnolo, Salvatore C.
    Morabito, Giacomo
    Palazzo, Sergio
    [J]. COMPUTER NETWORKS, 2015, 92 : 89 - 100