DDoS detection and defense mechanism based on cognitive-inspired computing in SDN

被引:61
作者
Cui, Jie [1 ,3 ]
Wang, Mingjun [1 ,3 ]
Luo, Yonglong [2 ]
Zhong, Hong [1 ,3 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei 230039, Anhui, Peoples R China
[2] Anhui Prov Key Lab Network & Informat Secur, Wuhu 241002, Anhui, Peoples R China
[3] Anhui Univ, Anhui Engn Lab IoT Secur Technol, Hefei 230039, Anhui, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 97卷
基金
中国国家自然科学基金;
关键词
DDoS; SDN; Entropy; Cognitive-inspired computing;
D O I
10.1016/j.future.2019.02.037
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Software-defined networking (SDN) provides a promising architecture for future networks, and can provide advantages as central control programmability and global view. However, it faces numerous security challenges. Distributed denial of service (DDoS) is a security threat to SDN. Most existing schemes only perform DDoS attack detection and do not address how to defend and recover after detecting DDoS. In this paper, a DDoS attack detection and defense mechanism based on cognitive-inspired computing with dual address entropy is proposed. The flow table characteristics of the switch are extracted, and a DDoS attack model is built by incorporating the support vector machine classification algorithm. This mechanism can realize real-time detection and defense at the preliminary stage of the DDoS attack and can restore normal communication in time. The experiment shows that our mechanism not only detects attacks quickly but also has a high detection rate and low false positive rate. More importantly, it can take appropriate defense and recovery measures in the time after the attack has been identified. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:275 / 283
页数:9
相关论文
共 22 条
[1]   Profiling and classifying the behavior of malicious codes [J].
Alazab, Mamoun .
JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 100 :91-102
[2]   A cognitive inspired unsupervised language-independent text stemmer for Information retrieval [J].
Alotaibi, Fahd Saleh ;
Gupta, Vishal .
COGNITIVE SYSTEMS RESEARCH, 2018, 52 :291-300
[3]  
[Anonymous], 2015, LOGIN
[4]  
Berde Pankaj, 2014, P 3 WORKSHOP HOT TOP, P1, DOI 10.1145
[5]   Integration of Cloud computing and Internet of Things: A survey [J].
Botta, Alessio ;
de Donato, Walter ;
Persico, Valerio ;
Pescape, Antonio .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 :684-700
[6]  
Braga R, 2010, C LOCAL COMPUT NETW, P408, DOI 10.1109/LCN.2010.5735752
[7]  
Ganjali Y., 2011, P INT NETW MAN C RES, P3
[8]   Network Function Virtualization: Challenges and Opportunities for Innovations [J].
Han, Bo ;
Gopalakrishnan, Vijay ;
Ji, Lusheng ;
Lee, Seungjoon .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (02) :90-97
[9]   Algorithm runtime prediction: Methods & evaluation [J].
Hutter, Frank ;
Xu, Lin ;
Hoos, Holger H. ;
Leyton-Brown, Kevin .
ARTIFICIAL INTELLIGENCE, 2014, 206 :79-111
[10]  
Kalkan K, 2017, IEEE SYMP COMP COMMU, P669, DOI 10.1109/ISCC.2017.8024605