FADM: DDoS Flooding Attack Detection and Mitigation System in Software-Defined Networking

被引:0
作者
Hu, Dingwen [1 ]
Hong, Peilin [1 ]
Chen, Yixin [1 ]
机构
[1] Univ Sci & Technol China, Sch Informat Sci & Technol, Key Lab Wireless Opt Commun, Hefei 230027, Anhui, Peoples R China
来源
GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE | 2017年
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Distributed Denial-of-Service (DDoS) flooding attack is one of the most serious threats to network security. Software-Defined Networking (SDN) has recently emerged as a new network management platform, and its centralized control architecture brings many new opportunities for defending against network attacks. In this paper, we propose FADM, an efficient and lightweight framework to detect and mitigate DDoS attacks in SDN. Firstly, the network traffic information is collected through the SDN controller and sFlow agents. Then an entropy-based method is used to measure network features, and the SVM classifier is applied to identify network anomalies. By adopting these methods together, the timeliness and accuracy of attack detection are effectively improved. To keep the major network functionality working, we propose an efficient attack mitigation mechanism based on the white-list and traffic migration. By introducing the mitigation agent to the network, attack traffic can be timely blocked while benign traffic can be forwarded as usual, which prevents the controller resources from being exhausted and ensures that legitimate users can access the network normally. The experimental results show that multiple DDoS attacks can be accurately detected and effectively mitigated by FADM, which enables the network to recover in a short time.
引用
收藏
页数:7
相关论文
共 19 条
[1]  
[Anonymous], 2001, INMON CORPORATIONS S
[2]  
Braga R, 2010, C LOCAL COMPUT NETW, P408, DOI 10.1109/LCN.2010.5735752
[3]  
Buragohain Chaitanya, 2016, 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN), P519, DOI 10.1109/SPIN.2016.7566750
[4]  
Chang C.-C., 2011, LIBSVM LIB SUPPORT V
[5]  
CORTES C, 1995, MACH LEARN, V20, P273, DOI 10.1023/A:1022627411411
[6]   Combining Open Flow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments [J].
Giotis, K. ;
Argyropoulos, C. ;
Androulidakis, G. ;
Kalogeras, D. ;
Maglaris, V. .
COMPUTER NETWORKS, 2014, 62 :122-136
[7]  
Hilton Scott., DYN ANAL SUMMARY FRI
[8]  
InMon, SFLOW RT
[9]  
Kokila RT, 2014, INT CONF ADV COMPU, P205, DOI 10.1109/ICoAC.2014.7229711
[10]   Mining anomalies using traffic feature distributions [J].
Lakhina, A ;
Crovella, M ;
Diot, C .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2005, 35 (04) :217-228