Towards DDoS detection mechanisms in Software-Defined Networking

被引:55
作者
Cui, Yunhe [1 ]
Qian, Qing [2 ]
Guo, Chun [1 ]
Shen, Guowei [1 ]
Tian, Youliang [1 ]
Xing, Huanlai [3 ]
Yan, Lianshan [3 ]
机构
[1] Guizhou Univ, Sch Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang, Peoples R China
[2] GuiZhou Univ Finance & Econ, Sch Informat, Guiyang, Peoples R China
[3] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu, Peoples R China
基金
中国国家自然科学基金;
关键词
Distributed Denial of Service; Attack detection; Software-Defined Networking; OpenFlow; INTRUSION DETECTION SYSTEM; ATTACK DETECTION; NEURAL-NETWORK; SDN SWITCHES; DEFENSE; MACHINE; MITIGATION; PROTECTION; SECURITY; ARCHITECTURE;
D O I
10.1016/j.jnca.2021.103156
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Software-Defined Networking (SDN) is widely considered as one of the next generation network architecture. However, SDN faces with a series of issues which restraint its development and application, where the security is one of the serious issues. The Distributed Denial of Service (DDoS) is such a devastating security problem. In this work, a comprehensive review of the DDoS detection mechanisms utilized in SDN is presented. DDoS attacks in SDN are classified into two types and five subtypes based on the features of DDoS and SDN. For each kind of DDoS, how the attackers can exploit the vulnerabilities of SDN to launch DDoS attacks is discussed. Subsequently, the DDoS detection mechanisms used in SDN are reviewed and categorized into five types and forty-six subtypes. These kinds of DDoS detection mechanisms are compared and analyzed, where we draw a conclusion that the machine learning-based DDoS detection mechanisms and threshold-based DDoS detection mechanisms are the two most popular technologies utilized to detect DDoS attacks in SDN. More importantly, for each kind of DDoS detection mechanism, the generational process, advantages, and disadvantages are discussed. Additionally, the open problems and future directions of DDoS detection in SDN are discussed. By presenting these review, discussion and analysis, we hope it can facilitate the understanding of DDoS detection in SDN.
引用
收藏
页数:37
相关论文
共 211 条
[1]   An SDN-Assisted Defense Mechduanism for the Shrew DDoS Attack in a Cloud Computing Environment [J].
Agrawal, Neha ;
Tapaswi, Shashikala .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2021, 29 (02)
[2]  
Ahmed ME, 2017, IEEE MILIT COMMUN C, P11, DOI 10.1109/MILCOM.2017.8170802
[3]   Wireless software-defined networks (W-SDNs) and network function virtualization (NFV) for 5G cellular systems: An overview and qualitative evaluation [J].
Akyildiz, Ian F. ;
Lin, Shih-Chun ;
Wang, Pu .
COMPUTER NETWORKS, 2015, 93 :66-79
[4]   Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review [J].
Aladaileh, Mohammad A. ;
Anbar, Mohammed ;
Hasbullah, Iznan H. ;
Chong, Yung-Wey ;
Sanjalawe, Yousef K. .
IEEE ACCESS, 2020, 8 :143985-143995
[5]  
Aleroud A, 2016, IEEE IFIP NETW OPER, P853, DOI 10.1109/NOMS.2016.7502914
[6]  
Alshamrani A, 2017, PROCEEDINGS OF THE 15TH ACM INTERNATIONAL SYMPOSIUM ON MOBILITY MANAGEMENT AND WIRELESS ACCESS, MOBIWAC 2017, P83, DOI 10.1145/3132062.3132074
[7]  
Viet AN, 2017, 2017 14TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING/ELECTRONICS, COMPUTER, TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY (ECTI-CON), P660, DOI 10.1109/ECTICon.2017.8096324
[8]   SDN-assisted efficient LTE-WiFi aggregation in next generation IoT networks [J].
Anbalagan, Sudha ;
Kumar, Dhananjay ;
Faustina, Mercy J. ;
Raja, Gunasekaran ;
Ejaz, Waleed ;
Bashir, Ali Kashif .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 :898-908
[9]  
[Anonymous], 2013, Open Networking Foundation (ONF)
[10]  
[Anonymous], 2021, BIG SWITCH NETWORKS