A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks

被引:32
作者
Alashhab, Abdussalam Ahmed [1 ,2 ]
Zahid, Mohd Soperi Mohd [1 ]
Azim, Mohamed A. [3 ]
Daha, Muhammad Yunis [1 ]
Isyaku, Babangida [4 ]
Ali, Shimhaz [5 ]
机构
[1] Univ Teknol Petronas, Dept Comp & Informat Sci, Seri Iskandar 32610, Perak, Malaysia
[2] Alasmarya Islamic Univ, Fac Informat Technol, Zliten, Libya
[3] Univ Prince Mugrin, Dept Comp Sci, Medina 40202, Saudi Arabia
[4] Sule Lamido Univ, Dept Comp Sci, PMB 048, Kafin Hausa, Jigawa State, Nigeria
[5] Univ Sains Islam Malaysia, Fac Informat Technol, Nilai 71800, Negeri Sembilan, Malaysia
来源
SYMMETRY-BASEL | 2022年 / 14卷 / 08期
关键词
network security; SDN; OpenFlow; DDoS attacks; low-rate DDoS attacks; machine learning; detection mechanisms; ATTACK DETECTION; DEFENSE-MECHANISMS; SERVICE ATTACKS; SDN; MITIGATION; ALGORITHM; SECURITY; SLOW;
D O I
10.3390/sym14081563
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Software-defined networking (SDN) is a new networking paradigm that provides centralized control, programmability, and a global view of topology in the controller. SDN is becoming more popular due to its high audibility, which also raises security and privacy concerns. SDN must be outfitted with the best security scheme to counter the evolving security attacks. A Distributed Denial-of-Service (DDoS) attack is a network attack that floods network links with illegitimate data using high-rate packet transmission. Illegitimate data traffic can overload network links, causing legitimate data to be dropped and network services to be unavailable. Low-rate Distributed Denial-of-Service (LDDoS) is a recent evolution of DDoS attack that has been emerged as one of the most serious vulnerabilities for the Internet, cloud computing platforms, the Internet of Things (IoT), and large data centers. Moreover, LDDoS attacks are more challenging to detect because this attack sends a large amount of illegitimate data that are disguised as legitimate traffic. Thus, traditional security mechanisms such as symmetric/asymmetric detection schemes that have been proposed to protect SDN from DDoS attacks may not be suitable or inefficient for detecting LDDoS attacks. Therefore, more research studies are needed in this domain. There are several survey papers addressing the detection mechanisms of DDoS attacks in SDN, but these studies have focused mainly on high-rate DDoS attacks. Alternatively, in this paper, we present an extensive survey of different detection mechanisms proposed to protect the SDN from LDDoS attacks using machine learning approaches. Our survey describes vulnerability issues in all layers of the SDN architecture that LDDoS attacks can exploit. Current challenges and future directions are also discussed. The survey can be used by researchers to explore and develop innovative and efficient techniques to enhance SDN's protection against LDDoS attacks.
引用
收藏
页数:30
相关论文
共 121 条
[11]   APPLICATION OF THE BACK PROPAGATION NEURAL NETWORK ALGORITHM WITH MONOTONICITY CONSTRAINTS FOR 2-GROUP CLASSIFICATION PROBLEMS [J].
ARCHER, NP ;
WANG, SH .
DECISION SCIENCES, 1993, 24 (01) :60-75
[12]   Clustered linear regression [J].
Ari, B ;
Güvenir, HA .
KNOWLEDGE-BASED SYSTEMS, 2002, 15 (03) :169-175
[13]   A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning [J].
Arturo Perez-Diaz, Jesus ;
Amezcua Valdovinos, Ismael ;
Choo, Kim-Kwang Raymond ;
Zhu, Dakai .
IEEE ACCESS, 2020, 8 :155859-155872
[14]   A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks [J].
Balarezo, Juan Fernando ;
Wang, Song ;
Chavez, Karina Gomez ;
Al-Hourani, Akram ;
Kandeepan, Sithamparanathan .
ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2022, 31
[15]   DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions [J].
Bawany, Narmeen Zakaria ;
Shamsi, Jawwad A. ;
Salah, Khaled .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (02) :425-441
[16]   An East-West interface for distributed SDN control plane: Implementation and evaluation [J].
Benamrane, Fouad ;
Ben Mamoun, Mouad ;
Benaini, Redouane .
COMPUTERS & ELECTRICAL ENGINEERING, 2017, 57 :162-175
[17]   Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment [J].
Bhushan, Kriti ;
Gupta, B. B. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (05) :1985-1997
[18]   An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
PATTERN RECOGNITION LETTERS, 2015, 51 :1-7
[19]   A random forest guided tour [J].
Biau, Gerard ;
Scornet, Erwan .
TEST, 2016, 25 (02) :197-227
[20]   ST-DBSCAN: An algorithm for clustering spatial-temp oral data [J].
Birant, Derya ;
Kut, Alp .
DATA & KNOWLEDGE ENGINEERING, 2007, 60 (01) :208-221