Effectiveness of Entropy-Based DDoS Prevention for Software Defined Networks

被引:0
作者
Whittle, Cameron S. [1 ]
Liu, Hong [2 ]
机构
[1] Gen Dynam Miss Syst, Maritime & Strateg Syst, Pittsfield, MA USA
[2] Univ Massachusetts Dartmouth, Dept Elect & Comp Engn, N Dartmouth, MA USA
来源
2021 IEEE VIRTUAL IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY | 2021年
关键词
software defined networks (SDN); distributed denial-of-service (DDoS) attacks; botnet; statistical defending approaches; machine learning to anomaly detection;
D O I
10.1109/HST53381.2021.9619830
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work investigates entropy-based prevention of Distributed Denial-of-Service (DDoS) attacks for Software Defined Networks (SDN). The experiments are conducted on a virtual SDN testbed setup within Mininet, a Linux-based network emulator. An arms race iterates on the SDN testbed between offense, launching botnet-based DDoS attacks with progressive sophistications, and defense who is deploying SDN controls with emerging technologies from other faucets of cyber engineering. The investigation focuses on the transmission control protocol's synchronize flood attack that exploits vulnerabilities in the three-way TCP handshake protocol, to lock up a host from serving new users. The defensive strategy starts with a common packet filtering-based design from the literature to mitigate attacks. Utilizing machine learning algorithms, SDNs actively monitor all possible traffic as a collective dataset to detect DDoS attacks in real time. A constant upgrade to a stronger defense is necessary, as cyber/network security is an ongoing front where attackers always have the element of surprise. The defense further invests on entropy methods to improve early detection of DDoS attacks within the testbed environment. Entropy allows SDNs to learn the expected normal traffic patterns for a network as a whole using real time mathematical calculations, so that the SDN controllers can sense the distributed attack vectors building up before they overwhelm the network. This work reveals the vulnerabilities of SDNs to stealthy DDoS attacks and demonstrates the effectiveness of deploying entropy in SDN controllers for detection and mitigation purposes. Future work includes provisions to use these entropy detection methods, as part of a larger system, to redirect traffic and protect networks dynamically in real time. Other types of DoS, such as ransomware, will also be considered.
引用
收藏
页数:7
相关论文
共 17 条
[1]  
Ali S., 2020, INT C ADV EM COMP TE
[2]  
Aly WHF, 2018, 2018 FIFTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), P217, DOI 10.1109/SDS.2018.8370446
[3]  
Anandkumar26, 2015, DDOSATTACK SDN
[4]  
Baker D. Z., 2019, IEEE INT S TECHNOLOG
[5]  
Bavani K, 2020, INT CONF ADVAN COMPU, P380, DOI 10.1109/ICACCS48705.2020.9074231
[6]   A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios [J].
Dantas Silva, Felipe S. ;
Silva, Esau ;
Neto, Emidio P. ;
Lemos, Marcilio ;
Venancio Neto, Augusto J. ;
Esposito, Flavio .
SENSORS, 2020, 20 (11)
[7]  
Dhayal H., 2018, IEEE XPLORE IEEE C P
[8]  
Hadianto R, 2018, ARPN J ARPN J ENG AP
[9]  
Jagan103, 2019, DDOS SDN
[10]   Long Short-Term Memory and Fuzzy Logic for Anomaly Detection and Mitigation in Software-Defined Network Environment [J].
Novaes, Matheus P. ;
Carvalho, Luiz F. ;
Lloret, Jaime ;
Proenca Jr, Mario Lemes .
IEEE ACCESS, 2020, 8 :83765-83781