Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud

被引:68
作者
Phan, Trung, V [1 ]
Park, Minho [2 ]
机构
[1] Soongsil Univ, Dept Informat Commun Mat & Chem Convergence Techn, Seoul 156743, South Korea
[2] Soongsil Univ, Sch Elect Engn, Seoul 156743, South Korea
关键词
Distributed denial-of-service attacks; machine learning; software defined networks; network function virtualization; SOFTWARE-DEFINED NETWORKS; SECURITY;
D O I
10.1109/ACCESS.2019.2896783
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-defined networking (SDN) is the key outcome of extensive research efforts over the past few decades toward transforming the Internet infrastructure to be more programmable, configurable, and manageable. However, critical cyber-threats in the SDN-based cloud environment are rising rapidly, in which distributed denial-of-service (DDoS) attack is one of the most damaging cyber attacks. In this paper, we propose an efficient solution to tackle DDoS attacks in the SDN-based cloud environment. We first introduce a new hybrid machine learning model based on support vector machine and self-organizing map algorithms to improve the traffic classification. Then, we propose an enhanced history-based IP filtering scheme (eHIPF) to improve the attack detection rate and speed. Finally, we introduce a novel mechanism that combines both the hybrid machine learning model and the eHIPF scheme to make a DDoS attack defender for the SDN-based cloud environment. The testbed is implemented in an SDN-based cloud with service function chaining. Through practical experiments, the proposed DDoS attack defender is proven to outperform existing mechanisms for DDoS attack classification and detection. The comprehensive experiments conducted with various DDoS attack levels prove that the proposed mechanism is an effective, innovative approach to defend DDoS attacks in the SDN-based cloud.
引用
收藏
页码:18701 / 18714
页数:14
相关论文
共 37 条
[1]   Security in Software Defined Networks: A Survey [J].
Ahmad, Ijaz ;
Namal, Suneth ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2317-2346
[2]  
[Anonymous], 2000, INTRO SUPPORT VECTOR
[3]  
[Anonymous], SELF ORGANIZING MAPS
[4]   From laboratory to life: associating brain reward processing with real-life motivated behaviour and symptoms of depression in non-help-seeking young adults [J].
Bakker, Jindra M. ;
Goossens, Liesbet ;
Kumar, Poornima ;
Lange, Iris M. J. ;
Michielse, Stijn ;
Schruers, Koen ;
Bastiaansen, Jojanneke A. ;
Lieverse, Ritsaert ;
Marcelis, Machteld ;
van Amelsvoort, Therese ;
van Os, Jim ;
Myin-Germeys, Inez ;
Pizzagalli, Diego A. ;
Wichers, Marieke .
PSYCHOLOGICAL MEDICINE, 2019, 49 (14) :2441-2451
[5]  
BoNeSi, DDOS BOTN SIM
[6]  
Braga R, 2010, C LOCAL COMPUT NETW, P408, DOI 10.1109/LCN.2010.5735752
[7]  
CAIDA Datasets, AN INT TRAC 2015
[8]  
CAIDA Datasets, DDOS ATT 2007
[9]   Towards an Elastic Distributed SDN Controller [J].
Dixit, Advait ;
Hao, Fang ;
Mukherjee, Sarit ;
Lakshman, T. V. ;
Kompella, Ramana .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04)
[10]   DDoS attacks and defense mechanisms: classification and state-of-the-art [J].
Douligeris, C ;
Mitrokotsa, A .
COMPUTER NETWORKS, 2004, 44 (05) :643-666