Research on DDoS Attack Detection in Software Defined Network

被引:0
作者
Ma Zhao-hui [1 ,2 ]
Zhao Gan-sen [1 ]
Li Wei-wen [2 ]
Mo Ze-feng [3 ]
Wang Xin-ming [1 ]
Chen Bing-chuan [4 ,5 ]
Lin Cheng-chuang [1 ]
机构
[1] South China Normal Univ, Sch Comp Sci, Guangzhou 510631, Peoples R China
[2] Guangdong Univ Foreign Studies, Sch Informat Sci & Technol, Guangzhou 510006, Peoples R China
[3] South China Normal Univ, Sch Math Sci, Guangzhou 510631, Peoples R China
[4] Guangdong Univ Finance & Econ, Sch Stat & Math, Guangzhou 510320, Peoples R China
[5] Jilin Univ, Key Lab Symbol Computat & Knowledge Engn, Minist Educ, Changchun 130012, Peoples R China
来源
2018 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, BIG DATA AND BLOCKCHAIN (ICCBB 2018) | 2018年
基金
高等学校博士学科点专项科研基金;
关键词
Software Defined Network; Distributed Denial of Service; k-means; attack detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software Defined Network(SDN) is a new network construction. But due to its construction, SDN is vulnerable to be attacked by Distributed Denial of Service (DDoS) attack. So it is important to detect DDoS attack in SDN network. This paper presents a DDoS detection scheme based on k-means algorithm in SDN environment. The establishment of this scheme is based on the two hypotheses that the daily network works normally most of the time, and there is a significant difference between the data characteristics of normal situation and abnormal situation. At the same time, these two hypotheses are also true to the daily network condition. After demonstrating the validity of k-means clustering algorithm, the paper proposes 5 flow table features that can be used to detect DDoS attacks. Finally, the DDoS detection scheme was tested by simulation experiment. The test results showed that the method proposed by the author could effectively detect DDoS, with an average success rate of 97.78%.
引用
收藏
页码:17 / 22
页数:6
相关论文
共 10 条
[1]  
Cai Jiye, 2018, COMPUTER APPL RES, P1
[2]  
Fu Xiao, 2015, J NANJING U POSTS TE, V35, P84
[3]  
Liu Shihui, 2017, FLOOD FLOODING ATTAC
[4]  
Mei Mengzhe, 2016, RES DDOS ATTACK DETE
[5]  
Sun Guoyou, 2017, RES SAFE RELIABLE NE
[6]  
Wang Xiaorui, 2018, COMPUTER APPL RES, P911
[7]  
Xu Xiaodong, 2013, WIRELESS COMMUNICATI, V22, P21
[8]  
Xu Xiaoqiong, 2017, ZTE Communications, V15, P13, DOI 10.3969/j.issn.1673-5188.2017.03.003
[9]  
Yao Linyuan, 2007, J ELECT INFORM, V39, P381
[10]  
Zheng Zhixian, 2016, J HUBEI 2 NORMAL U, V33, P36