An SDN-Assisted Defense Mechduanism for the Shrew DDoS Attack in a Cloud Computing Environment

被引:28
作者
Agrawal, Neha [1 ]
Tapaswi, Shashikala [2 ]
机构
[1] Indian Inst Informat Technol Sri City, Comp Sci & Engn Grp, Chittoor, Andhra Pradesh, India
[2] ABV Indian Inst Informat Technol & Management, Gwalior, India
关键词
Cloud computing security; Software defined networking (SDN); SDN-Cloud (SDN-C); Low-rate DDoS (LR-DDoS) attack; Shrew attack; Performance analysis; SOFTWARE-DEFINED NETWORKING; PACKET MARKING; IP TRACEBACK; TAXONOMY; SCHEMES; TRENDS;
D O I
10.1007/s10922-020-09580-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of cloud computing with Software Defined Networking (SDN) addresses several challenges of a typical cloud infrastructure such as complex inter-networking, data collection, fast response, etc. Though SDN-based cloud opens new opportunities, the SDN controller may itself become vulnerable to several attacks. The unique features of SDN are used by the attackers to implement the severe Distributed Denial of Service (DDoS) attacks. Several approaches are available in literature to defend against the traditional DDoS flooding attacks in SDN-cloud. To elude the detection systems, attackers try to employ the cultivated attack strategies. Such sophisticated DDoS attack strategies are implemented by generating low-rate attack traffic. The most common type of Low-Rate DDoS (LR-DDoS) attack is the Shrew attack. The existing approaches are not capable to detect, mitigate, and traceback such attacks. Thus, this work discusses a new mechanism which not only detects and mitigates the shrew attack but traces back the location of the attack sources as well. The attack is detected using the information entropy variations, and the attack sources are traced-back using the deterministic packet marking scheme. The experiments are performed in a real SDN-cloud scenario, and the experimental results show that the approach requires 1 packet and 8.27 packets on an average to locate the bots and attackers respectively. The approach detects and traces back the attack sources in between 14.45 ms to 10.02 s and provides 97.6% accuracy.
引用
收藏
页数:28
相关论文
共 57 条
[1]   A proactive defense method for the stealthy EDoS attacks in a cloud environment [J].
Agrawal, Neha ;
Tapaswi, Shashikala .
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2020, 30 (02)
[2]   Detection of Low-Rate Cloud DDoS Attacks in Frequency Domain Using Fast Hartley Transform [J].
Agrawal, Neha ;
Tapaswi, Shashikala .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (03) :1735-1762
[3]   Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges [J].
Agrawal, Neha ;
Tapaswi, Shashikala .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3769-3795
[4]   A Lightweight Approach to Detect the Low/High Rate IP Spoofed Cloud DDoS Attacks [J].
Agrawal, Neha ;
Tapaswi, Shashikala .
2017 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICE COMPUTING (SC2 2017), 2017, :118-123
[5]   Low rate cloud DDoS attack defense method based on power spectral density analysis [J].
Agrawal, Neha ;
Tapaswi, Shashikala .
INFORMATION PROCESSING LETTERS, 2018, 138 :44-50
[6]   Defense schemes for variants of distributed denial-of-service (DDoS) attacks in cloud computing: A survey [J].
Agrawal N. ;
Tapaswi S. .
Information Security Journal, 2017, 26 (02) :61-73
[7]  
[Anonymous], FLOWVISOR OPENFLOW C
[8]  
[Anonymous], MININET
[9]  
[Anonymous], LOW ORBIT ION CANON
[10]  
[Anonymous], OpenDayLight SDN controller