Entropy-Based Approach to Detect DDoS Attacks on Software Defined Networking Controller

被引:10
作者
Aladaileh, Mohammad [1 ]
Anbar, Mohammed [1 ]
Hasbullah, Iznan H. [1 ]
Sanjalawe, Yousef K. [1 ,2 ]
Chong, Yung-Wey [1 ]
机构
[1] Univ Sains Malaysia, Natl Adv IPv6 Ctr Excellence, George Town, Malaysia
[2] Northern Border Univ, Dept Comp Sci, Ar Ar, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 69卷 / 01期
关键词
Software-defined networking; DDoS attack; distributed denial of service; Renyi joint entropy; ANOMALY DETECTION; SECURITY;
D O I
10.32604/cmc.2021.017972
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Software-Defined Networking (SDN) technology improves network management over existing technology via centralized network control. The SDN provides a perfect platform for researchers to solve traditional network's outstanding issues. However, despite the advantages of centralized control, concern about its security is rising. The more traditional network switched to SDN technology, the more attractive it becomes to malicious actors, especially the controller, because it is the network's brain. A Distributed Denial of Service (DDoS) attack on the controller could cripple the entire network. For that reason, researchers are always looking for ways to detect DDoS attacks against the controller with higher accuracy and lower false-positive rate. This paper proposes an entropy-based approach to detect low-rate and high-rate DDoS attacks against the SDN controller, regardless of the number of attackers or targets. The proposed approach generalized the Renyi joint entropy for analyzing the network traffic flow to detect DDoS attack traffic flow of varying rates. Using two packet header features and generalized Renyi joint entropy, the proposed approach achieved a better detection rate than the EDDSC approach that uses Shannon entropy metrics.
引用
收藏
页码:373 / 391
页数:19
相关论文
共 32 条
[1]   Distributed controller clustering in software defined networks [J].
Abdelaziz, Ahmed ;
Fong, Ang Tan ;
Geni, Abdullah ;
Garba, Usman ;
Khan, Suleman ;
Akhunzada, Adnan ;
Talebian, Hamid ;
Choo, Kim-Kwang Raymond .
PLOS ONE, 2017, 12 (04)
[2]   Security in Software Defined Networks: A Survey [J].
Ahmad, Ijaz ;
Namal, Suneth ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2317-2346
[3]  
Al-adaileh M. A., 2018, MATECWEB C MATEC WEB, V218, P1
[4]   Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review [J].
Aladaileh, Mohammad A. ;
Anbar, Mohammed ;
Hasbullah, Iznan H. ;
Chong, Yung-Wey ;
Sanjalawe, Yousef K. .
IEEE ACCESS, 2020, 8 :143985-143995
[5]   New Architecture Design of Cloud Computing Using Software Defined Networking and Network Function Virtualization Technology [J].
Bahashwan, Abdullah Ahmed ;
Anbar, Mohammed ;
Abdullah, Nibras .
EMERGING TRENDS IN INTELLIGENT COMPUTING AND INFORMATICS: DATA SCIENCE, INTELLIGENT INFORMATION SYSTEMS AND SMART COMPUTING, 2020, 1073 :705-713
[6]   An Entropy-Based Network Anomaly Detection Method [J].
Berezinski, Przemyslaw ;
Jasiul, Bartosz ;
Szpyrka, Marcin .
ENTROPY, 2015, 17 (04) :2367-2408
[7]  
Bhardwaj Akashdeep, 2016, 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), P793, DOI 10.1109/SCOPES.2016.7955549
[8]  
Bouras C, 2017, CONF INNOV CLOUD, P107, DOI 10.1109/ICIN.2017.7899398
[9]  
Cui J., 2018, AUSTR C INF SEC AUST, V10946
[10]   Software-Defined Networking: A survey [J].
Farhady, Hamid ;
Lee, HyunYong ;
Nakao, Akihiro .
COMPUTER NETWORKS, 2015, 81 :79-95