Impact of DoS Attack in Software Defined Network for Virtual Network

被引:0
作者
Shyamala Ramachandran
Valli Shanmugam
机构
[1] University College of Engineering Tindivanam,Department of Information Technology
[2] Anna University,Department of Computer Science and Engineering, College of Engineering Guindy
来源
Wireless Personal Communications | 2017年 / 94卷
关键词
OpenFlow; Denial-of-Service attack; Mininet; Software Defined Network;
D O I
暂无
中图分类号
学科分类号
摘要
A virtual network is a computer network which does not contain any physical link between two computational nodes instead they connect through the virtual links. In recent years the virtual network is managed by Software Defined Network (SDN). SDN is one of the most emerging network technologies in the current trends. Most of the companies configure their networks in SDN. It has been found important to understand the security issues that are being raised in any large scale developments from any new technologies that have been raised in recent years. Though the system acquires lot of benefits from SDN the system have to do some little work in security phase. This work confers four kinds of Denial-of-Service (DoS) attacks that are specific to networks in the OpenFlow SDN in different layers. Those attacks are Ping of Death, HTTP Unbearable Load King, SYN flood and Smurf attack. We introduced these attacks in SDN. These have been emulated on Mininet and an analysis is provided that was obtained on the consequence of these attacks. The DoS attack that is more severe than others has been found out and a suitable prevention techniques for that DoS attack is suggested.
引用
收藏
页码:2189 / 2202
页数:13
相关论文
共 20 条
[1]  
Ding AY(2014)Software defined networking for security enhancement in wireless mobile networks Computer Networks (COMNET) 66 94-101
[2]  
Crowcroft J(2009)Secure route discovery in MAODV for wireless sensor networks UbiCC Journal 4 775-783
[3]  
Tarkoma S(2011)Impact of sybil and wormhole attacks in location based geographic multicast routing protocol for wireless sensor networks Journal of Computer Science 7 973-979
[4]  
Flinck H(2012)Performance comparison of routing attacks in MANET and WSN International Journal of Ad hoc, Sensor and Ubiquitous Computing (IJASUC) 3 41-52
[5]  
Shyamala R(2012)Impact of blackhole and rushing attack on the location-based routing protocol for wireless sensor networks Proceedings of Advances in Intelligent System and Computing 176 349-359
[6]  
Valli S(2013)An approach to secure leach using tesla based certificate Life Science Journal 10 1018-1027
[7]  
Shyamala R(2013)Securing GMR protocol using TESLA based certificate for WSN European Journal of Scientific and Research 94 186-196
[8]  
Valli S(2016)Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges IEEE Communications Surveys & Tutorials 18 602-622
[9]  
Shyamala R(undefined)undefined undefined undefined undefined-undefined
[10]  
Valli S(undefined)undefined undefined undefined undefined-undefined