DDoS Attack Mitigation using Distributed SDN Multi Controllers for Fog Based IoT Systems


  • R. Ramalakshmi Research Scholar, Department of Electronics and Communication Engineering, Kalasalingam Academy of Research and Education, Anand Nagar, Krishnankoil, Tamilnadu -626126, India
  • D. Kavitha Professor, Department of Computer Science and Engineering, Kalasalingam Academy of Research and Education, Anand Nagar, Krishnankoil, Tamilnadu -626126, India


SDN, DDoS, Fog computing, IoT, Machine Learning, Distributed multi controller


Software Defined Networking is an important platform today for handling huge like Internet of things and fog edge based networking devices. SDN is also a most prominent network platform for today’s industrial diversity of setup such as cloud data storage, Industrial Internet of Things (IIoT), Network Function Virtualization (NFV), and Security attacks. So, SDN is handling application layer resources and physical layer edge devices along with security protection. Resources like cloud database storage is not capable enough for handling today’s world huge data’s. Similarly, a huge data’s are originated from the various end devices via IoT based switches and gateways to the target resources. But due to the attacks like Denial of service (DoS) and Distributed denial of service attack (DDoS), the network is easily contaminated and destroyed the target resources and available bandwidth. So, in this scenario handling these data traffic and mitigating the attacks with privacy and authentication is an efficient task provided by SDN controller. But SDN controller will take only the managing and controlling part of the network. But still security is a very big concern in the today’s huge data collection from IoT and other smart devices. So, Fog computing framework plays a vital role today to reduce the DDoS attacks from the different edge data sources by creating a micro clouds or fog nodes before accessing the cloud resources to manage and mitigate the DDoS attacks with the help of Distributed SDN multi controller and provides the additional layer of security for the network. This paper proposed the Machine Learning (ML) based DDoS attack mitigation process in IoT based SDN environment with Fog computing approach and secures the network from malicious packets with good detection accuracy.


Download data is not yet available.


D. Kavitha, R. Ramalakshmi, R. Murugeswari, The Detection and Mitigation of Distributed Denial-of-Service (DDOS) Attacks in Software Defined Networks using Distributed Controllers, 2019 Int. Conf. Clean Energy Energy Effic. Electron. Circuit Sustain. Dev. INCCES 2019. (2019). https://doi.org/10.1109/INCCES47820.2019.9167698.

D. Kavitha, R. Ramalakshmi, Fog-based SDN for DDOS Attack Mitigation in IoT Systems : A Survey , 13 (2020) 4161–4173.

S. Prabakaran, R. Ramar, Software defined network: Load balancing algorithm design and analysis, Int. Arab J. Inf. Technol. 18 (2021) 312–318. https://doi.org/10.34028/iajit/18/3/7.

S. Khan, S. Parkinson, Y. Qin, Fog computing security: a review of current applications and security solutions, J. Cloud Comput. 6 (2017). https://doi.org/10.1186/s13677-017-0090-3.

A.A. Patwary, R.K. Naha, S. Garg, S.K. Battula, M. Gong, Towards Secure Fog Computing : A Survey on Trust, (2021) 1–52.

L. Zhang, K.U.N. Yang, A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework, 6 (2018).

S. Wang, K. Gomez, K. Sithamparanathan, M.R. Asghar, G. Russello, P. Zanna, applied sciences Mitigating DDoS Attacks in SDN-Based IoT Networks Leveraging Secure Control and Data Plane Algorithm, (2021).

M. Ejaz Ahmed, H. Kim, DDoS attack mitigation in internet of things using software defined networking, Proc. - 3rd IEEE Int. Conf. Big Data Comput. Serv. Appl. BigDataService 2017. (2017) 271–276. https://doi.org/10.1109/BigDataService.2017.41.

L. Zhou, H. Guo, G. Deng, A fog computing based approach to DDoS mitigation in IIoT systems, Comput. Secur. 85 (2019) 51–62. https://doi.org/10.1016/j.cose.2019.04.017.

D. Yin, L. Zhang, K. Yang, A DDoS Attack Detection and Mitigation with Software-Defined Internet of Things Framework, IEEE Access. 6 (2018) 24694–24705. https://doi.org/10.1109/ACCESS.2018.2831284.

M. Myint Oo, S. Kamolphiwong, T. Kamolphiwong, S. Vasupongayya, Advanced Support Vector Machine-(ASVM-) based detection for Distributed Denial of Service (DDoS) attack on Software Defined Networking (SDN), J. Comput. Networks Commun. 2019 (2019). https://doi.org/10.1155/2019/8012568.

A. Modarresi, S. Gangadhar, J.P.G. Sterbenz, A Framework for Improving Network Resilience Using SDN and Fog Nodes, (2017) 1–7.

R. Priyadarshini, R. Kumar Barik, H. Dubey, Fog-SDN: A light mitigation scheme for DDoS attack in fog computing framework, Int. J. Commun. Syst. 33 (2020) 1–13. https://doi.org/10.1002/dac.4389.

H. Sabireen, V. Neelanarayanan, A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges, ICT Express. 7 (2021) 162–176. https://doi.org/10.1016/j.icte.2021.05.004.

P. Zhang, M. Zhou, G. Fortino, Security and trust issues in Fog computing : A survey, Futur. Gener. Comput. Syst. 88 (2018) 16–27. https://doi.org/10.1016/j.future.2018.05.008.

A. Yousefpour, C. Fung, T. Nguyen, K. Kadiyala, F. Jalali, A. Niakanlahiji, J. Kong, J.P. Jue, All one needs to know about fog computing and related edge computing paradigms: A complete survey, J. Syst. Archit. 98 (2019) 289–330. https://doi.org/10.1016/j.sysarc.2019.02.009.

S. Khan, S. Parkinson, Y. Qin, Fog computing security: a review of current applications and security solutions, J. Cloud Comput. 6 (2017). https://doi.org/10.1186/s13677-017-0090-3.

S.P. Singh, A. Nayyar, R. Kumar, A. Sharma, Fog computing: from architecture to edge computing and big data processing, J. Supercomput. 75 (2019) 2070–2105. https://doi.org/10.1007/s11227-018-2701-2.

R. Deng, R. Lu, S. Member, C. Lai, Optimal Workload Allocation in Fog-Cloud Computing Towards Balanced Delay and Power Consumption, X (2016) 1–11. https://doi.org/10.1109/JIOT.2016.2565516.

A. Wani, S. Revathi, DDoS Detection and Alleviation in IoT using SDN, J. Inst. Eng. Ser. B. (2020). https://doi.org/10.1007/s40031-020-00442-z.

J. Ni, K. Zhang, X. Lin, X.S. Shen, Securing Fog Computing for Internet of Things Applications: Challenges and Solutions, IEEE Commun. Surv. Tutorials. 20 (2018) 601–628. https://doi.org/10.1109/COMST.2017.2762345.

B. Paharia, Fog Computing as a defensive approach against Distributed Denial of Service ( DDoS ): a proposed architecture, (2018).

X. Masip-bruin, E. Marn-tordera, R. Diaz, Securing combined Fog-to-Cloud system Through SDN Approach, (n.d.).

R. Priyadarshini, R.K. Barik, A deep learning based intelligent framework to mitigate DDoS attack in fog environment, J. King Saud Univ. - Comput. Inf. Sci. (2019). https://doi.org/10.1016/j.jksuci.2019.04.010.

O. Salman, A. Chehab, PT US AC CR, Comput. Networks. (2018). https://doi.org/10.1016/j.comnet.2018.07.020.

L. Zhou, H. Guo, G. Deng, A Fog Computing Based Approach to DDoS, Comput. Secur. (2019). https://doi.org/10.1016/j.cose.2019.04.017.

Carlos Silva, David Cohen, Takashi Yamamoto, Maria Petrova, Ana Costa. Ethical Considerations in Machine Learning Applications for Education. Kuwait Journal of Machine Learning, 2(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/192

Reddy, B.R.S., Saxena, A.K., Pandey, B.K., Gupta, S., Gurpur, S., Dari, S.S., Dhabliya, D. Machine learning application for evidence image enhancement (2023) Handbook of Research on Thrust Technologies? Effect on Image Processing, pp. 25-38.

Dasi , S. ., & Rao, G. M. . (2023). Design and Analysis of Metamaterial Absorber using Split Ring Resonator for Dual Band Terahertz Applications. International Journal on Recent and Innovation Trends in Computing and Communication, 11(1), 128–132. https://doi.org/10.17762/ijritcc.v11i1.6059




How to Cite

Ramalakshmi , R. ., & Kavitha , D. . (2023). DDoS Attack Mitigation using Distributed SDN Multi Controllers for Fog Based IoT Systems. International Journal of Intelligent Systems and Applications in Engineering, 12(4s), 57–69. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3751



Research Article