An Experimental Study on Assessing the Efficacy of Feature-Based Methods in Identifying DDoS Attacks Against SDN Controllers

Authors

  • Monika Dandotiya Research Scholar, Department of Computer Science & Engineering, Madhav Institute of Technology and Science, Gwalior, Madhya Pradesh India
  • Rajni Ranjan Singh Makwana Assistant Professor, Department of Computer Science & Engineering Madhav Institute of Technology and Science, Gwalior, Madhya Pradesh India

Keywords:

Software-defined networking, Entropy, Controller, Attack detection, DDoS

Abstract

A Software-Defined Network (SDN) provides several benefits to the networking industry via flexibility and centralized administration; nevertheless, this centralized control leaves it vulnerable to many forms of attacks. As a common tactic, attackers often use Distributed Denial of Service (DDoS) attacks to render the controller inoperable. To detect DDoS attacks on SDN controllers, entropy-based approaches & variants are believed to be most successful. Three modules comprise this system: traffic gathering, flow table delivery, and DDoS attack detection. To be ready for traffic identification, the traffic gathering module gathers traffic parameters. A DDoS attack detection system that takes advantage of flexible & multi-dimensional features of SDNs works by having the controller take data from statistics flow tables and apply a support vector machines (SVM) method to recognize attack traffic. The flow table delivery module then uses the traffic identification result to dynamically adjust the forwarding policy, therefore defending against DDoS attacks.

Downloads

Download data is not yet available.

References

H. Zhang, Z. Cai, Q. Liu, Q. Xiao, Y. Li, and C. F. Cheang, “A Survey on Security-Aware Measurement in SDN,” Security and Communication Networks. 2018, doi: 10.1155/ 2018/2459154.

T. Wang, Y. Feng, and K. Sakurai, “Improving the Two-stage Detection of Cyberattacks in SDN Environment Using Dynamic Thresholding,” 2021, doi: 10.1109/IMCOM51814.2021.9377395.

R. Wang, Z. Jia, and L. Ju, “An entropy-based distributed DDoS detection mechanism in softwaredefined networking,” 2015, doi: 10.1109/ Trustcom.2015.389.

L. Fawcett, S. Scott-Hayward, M. Broadbent, A. Wright, and N. Race, “Tennison: A distributed SDN framework for scalable network security,” IEEE J. Sel. Areas Commun., 2018, doi: 10.1109 /JSAC.2018.2871313.

H. D. Zubaydi, M. Anbar, and C. Y. Wey, “Review on Detection Techniques against DDoS Attacks on a Software-Defined Networking Controller,” 2017, doi: 10.1109/PICICT.2017.26.

N. Ahuja and G. Singal, “DDOS Attack Detection Prevention in SDN using OpenFlow Statistics,” 2019, doi: 10.1109/IACC48062.2019.8971596.

J. Pei, Y. Chen, and W. Ji, “A DDoS Attack Detection Method Based on Machine Learning,” 2019, doi: 10.1088/1742-6596/1237/3/032040.

M. Mittal, K. Kumar, and S. Behal, “Deep learning approaches for detecting DDoS attacks: a systematic review,” Soft Computing. 2023, doi: 10.1007 /s00500-021-06608-1.

M. Myint Oo, S. Kamolphiwong, T. Kamolphiwong, and S. Vasupongayya, “Advanced Support Vector Machine-(ASVM-) based detection for Distributed Denial of Service (DDoS) attack on Software Defined Networking (SDN),” J. Comput. Networks Commun., 2019, doi: 10.1155/2019/8012568.

O. Rahman, M. A. G. Quraishi, and C. H. Lung, “DDoS attacks detection and mitigation in SDN using machine learning,” 2019, doi: 10.1109/ SERVICES.2019.00051.

M. M. Joëlle and Y. H. Park, “Strategies for detecting and mitigating DDoS attacks in SDN: A survey,” 2018, doi: 10.3233/JIFS-169833.

D. Melkov and S. Paulikas, “Security Benefits and Drawbacks of Software-Defined Networking,” 2021, doi: 10.1109/eStream53087.2021.9431466.

J. H. Cox et al., “Advancing software-defined networks: A survey,” IEEE Access, 2017, doi:

10.1109/ACCESS.2017.2762291.

M. A. Aladaileh, M. Anbar, I. H. Hasbullah, Y. W. Chong, and Y. K. Sanjalawe, “Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review,” IEEE Access, 2020, doi: 10.1109/ ACCESS.2020.3013998.

S. Deore and A. Patil, “Survey Denial of Service classification and attack with Protect Mechanism for TCP SYN Flooding Attacks Atul Patil,” Int. Res. J. Eng. Technol., 2016.

Rajkumar and M. Nene, “A Survey on Latest DoS Attacks : Classification and Defense Mechanisms,” Int. J. Innov. Res. Comput. Commun. Eng., 2013.

V. Jean Shilpa and P. K. Jawahar, “Advanced optimization by profiling of acoustics software applications for interoperability in HCF systems,” J. Green Eng., 2019.

P. Radha and B. Meena Preethi, “Machine learning approaches for disease prediction from radiology and pathology reports,” J. Green Eng., 2019.

K. . Higgins, “Researchers to Demonstrate New Attack That Exploits HTTP,” 2010.

http://www.darkreading.com/vulnerability-management/167901026/security/attacksreaches/228000532/index.html.

Y. Wu, V. Suhendray, H. Saputra, and Z. Zhao, “Obfuscating Software Puzzle for Denial-of-Service Attack Mitigation,” 2017, doi: 10.1109/iThings-GreenCom-CPSCom-SmartData.2016.45.

M. Kowsigan, “Data Security and Data Dissemination of Distributed Data in Wireless Sensor Networks,” Int. J. Eng. Res. Appl., 2017, doi: 10.9790/9622-0703042631.

K. Bhuvaneswari and H. Abdul Rauf, “Edgelet based human detection and tracking by combined segmentation and soft decision,” in 2009 International Conference on Control, Automation, Communication and Energy Conservation, 2009, pp. 1–6.

K. J. Poornaselvan, T. Gireesh Kumar, and V. P. Vijayan, “Agent based ground flight control using type-2 fuzzy logic and hybrid ant colony optimization to a dynamic environment,” 2008, doi:

10.1109/ICETET.2008.85.

E. Alomari, S. Manickam, B. B. Gupta, S. Karuppayah, and R. Alfaris, “Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art,” Int. J. Comput. Appl., 2012, doi: 10.5120/7640-0724.

R. Kanmani and A. Jameer Basha, “Performance analysis of wireless OCDMA systems using OOC, PC and EPC codes,” Asian J. Inf. Technol., 2016, doi: 10.3923/ajit.2016.2087.2093.

N. M. Yungaicela-Naula, C. Vargas-Rosales, J. A. Perez-Diaz, E. Jacob, and C. Martinez-Cagnazzo,

“Physical Assessment of an SDN-Based Security Framework for DDoS Attack Mitigation: Introducing the SDN-SlowRate-DDoS Dataset,” IEEE Access, 2023, doi: 10.1109/ACCESS. 2023.3274577.

M. Sinha, P. Bera, and M. Satpathy, “DDoS Vulnerabilities Analysis in SDN Controllers:

Understanding the Attacking Strategies,” 2023, doi: 10.1109/WiSPNET57748.2023.10134518.

A. N. H. Dhatreesh Sai, B. H. Tilak, N. Sai Sanjith, P. Suhas, and R. Sanjeetha, “Detection and Mitigation of Low and Slow DDoS attack in an SDN environment,” 2022, doi:

10.1109/DISCOVER55800.2022.9974724.

R. Raj and S. Singh Kang, “A Review on DDoS attack Detection in SDN using ML,” 2022, doi:

10.1109/ICAC3N56670.2022.10074330.

M. I. Kareem and M. N. Jasim, “The Current Trends of DDoS Detection in SDN Environment,” 2021, doi: 10.1109/IT-ELA52201.2021.9773744.

J. E. Varghese and B. Muniyal, “Trend in SDN Architecture for DDoS Detection-A Comparative Study,” 2021, doi: 10.1109/DISCOVER52564. 2021.9663589.

R. Li and B. Wu, “Early detection of DDoS based on varphi-entropy in SDN networks,” 2020, doi: 10.1109/ITNEC48623.2020.9084885.

M. Klymash, O. Shpur, N. Peleh, and O. Maksysko, “Concept of Intelligent Detection of DDoS Attacks in SDN Networks Using Machine Learning,” 2021, doi: 10.1109/PICST51311.2020.9467963.

A. Ahalawat, S. S. Dash, A. Panda, and K. S. Babu, “Entropy Based DDoS Detection and Mitigation in OpenFlow Enabled SDN,” 2019, doi: 10.1109 /ViTECoN.2019.8899721.

C. Fan, N. M. Kaliyamurthy, S. Chen, H. Jiang, Y. Zhou, and C. Campbell, “Detection of DDoS Attacks in Software Defined Networking Using Entropy,” Appl. Sci., 2022, doi: 10.3390/ app12010370.

S. M. Mousavi and M. St-Hilaire, “Early Detection of DDoS Attacks Against Software Defined Network Controllers,” J. Netw. Syst. Manag., 2018, doi: 10.1007/s10922-017-9432-1.

K. S. Sahoo, D. Puthal, M. Tiwary, J. J. P. C. Rodrigues, B. Sahoo, and R. Dash, “An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics,” Futur. Gener. Comput. Syst., 2018, doi: 10.1016/j.future.2018.07.017.

A. R. Yadav, A. P. Jain, T. Shankar, A. Rajesh, S. Perumal, and G. Eappen, “AI based DDOS Attack

Detection of SDN Network in Mininet Emulator,” 2023, doi: 10.1109/ViTECoN58111.2023.101 57074.

J. R. Dora and L. Hluchy, “Detection of Attacks in Software-Defined Networks (SDN) : How to conduct attacks in SDN environments,” 2023, doi: 10.1109/SACI58269.2023.10158584.

K. V. M. Mohan, S. Kodati, and V. Krishna, “Securing SDN Enabled IoT Scenario Infrastructure of Fog Networks From Attacks,” 2022, doi: 10.1109/ICAIS53314.2022.9742727.

T. Peng, C. Leckie, and K. Ramamohanarao, “Proactively detecting distributed denial of service attacks using source IP address monitoring,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), 2004, doi: 10.1007/978-3-540-24693-0_63.

J. Cheng, J. Yin, C. Wu, B. Zhang, and Y. Liu, “DDoS attack detection method based on linear prediction model,” 2009, doi: 10.1007/978-3-642-04070-2_106.

J. Udhayan and T. Hamsapriya, “Statistical segregation method to minimize the false detections during DDoS attacks,” Int. J. Netw. Secur., 2011.

G. Öke and G. Loukas, “A denial of service detector based on maximum likelihood detection and the random neural network,” Comput. J., 2007, doi: 10.1093/comjnl/bxm066.

Downloads

Published

24.03.2024

How to Cite

Dandotiya, M. ., & Makwana, R. R. S. . (2024). An Experimental Study on Assessing the Efficacy of Feature-Based Methods in Identifying DDoS Attacks Against SDN Controllers. International Journal of Intelligent Systems and Applications in Engineering, 12(20s), 47–60. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5118

Issue

Section

Research Article