软件定义网络中的DDoS危害及预防措施

Tanzeel Sultan Rana
{"title":"软件定义网络中的DDoS危害及预防措施","authors":"Tanzeel Sultan Rana","doi":"10.32350/sir.31.04","DOIUrl":null,"url":null,"abstract":"Software Defined Network is an emerging technology which is flourishing due to its diversity and by virtue of the fact that there are decoupled planes in this architecture which have some benefits as well as drawbacks, such as the execution of cyber attacks are easy at northbound and southbound interfaces and DDoS attack can easily be manipulated in this architecture. It has been identified that DDoS attack can be countered at northbound API so that appropriate decision about illegitimate traffic can be taken. Java has provided us with a very reliable support for three decades. Hence, all controls are governed by programming interfaces in this architecture with the help of this feature and according to the entropy of information which allows us to track the traffic and compare it with the threshold to identify the malware in the network. Floodlight controller is used in this paper to accommodate the illegitimate traffic. This paper allows the programmers to program such applications in Python or Java based on the basic mechanism of entropy which uses a threshold value from which DDoS attack can be countered, as we are well aware that a large number of systems are involved in producing illegitimate traffic on a network which creates distraction for the legitimate traffic.","PeriodicalId":137307,"journal":{"name":"Scientific Inquiry and Review","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"DDoS Hazard and Precautionary Measures in Software Define Network\",\"authors\":\"Tanzeel Sultan Rana\",\"doi\":\"10.32350/sir.31.04\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software Defined Network is an emerging technology which is flourishing due to its diversity and by virtue of the fact that there are decoupled planes in this architecture which have some benefits as well as drawbacks, such as the execution of cyber attacks are easy at northbound and southbound interfaces and DDoS attack can easily be manipulated in this architecture. It has been identified that DDoS attack can be countered at northbound API so that appropriate decision about illegitimate traffic can be taken. Java has provided us with a very reliable support for three decades. Hence, all controls are governed by programming interfaces in this architecture with the help of this feature and according to the entropy of information which allows us to track the traffic and compare it with the threshold to identify the malware in the network. Floodlight controller is used in this paper to accommodate the illegitimate traffic. This paper allows the programmers to program such applications in Python or Java based on the basic mechanism of entropy which uses a threshold value from which DDoS attack can be countered, as we are well aware that a large number of systems are involved in producing illegitimate traffic on a network which creates distraction for the legitimate traffic.\",\"PeriodicalId\":137307,\"journal\":{\"name\":\"Scientific Inquiry and Review\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Scientific Inquiry and Review\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.32350/sir.31.04\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scientific Inquiry and Review","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32350/sir.31.04","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

软件定义网络是一种新兴的技术,由于其多样性和在该架构中存在解耦平面的事实而蓬勃发展,这有一些优点,也有一些缺点,例如网络攻击很容易在北向和南向接口执行,DDoS攻击很容易在该架构中被操纵。已经确定DDoS攻击可以在北向API上进行反击,以便对非法流量做出适当的决策。30年来,Java为我们提供了非常可靠的支持。因此,在这个特性的帮助下,所有的控制都由这个架构中的编程接口控制,根据信息熵,我们可以跟踪流量,并将其与阈值进行比较,以识别网络中的恶意软件。本文采用泛光灯控制器来适应非法交通。本文允许程序员基于熵的基本机制在Python或Java中编写这样的应用程序,熵使用阈值,DDoS攻击可以被反击,因为我们很清楚,大量的系统参与在网络上产生非法流量,这会对合法流量造成干扰。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
DDoS Hazard and Precautionary Measures in Software Define Network
Software Defined Network is an emerging technology which is flourishing due to its diversity and by virtue of the fact that there are decoupled planes in this architecture which have some benefits as well as drawbacks, such as the execution of cyber attacks are easy at northbound and southbound interfaces and DDoS attack can easily be manipulated in this architecture. It has been identified that DDoS attack can be countered at northbound API so that appropriate decision about illegitimate traffic can be taken. Java has provided us with a very reliable support for three decades. Hence, all controls are governed by programming interfaces in this architecture with the help of this feature and according to the entropy of information which allows us to track the traffic and compare it with the threshold to identify the malware in the network. Floodlight controller is used in this paper to accommodate the illegitimate traffic. This paper allows the programmers to program such applications in Python or Java based on the basic mechanism of entropy which uses a threshold value from which DDoS attack can be countered, as we are well aware that a large number of systems are involved in producing illegitimate traffic on a network which creates distraction for the legitimate traffic.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信