FlowJustifier

Muhammad Arslan Sarwar, M. Hussain, M. Anwar, Mudassar Ahmad
{"title":"FlowJustifier","authors":"Muhammad Arslan Sarwar, M. Hussain, M. Anwar, Mudassar Ahmad","doi":"10.1145/3341325.3342037","DOIUrl":null,"url":null,"abstract":"Software-defined networks have introduced innovative changes in communication networks by separating and centralizing control plane from the data forwarding plane, making the network more manageable and adaptable. SDN is widely getting adapted in the IoT environment mainly for the reason of security. Although SDN enhances network security with the centralized control of network behavior, it has its own challenges in terms of security. SDN controller is prone to DoS/DDoS attacks where attackers may flood controller with a large number of new flows beyond the controller's capacity, causing network failure for legitimate users. These attacks could be worse in the IoT context due to its open nature. A verity of techniques has been proposed for SDN controller attack mitigation, each could be categorized based on entropy, time, trust management and scheduling schemes used differently, but trust-based request prioritization solutions are simplest among these due to their resource requirements and less response time. Our proposed technique for mitigation of DDoS attacks is even based on trust management but specifically crafted for IoT environment that ensures maximal and optimal utilization of available resources, with the aim to reduce the load on the controller while making contest against attack more effective.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"FlowJustifier\",\"authors\":\"Muhammad Arslan Sarwar, M. Hussain, M. Anwar, Mudassar Ahmad\",\"doi\":\"10.1145/3341325.3342037\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software-defined networks have introduced innovative changes in communication networks by separating and centralizing control plane from the data forwarding plane, making the network more manageable and adaptable. SDN is widely getting adapted in the IoT environment mainly for the reason of security. Although SDN enhances network security with the centralized control of network behavior, it has its own challenges in terms of security. SDN controller is prone to DoS/DDoS attacks where attackers may flood controller with a large number of new flows beyond the controller's capacity, causing network failure for legitimate users. These attacks could be worse in the IoT context due to its open nature. A verity of techniques has been proposed for SDN controller attack mitigation, each could be categorized based on entropy, time, trust management and scheduling schemes used differently, but trust-based request prioritization solutions are simplest among these due to their resource requirements and less response time. Our proposed technique for mitigation of DDoS attacks is even based on trust management but specifically crafted for IoT environment that ensures maximal and optimal utilization of available resources, with the aim to reduce the load on the controller while making contest against attack more effective.\",\"PeriodicalId\":178126,\"journal\":{\"name\":\"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3341325.3342037\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3341325.3342037","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

本文章由计算机程序翻译,如有差异,请以英文原文为准。
FlowJustifier
Software-defined networks have introduced innovative changes in communication networks by separating and centralizing control plane from the data forwarding plane, making the network more manageable and adaptable. SDN is widely getting adapted in the IoT environment mainly for the reason of security. Although SDN enhances network security with the centralized control of network behavior, it has its own challenges in terms of security. SDN controller is prone to DoS/DDoS attacks where attackers may flood controller with a large number of new flows beyond the controller's capacity, causing network failure for legitimate users. These attacks could be worse in the IoT context due to its open nature. A verity of techniques has been proposed for SDN controller attack mitigation, each could be categorized based on entropy, time, trust management and scheduling schemes used differently, but trust-based request prioritization solutions are simplest among these due to their resource requirements and less response time. Our proposed technique for mitigation of DDoS attacks is even based on trust management but specifically crafted for IoT environment that ensures maximal and optimal utilization of available resources, with the aim to reduce the load on the controller while making contest against attack more effective.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信