Muhammad Arslan Sarwar, M. Hussain, M. Anwar, Mudassar Ahmad
{"title":"FlowJustifier","authors":"Muhammad Arslan Sarwar, M. Hussain, M. Anwar, Mudassar Ahmad","doi":"10.1145/3341325.3342037","DOIUrl":null,"url":null,"abstract":"Software-defined networks have introduced innovative changes in communication networks by separating and centralizing control plane from the data forwarding plane, making the network more manageable and adaptable. SDN is widely getting adapted in the IoT environment mainly for the reason of security. Although SDN enhances network security with the centralized control of network behavior, it has its own challenges in terms of security. SDN controller is prone to DoS/DDoS attacks where attackers may flood controller with a large number of new flows beyond the controller's capacity, causing network failure for legitimate users. These attacks could be worse in the IoT context due to its open nature. A verity of techniques has been proposed for SDN controller attack mitigation, each could be categorized based on entropy, time, trust management and scheduling schemes used differently, but trust-based request prioritization solutions are simplest among these due to their resource requirements and less response time. Our proposed technique for mitigation of DDoS attacks is even based on trust management but specifically crafted for IoT environment that ensures maximal and optimal utilization of available resources, with the aim to reduce the load on the controller while making contest against attack more effective.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"FlowJustifier\",\"authors\":\"Muhammad Arslan Sarwar, M. Hussain, M. Anwar, Mudassar Ahmad\",\"doi\":\"10.1145/3341325.3342037\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software-defined networks have introduced innovative changes in communication networks by separating and centralizing control plane from the data forwarding plane, making the network more manageable and adaptable. SDN is widely getting adapted in the IoT environment mainly for the reason of security. Although SDN enhances network security with the centralized control of network behavior, it has its own challenges in terms of security. SDN controller is prone to DoS/DDoS attacks where attackers may flood controller with a large number of new flows beyond the controller's capacity, causing network failure for legitimate users. These attacks could be worse in the IoT context due to its open nature. A verity of techniques has been proposed for SDN controller attack mitigation, each could be categorized based on entropy, time, trust management and scheduling schemes used differently, but trust-based request prioritization solutions are simplest among these due to their resource requirements and less response time. Our proposed technique for mitigation of DDoS attacks is even based on trust management but specifically crafted for IoT environment that ensures maximal and optimal utilization of available resources, with the aim to reduce the load on the controller while making contest against attack more effective.\",\"PeriodicalId\":178126,\"journal\":{\"name\":\"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3341325.3342037\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3341325.3342037","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Software-defined networks have introduced innovative changes in communication networks by separating and centralizing control plane from the data forwarding plane, making the network more manageable and adaptable. SDN is widely getting adapted in the IoT environment mainly for the reason of security. Although SDN enhances network security with the centralized control of network behavior, it has its own challenges in terms of security. SDN controller is prone to DoS/DDoS attacks where attackers may flood controller with a large number of new flows beyond the controller's capacity, causing network failure for legitimate users. These attacks could be worse in the IoT context due to its open nature. A verity of techniques has been proposed for SDN controller attack mitigation, each could be categorized based on entropy, time, trust management and scheduling schemes used differently, but trust-based request prioritization solutions are simplest among these due to their resource requirements and less response time. Our proposed technique for mitigation of DDoS attacks is even based on trust management but specifically crafted for IoT environment that ensures maximal and optimal utilization of available resources, with the aim to reduce the load on the controller while making contest against attack more effective.