SDN中DDoS的检测与缓解

Bhavika Pande, G. Bhagat, S. Priya, H. Agrawal
{"title":"SDN中DDoS的检测与缓解","authors":"Bhavika Pande, G. Bhagat, S. Priya, H. Agrawal","doi":"10.1109/IC3.2018.8530551","DOIUrl":null,"url":null,"abstract":"The authors have modelled a DDoS prevention mechanism for DDoS attacks occurring in same or different domains, with help of controller in Software Defined Networking. The controllers are implemented using Ryu and Open Flow protocol. The topology for our framework consisting of controllers, switches and hosts is implemented using Mininet which emulates the network effectively. Controllers are programmed to identify victims and attackers and apply defense mechanism accordingly. The defense mechanisms used are ingress, egress and pushback after validating packet legitimacy. Ingress filtering is applied if the attacker is found to be in the same domain while egress followed by ingress is applied when the attacker is found to be of the other domain, after receiving a pushback request. The model proves to give fairly accurate results.","PeriodicalId":118388,"journal":{"name":"2018 Eleventh International Conference on Contemporary Computing (IC3)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Detection and Mitigation of DDoS in SDN\",\"authors\":\"Bhavika Pande, G. Bhagat, S. Priya, H. Agrawal\",\"doi\":\"10.1109/IC3.2018.8530551\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The authors have modelled a DDoS prevention mechanism for DDoS attacks occurring in same or different domains, with help of controller in Software Defined Networking. The controllers are implemented using Ryu and Open Flow protocol. The topology for our framework consisting of controllers, switches and hosts is implemented using Mininet which emulates the network effectively. Controllers are programmed to identify victims and attackers and apply defense mechanism accordingly. The defense mechanisms used are ingress, egress and pushback after validating packet legitimacy. Ingress filtering is applied if the attacker is found to be in the same domain while egress followed by ingress is applied when the attacker is found to be of the other domain, after receiving a pushback request. The model proves to give fairly accurate results.\",\"PeriodicalId\":118388,\"journal\":{\"name\":\"2018 Eleventh International Conference on Contemporary Computing (IC3)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Eleventh International Conference on Contemporary Computing (IC3)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3.2018.8530551\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Eleventh International Conference on Contemporary Computing (IC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3.2018.8530551","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

摘要

本文利用软件定义网络中的控制器,对同一域或不同域的DDoS攻击进行了防御机制建模。控制器使用Ryu和Open Flow协议实现。我们的框架的拓扑结构由控制器、交换机和主机组成,使用Mininet实现,它有效地模拟了网络。控制器被编程来识别受害者和攻击者,并相应地应用防御机制。使用的防御机制是在验证数据包合法性后的入口、出口和回推。如果发现攻击者在同一域中,则应用入口过滤,而当发现攻击者在接收回推请求后属于另一个域时,则应用出口后的入口过滤。该模型被证明能给出相当准确的结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Detection and Mitigation of DDoS in SDN
The authors have modelled a DDoS prevention mechanism for DDoS attacks occurring in same or different domains, with help of controller in Software Defined Networking. The controllers are implemented using Ryu and Open Flow protocol. The topology for our framework consisting of controllers, switches and hosts is implemented using Mininet which emulates the network effectively. Controllers are programmed to identify victims and attackers and apply defense mechanism accordingly. The defense mechanisms used are ingress, egress and pushback after validating packet legitimacy. Ingress filtering is applied if the attacker is found to be in the same domain while egress followed by ingress is applied when the attacker is found to be of the other domain, after receiving a pushback request. The model proves to give fairly accurate results.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信