通过动态虚拟控制器部署和攻击级检测算法增强 SDN 抵御 DDoS 攻击的能力

Florance G., R J Anandhi
{"title":"通过动态虚拟控制器部署和攻击级检测算法增强 SDN 抵御 DDoS 攻击的能力","authors":"Florance G., R J Anandhi","doi":"10.1007/s41870-024-02064-w","DOIUrl":null,"url":null,"abstract":"<p>The rapid evolution of network traffic created various problems in detecting Distributed Denial of Service (DDOS) attacks. The manifestation of Software Defined Networking (SDN) provides some individuality in that the SDN Controller uses a technique to examine the acquired data from the Flow Table (FT). As traffic increases, the controller's processing capability decreases, resulting in insufficient space availability for the FT and flow buffer. Understanding the struggles that exist in the controller and FT, this study provided a distinctive procedure that will increase performance, reduce controller load, manage FT space, and flow buffers that are activated by the Virtual Controller (VC). It dynamically completes the bundle of packets received at the router/switch, analyze the FT using the Attack Level Detection (ALD) method, assesses the bandwidth utilization of a particular user, and maps to the ingress port. The ALD algorithm detects mismatched packets and congested packets originating from faked IP and network addresses. This effort is related with the regular scenario and the attack level scenario, which use a mininet simulator with two controllers, the POX controller and the Open Daylight controller, to simulate major performance variations. This study efficiently lowers the overload of the VC and FT, hence preventing the DDoS assault employing VC.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"43 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhancing SDN resilience against DDoS attacks through dynamic virtual controller deployment and attack level detection algorithm\",\"authors\":\"Florance G., R J Anandhi\",\"doi\":\"10.1007/s41870-024-02064-w\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The rapid evolution of network traffic created various problems in detecting Distributed Denial of Service (DDOS) attacks. The manifestation of Software Defined Networking (SDN) provides some individuality in that the SDN Controller uses a technique to examine the acquired data from the Flow Table (FT). As traffic increases, the controller's processing capability decreases, resulting in insufficient space availability for the FT and flow buffer. Understanding the struggles that exist in the controller and FT, this study provided a distinctive procedure that will increase performance, reduce controller load, manage FT space, and flow buffers that are activated by the Virtual Controller (VC). It dynamically completes the bundle of packets received at the router/switch, analyze the FT using the Attack Level Detection (ALD) method, assesses the bandwidth utilization of a particular user, and maps to the ingress port. The ALD algorithm detects mismatched packets and congested packets originating from faked IP and network addresses. This effort is related with the regular scenario and the attack level scenario, which use a mininet simulator with two controllers, the POX controller and the Open Daylight controller, to simulate major performance variations. This study efficiently lowers the overload of the VC and FT, hence preventing the DDoS assault employing VC.</p>\",\"PeriodicalId\":14138,\"journal\":{\"name\":\"International Journal of Information Technology\",\"volume\":\"43 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-08-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1007/s41870-024-02064-w\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/s41870-024-02064-w","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

网络流量的快速发展给检测分布式拒绝服务(DDOS)攻击带来了各种问题。软件定义网络(SDN)的表现形式具有一定的个性化,SDN 控制器使用一种技术来检查从流量表(FT)中获取的数据。随着流量的增加,控制器的处理能力会下降,导致 FT 和流量缓冲区的可用空间不足。了解到控制器和流量表中存在的问题,本研究提供了一种独特的程序,可提高性能、减少控制器负载、管理流量表空间和由虚拟控制器(VC)激活的流量缓冲区。它动态完成路由器/交换机接收到的数据包捆绑,使用攻击级别检测(ALD)方法分析 FT,评估特定用户的带宽利用率,并映射到入口端口。ALD 算法可检测到来自伪造 IP 地址和网络地址的不匹配数据包和拥塞数据包。这项工作与常规场景和攻击级别场景相关,使用带有两个控制器(POX 控制器和 Open Daylight 控制器)的 mininet 模拟器来模拟主要的性能变化。这项研究有效降低了 VC 和 FT 的过载,从而防止了使用 VC 的 DDoS 攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

Enhancing SDN resilience against DDoS attacks through dynamic virtual controller deployment and attack level detection algorithm

Enhancing SDN resilience against DDoS attacks through dynamic virtual controller deployment and attack level detection algorithm

The rapid evolution of network traffic created various problems in detecting Distributed Denial of Service (DDOS) attacks. The manifestation of Software Defined Networking (SDN) provides some individuality in that the SDN Controller uses a technique to examine the acquired data from the Flow Table (FT). As traffic increases, the controller's processing capability decreases, resulting in insufficient space availability for the FT and flow buffer. Understanding the struggles that exist in the controller and FT, this study provided a distinctive procedure that will increase performance, reduce controller load, manage FT space, and flow buffers that are activated by the Virtual Controller (VC). It dynamically completes the bundle of packets received at the router/switch, analyze the FT using the Attack Level Detection (ALD) method, assesses the bandwidth utilization of a particular user, and maps to the ingress port. The ALD algorithm detects mismatched packets and congested packets originating from faked IP and network addresses. This effort is related with the regular scenario and the attack level scenario, which use a mininet simulator with two controllers, the POX controller and the Open Daylight controller, to simulate major performance variations. This study efficiently lowers the overload of the VC and FT, hence preventing the DDoS assault employing VC.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信