DeMi: a Solution to Detect and Mitigate DoS Attacks in SDN
نویسندگان
چکیده
Software-defined networking (SDN) is becoming more and popular due to its key features of scalability flexibility, simplifying network management enabling innovations in the architecture protocols. In SDNs, most crucial part controller, tasked with managing entire configuring routes. Given critical role, a failure or problem occurring at controller may degrade even collapse SDN. A typical threat controllers are subject Denial Service (DoS) attack. To cope above-introduced threat, this paper we propose lightweight DoS attack detection mitigation method (DeMi) as well heavy-load module. The proposed solution for leverages sample entropy approach coupled an adaptive dynamic threshold considering exponentially weighted moving average (EWMA); based on proof work (PoW) combined flow rule installations; and, implements scheduling SDN controller. Results staggering: instance, when DeMi deployed, scenario number exchanged control packets roughly similar attack-free scenario—without DeMi, 2,7 times than what experienced setting. As per re-transmitted packets, again, able achieve re-transmission rate that need be 3,7 scenario. Moreover, does not block legitimate traffic, contrary other solutions literature. novelty approach, demonstrated complete end-to-end solution, quality achieved experimental results, being interesting their own, do pave way further research field.
منابع مشابه
A Solution to WLAN Authentication and Association DoS Attacks
-The growing popularity of the 802.11-based Wireless LAN (WLAN) also increases its risk of security attacks. The new WLAN security standard, 802.11i, addresses most issues on user authentication and data encryption; however, it does not protect WLANs against Denial of Service (DoS) attacks. This paper presents a solution to detect and resolve authentication request flooding (AuthRF) and associa...
متن کاملApplication of an AODE Based Classifier to Detect DOS Attacks
Digital forensics often utilize network intrusion detection systems based on various data mining methods to detect and collect evidence on intrusion events such as Denial of Service (DOS) attacks. Findings of our experiments reveal that a classification model based on averaged one-dependence estimators (AODE) can be used for this purpose. AODE is an extension of Naïve Bayes method which relies ...
متن کاملComprehensive Solution to Mitigate the Cyber-attacks in Cloud Computing
Cloud computing is a web based utility model. Cybercrimes effecting web based system are equally applicable in the cloud computing. Considering the sensitivity and the damage that can be caused by cybercrimes, this work is an effort to study the various cyber threats and methods to mitigate them. Firstly, it highlights the cloud usage as per the various services model (IaaS, PaaS, and SaaS) and...
متن کاملCan SDN Mitigate Disasters?
Datacenter networks and services are at risk in the face of disasters. Existing fault-tolerant storage services cannot even achieve a nil recovery point objective (RPO) as client-generated data may get lost before the termination of their migration across geo-replicated datacenters. SDN has proved instrumental in exploiting application-level information to optimise the routing of information. I...
متن کاملHBSAP : A Hop-by-Hop Broadcast Source Authentication Protocol for WSN to mitigate DoS Attacks
Broadcast communication is a dominant communication pattern in WSN. As a major security concern, the broadcast source authentication is needed to mitigate impersonation of a broadcast source, modifications of its broadcasted data, or depletion of the limited energy of sensors caused by an attacker injecting useless broadcast traffic. Several Broadcast Source Authentication Protocols (BSAPs) wer...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3301994