Detection of DDoS Attacks Against Wireless SDN Controllers Based on the Fuzzy Synthetic Evaluation Decision-making Model
نویسندگان
چکیده
Software Defined Networking (SDN) is a new network architecture that separates the control plane and the data plane and provides logically central control over the whole network. Because SDN controller combines the upper application layer and the underlying infrastructure layer, it may face the problem of single-point failure. If it is made unreachable by a Distributed Denial of Service (DDoS) attacks, the whole network may not work normally. Especially for wireless SDN controllers, due to the secure channel for the control protocol in communication between wireless SDN controller and wireless SDN devices is exposed in the attacker’s field of vision, the attack range of DDoS attackers will be expanded. To mitigate this threat, this paper introduces a solution based on fuzzy synthetic evaluation decision-making model that is effective and lightweight in terms of the resources that it uses. Importantly, it takes many factors that can be used to detect DDoS attacks into consideration and makes a comprehensive judgment according to multifactors. To test the solution, the paper also proposes three kinds of DDoS attacks specialized for SDN network and presents two kinds of DDoS attacks inherited from traditional network. Every attack has been tested with the detection method. Finally, we also make a comparable experiment to show its advantage to other DDoS detection algorithm based on single factor. The results show its efficiency in detecting most of the DDoS attacks.
منابع مشابه
Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks
Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...
متن کاملF-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
متن کاملAnomaly Detection using Fuzzy Q-learning Algorithm
Wireless networks are increasingly overwhelmed by Distributed Denial of Service (DDoS) attacks by generating flooding packets that exhaust critical computing and communication resources of a victim’s mobile device within a very short period of time. This must be protected. Effective detection of DDoS attacks requires an adaptive learning classifier, with less computational complexity, and an ac...
متن کاملFuzzy Based Detection and Prediction of DDoS Attacks in IEEE 802.15.4 Low Rate Wireless Personal Area Network
Detection and Prediction mechanism against distributed denial of service (DDoS) attacks is a critical component of any security system in which, these attacks can affect the availability of a node or an entire network. In this work, we focus the detection and prediction mechanism against DDoS attacks in IEEE 802.15.4 using Fuzzy logic system. The main contribution of Fuzzy based detection and p...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Ad Hoc & Sensor Wireless Networks
دوره 33 شماره
صفحات -
تاریخ انتشار 2016