GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2022
DOI: 10.1109/globecom48099.2022.10000603
|View full text |Cite
|
Sign up to set email alerts
|

A Cost-Effective MTD Approach for DDoS Attacks in Software-Defined Networks

Abstract: Protecting large-scale networks, especially Software-Defined Networks (SDNs), against distributed attacks in a costeffective manner plays a prominent role in cybersecurity. One of the pervasive approaches to plug security holes and prevent vulnerabilities from being exploited is Moving Target Defense (MTD), which can be efficiently implemented in SDN as it needs comprehensive and proactive network monitoring. The critical key in MTD is to shuffle the least number of hosts with an acceptable security impact and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

3
3

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Launching a Denial of Service (DoS) or a Distributed DoS (DDoS) attack on GC, the adversaries may target the availability of the crypto components. As a result, a detailed security analysis must be conducted to demonstrate the resiliency of an EaaS platform against DoS/DDoS attacks [64].…”
Section: A General Challengesmentioning
confidence: 99%
“…Launching a Denial of Service (DoS) or a Distributed DoS (DDoS) attack on GC, the adversaries may target the availability of the crypto components. As a result, a detailed security analysis must be conducted to demonstrate the resiliency of an EaaS platform against DoS/DDoS attacks [64].…”
Section: A General Challengesmentioning
confidence: 99%
“…When the adversary performs a Dos/DDoS attack against the substrate nodes, all the mapped slices on that substrate node will be affected. Since all the virtual nodes of a request must collaborate, losing one of them leads to the failure of the whole request [3,24]. As a result, a good mapping solution must map the virtual nodes so that attacking one of the substrate nodes causes the lowest possible number of slices to be unavailable.…”
Section: Ddos Damagementioning
confidence: 99%
“…A Distributed Denial of Service (DDoS) attack is launched against one of the critical servers in this network [9]. Among those who have connected with this server, some are legal nodes, and others are bots [10,11,12]. The state-of-the-art botnet detection techniques first detect the bots and then block them.…”
Section: Introductionmentioning
confidence: 99%