2015
DOI: 10.1002/sec.1368
|View full text |Cite
|
Sign up to set email alerts
|

A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox

Abstract: In this paper, we investigate the applicability of inserting an OpenFlow middlebox to enhance the remotely triggered black hole routing mechanism, to mitigate distributed denial of service (DDoS) attacks in legacy networks. Specifically, we propose a modular architecture that exploits the network programmability of software-defined networking within the context of network functions virtualization, deploying on-demand virtualized network functions (VNFs) capable to manipulate and filter malicious traffic. Lever… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 20 publications
0
12
0
Order By: Relevance
“…Also, a local control agent is introduced on the switch to enable performing localised actions ordered by the control layer. The work proposed by Giotis et al, [29] use OpenFlow middleboxes to stop malicious flows of a DDoS attack in legacy networks. This work handle traffic on a per-flow level within an NFV context.…”
Section: State Of the Artmentioning
confidence: 99%
“…Also, a local control agent is introduced on the switch to enable performing localised actions ordered by the control layer. The work proposed by Giotis et al, [29] use OpenFlow middleboxes to stop malicious flows of a DDoS attack in legacy networks. This work handle traffic on a per-flow level within an NFV context.…”
Section: State Of the Artmentioning
confidence: 99%
“…Each of the switches is running our prototype, with end-point Switches 1-4 continually analysing gathered statistics for potential anomalies, while Switches 5-7 are only involved in the detection process if specifically invoked. From the large range of possible attacks that can be evaluated, we decided to use a subset of available anomalies that represent a wide variety of attacks and allow us to accurately measure the performance of our proposed solution: Brute Force access which contain comparable patterns to 0-day attacks, DDoS attacks which are already being thoroughly investigated in other approaches [3], and Port Scans. This wide spread set of vulnerabilities contain features with large variations between them, therefore allowing us to thoroughly test the applicability of our prototype to the different styles of anomalies.…”
Section: A Experimental Setupmentioning
confidence: 99%
“…In this paper, we propose a two-level approach for network anomaly detection [2], [3], which combines coarse-grained monitoring performance with the accuracy of fine-grained analysis, resulting in improved detection accuracy with minimal performance costs. We further enhance the architecture by enabling execution within a distributed environment.…”
Section: Introductionmentioning
confidence: 99%
“…It becomes easier to detect and mitigate DDoS attacks in network, as policies could be imposed easily on devices, and central traffic filtering to detect malicious flow could be imposed. One study shows how DDoS in legacy network could be resolved using OpenFlow middle boxes that is capable of blocking attack sources easily. But at the same time, it has slower processing capability compared with hardware.…”
Section: Distributed Denial Of Service Attackmentioning
confidence: 99%