2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2017
DOI: 10.1109/dsn.2017.42
|View full text |Cite
|
Sign up to set email alerts
|

Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
25
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 52 publications
(27 citation statements)
references
References 16 publications
2
25
0
Order By: Relevance
“…Aggregate network load observed at various locations suggests the overall health of a network [5], and the ratio of correspondence between pair flows can suggest asymmetry and in many cases illegitimacy [10]. Generic volume-based statistics (counts, counts per duration, average packet sizes) have seen effectiveness in such as k-nearest neighbours classifiers trained to detect DDoS attacks in progress [15]. Most importantly, there is evidence showing behavioural changes in response to bandwidth expansion [7], suggesting similar artefacts might arise after throttling, packet drop, or other interference.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…Aggregate network load observed at various locations suggests the overall health of a network [5], and the ratio of correspondence between pair flows can suggest asymmetry and in many cases illegitimacy [10]. Generic volume-based statistics (counts, counts per duration, average packet sizes) have seen effectiveness in such as k-nearest neighbours classifiers trained to detect DDoS attacks in progress [15]. Most importantly, there is evidence showing behavioural changes in response to bandwidth expansion [7], suggesting similar artefacts might arise after throttling, packet drop, or other interference.…”
Section: Motivationmentioning
confidence: 99%
“…Athena [15] is a generalised SDN framework for intrusion detection, but has shown the use of a k-nearest neighbours classifier to detect individual attack flows. Although heavyweight (and proven to be effective compared with Braga et al [41]), their comparison against SPIFFY lacks the quantitative evidence required to understand how the system compares.…”
Section: X R E L At E D W O R Kmentioning
confidence: 99%
“…These controls did the performance in this suggested system for enhancing the security levels. Lee et al recommended an Athena that comprised a scalable anomaly detection‐based SDN framework for supporting the ML‐based network anomaly detection unequivocally. This paper suggests a new network model for transmitting the data packets without affecting the data plane.…”
Section: Related Workmentioning
confidence: 99%
“…However, the flow data does not contain any payload or applicationlayer protocol headers and therefore limits the data analysis. Therefore, IDS based on OpenFlow monitoring work well for those attacks that have a distinct signature on flow level, such as DDoS attacks (Lee et al 2017). Shirali-Shahreza and Ganjali (2013) propose to extend OpenFlow such that the controller has full access to the packet payload.…”
Section: Sdn For Intrusion Detection and Ics Securitymentioning
confidence: 99%