2020
DOI: 10.3390/electronics9081239
|View full text |Cite
|
Sign up to set email alerts
|

Counteracting UDP Flooding Attacks in SDN

Abstract: Software-defined networking (SDN) is a new networking architecture with a centralized control mechanism. SDN has proven to be successful in improving not only the network performance, but also security. However, centralized control in the SDN architecture is associated with new security vulnerabilities. In particular, user-datagram-protocol (UDP) flooding attacks can be easily launched and cause serious packet-transmission delays, controller-performance loss, and even network shutdown. In response to applicati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…is will probably lead to an unexpected operation accident. According to the weaknesses of protocols within TCE, several categories of DoS attacks could happen: UDP flood attacks [30] exploiting the weaknesses of TRDP and UDP, SYN flood attacks [31] exploiting the weaknesses of TRDP and TCP, MAC flood attacks [32] exploiting the weaknesses of switch tables, and Smurf attacks [33] exploiting the weaknesses of ICMP.…”
Section: Underlying Temporal Intrusions Against Tcementioning
confidence: 99%
See 1 more Smart Citation
“…is will probably lead to an unexpected operation accident. According to the weaknesses of protocols within TCE, several categories of DoS attacks could happen: UDP flood attacks [30] exploiting the weaknesses of TRDP and UDP, SYN flood attacks [31] exploiting the weaknesses of TRDP and TCP, MAC flood attacks [32] exploiting the weaknesses of switch tables, and Smurf attacks [33] exploiting the weaknesses of ICMP.…”
Section: Underlying Temporal Intrusions Against Tcementioning
confidence: 99%
“…According to equation ( 4), networks with such TCN blocks have the receptive field size of [31,127,511,2047,8095]. Accordingly, we fed different input packet sequences with seq Len � [30,120,500,2000,8000] from TCE-IDS dataset into these five models. Experimental results are shown in Figure 14.…”
Section: Parameter Tuning Experiments For Specialmentioning
confidence: 99%
“…Attack in SDN Scenario: In an SDN architecture, an attacker could launch a UDP flood attack against an SDN switch or an SDN controller. The attacker could use a tool to generate a high volume of UDP packets and send them to the target device, causing it to become overwhelmed with traffic and unable to process incoming requests [120], [121].…”
Section: Udp Flood Attackmentioning
confidence: 99%