2019
DOI: 10.1109/access.2019.2904236
|View full text |Cite
|
Sign up to set email alerts
|

Cyberpulse: A Machine Learning Based Link Flooding Attack Mitigation System for Software Defined Networks

Abstract: Software-defined networking (SDN) offers a novel paradigm for effective network management by decoupling the control plane from the data plane thereby allowing a high level of manageability and programmability. However, the notion of a centralized controller becomes a bottleneck by opening up a host of vulnerabilities to various types of attacks. One of the most harmful, stealthy, and easy to launch attacks against networked systems is the link flooding attack (LFA). In this paper, we demonstrate the vulnerabi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
31
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 74 publications
(32 citation statements)
references
References 28 publications
1
31
0
Order By: Relevance
“…As a result, the normal delivery of packets will be interrupted. • Link Flooding Attack (LFA) [63], [64]…”
Section: B Sdn Specific Attacksmentioning
confidence: 99%
“…As a result, the normal delivery of packets will be interrupted. • Link Flooding Attack (LFA) [63], [64]…”
Section: B Sdn Specific Attacksmentioning
confidence: 99%
“…In tradition, detecting LFA can be classified into two types mentioned above. There are two studies that use deep learning methods to detect LFA [ 11 , 12 ]. There are normal traffic and anomalous traffic when the attack happens, so this category of deep learning method classifies two types of traffic by artificial neural networks.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, in [ 9 , 10 ] the authors attempt to monitor the traceroute packets, which are launched by the attacker to acquire the topology and attacks on target links. The second LFA defending step is to mitigate LFA by rerouting traffic [ 1 , 10 ] or blocking malicious traffic [ 4 , 5 , 8 , 11 , 12 , 13 ] in order to deter the attack, to relieve the harm, and to recover the attacked network to a normal status. The traffic rerouting methods reroute flows that originally travel through the target links to relieve their congestions.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Open source software has also brought amazing changes to the software industry with its openness and flexibility. However, with the open source software developing rapidly, it also brings us huge security problems [1–4]. From the beginning of 2015 to the beginning of 2017, the 360 security team selected 2228 open source projects from GitHub, Source forge and other open source communities for testing.…”
Section: Introductionmentioning
confidence: 99%