2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU) 2019
DOI: 10.1109/iot-siu.2019.8777688
|View full text |Cite
|
Sign up to set email alerts
|

Defending DDoS against Software Defined Networks using Entropy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…In this study, the threshold is 1. If entropy < threshold or is in the range of 0-1, the incoming packet is normal [5] [11][25] [27]. Conversely, if the entropy value is ≥ 1, then the packet is identified as DDoS and host 4 communicates via the application layer using RYU REST Application Programming Interface (API) to create and send OFPT_FLOW_MOD messages to the switch.…”
Section: Figure 3 Sdn Controller's Block Diagrammentioning
confidence: 99%
See 3 more Smart Citations
“…In this study, the threshold is 1. If entropy < threshold or is in the range of 0-1, the incoming packet is normal [5] [11][25] [27]. Conversely, if the entropy value is ≥ 1, then the packet is identified as DDoS and host 4 communicates via the application layer using RYU REST Application Programming Interface (API) to create and send OFPT_FLOW_MOD messages to the switch.…”
Section: Figure 3 Sdn Controller's Block Diagrammentioning
confidence: 99%
“…This can be a problem because in the networking management mechanism on the SDN when the packet arrives, the switch will match the information in the flow table to determine the right action. If no match is found, the switch will send a packet to the controller [10] [11] and if a DDoS attack is launched with a target of an attack on the controller then the controller will go down because all controls are centralized on the controller.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Distributed Denial of Service (DDoS) attacks are assaults against information technology infrastructure using Internet-enabled and connected devices to synchronously send requests to the victim at a rate that overwhelms the processing capacity and response rate of the victim (Dabbagh et al, 2015). Exhaustion of the victim's resources is the aim of the attack such that the resources that would have been used to serve requests from legitimate clients would be occupied by the attack requests, thus denying the legitimate clients access to the resource (Swami et al, 2019a). This results in the availability of the service, an aspect of network security among the confidentiality, integrity, and availability triad, being tampered with (Swami et al, 2019b).…”
Section: Introductionmentioning
confidence: 99%