2019
DOI: 10.1002/cpe.5326
|View full text |Cite
|
Sign up to set email alerts
|

Detection and mitigation of UDP flooding attack in a multicontroller software defined network using secure flow management model

Abstract: Software-Defined Networking (SDN) simplifies the network management and provides a way to virtualize, configure, and manage the network infrastructure centrally. The central management has been exhibited by reinforcing an SDN controller, which separates the network data plane from the control functions and is responsible for managing the flows. Distributed Denial-of-Service (DDoS) attacks are the most threatening issue among many security attacks, and it makes the services unavailable in a network. The flow ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 13 publications
0
3
0
1
Order By: Relevance
“…Aziz and Okamura [33] adopted deep learning algorithms to detect SMTP food attacks on software-defned networking (SDN) platforms. Gurusamy and Msk [34] detected SMTP food attacks by monitoring all ports' trafc statistics in the SDN.…”
Section: Related Workmentioning
confidence: 99%
“…Aziz and Okamura [33] adopted deep learning algorithms to detect SMTP food attacks on software-defned networking (SDN) platforms. Gurusamy and Msk [34] detected SMTP food attacks by monitoring all ports' trafc statistics in the SDN.…”
Section: Related Workmentioning
confidence: 99%
“…Lim et al [5] developed a scheduling‐based architecture to effectively mitigate attacks and safeguard networks in the event of denial‐of‐service (DoS) attacks. Perumal et al [6] introduced a DDoS attack detection model in SDN, which utilizes data flows and statistical features to determine the presence of an attack. The model employed a deep neural network trained using the self‐improved moth flame optimization algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…There are many instances in the past in which this attack was used to down important services, such as the attack on Google in 2020, the attack on AWS in the same year 2020, and many more. UDP [2] Flood User Datagram Protocol (UDP) Flood is a DDoS attack in which an attacker takes the help of UDP packets. Here, the bots (used by the attacker) send spoofed UDP Packets to the target system, resulting in a flood of UDP packets.…”
Section: Introductionmentioning
confidence: 99%