2020
DOI: 10.1109/access.2020.3013998
|View full text |Cite
|
Sign up to set email alerts
|

Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller–A Review

Abstract: The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane from the data plane that incidentally provides better features and functionalities to detect and deal with those security threats. Its elastic programmable feature permits efficient network management and provides network operators with the flexibility to monitor and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 59 publications
(19 citation statements)
references
References 60 publications
0
19
0
Order By: Relevance
“…When the switch received an incoming packet, the switch performed the filtering of incoming packets by matching the packet header with Flowrule. If no match was found, the switch automatically considered the packet as a new packet [30]- [32]. The packet was considered new because there was no mapping for the IP and MAC address of the packet on the switch.…”
Section: Classification Processmentioning
confidence: 99%
“…When the switch received an incoming packet, the switch performed the filtering of incoming packets by matching the packet header with Flowrule. If no match was found, the switch automatically considered the packet as a new packet [30]- [32]. The packet was considered new because there was no mapping for the IP and MAC address of the packet on the switch.…”
Section: Classification Processmentioning
confidence: 99%
“…Proposed IP-spoof detection has been undertaken near the attacker source in this study to enhance the attack trace. In addition, a model has been introduced for detecting and mitigating all the DDoS attacks in the cloud environment [24], [25]. The introduced model needs small storage and the ability for fast detection.…”
Section: Review Of Existing Workmentioning
confidence: 99%
“…DDoS attacks are of various types, such as TCP flood [22], UDP flood [23], and ICMP flood. An attacker sends a large amount of garbage traffic to the target network by operating the attack source, which sharply reduces the available bandwidth and prevents the target host from communicating with the outside world.…”
Section: Distributed Denial Of Service In Sdnmentioning
confidence: 99%