2020 14th International Conference on Signal Processing and Communication Systems (ICSPCS) 2020
DOI: 10.1109/icspcs50536.2020.9310040
|View full text |Cite
|
Sign up to set email alerts
|

Low-rate TCP DDoS Attack Model in the Southbound Channel of Software Defined Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…Large-scale DDoS attacks involve threats from multiple categories, usually requiring multi-pronged defense mechanisms combining several defense approaches [29]. The efficiency of DDoS attacks depends on different aspects, one of the most important is the size of the botnet used to launch an attack [26]. Botnets creation process relies upon malware dissemination dynamics, accordingly, understanding such behaviour becomes relevant.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Large-scale DDoS attacks involve threats from multiple categories, usually requiring multi-pronged defense mechanisms combining several defense approaches [29]. The efficiency of DDoS attacks depends on different aspects, one of the most important is the size of the botnet used to launch an attack [26]. Botnets creation process relies upon malware dissemination dynamics, accordingly, understanding such behaviour becomes relevant.…”
Section: Related Workmentioning
confidence: 99%
“…If the DDoS traffic is generated by the forwarding devices or even the controllers, it would make the attack stealthier, increasing the probabilities of success. Also as proven in [26], the number of compromised devices is crucial when launching a DDoS attack. Attackers would seek to infect as many SDN devices as possible, then modelling the infection processes is essential.…”
Section: Sdn Epidemic Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Ping flood attack packets on the POX controller can be prevented by detecting anomalies using machine learning [23]. Balarezo et al carried out an experiment on denial-of-service attacks using TCP's retransmission timeout to the southbound interface via OpenFlow, and they proposed a durable model by revealing the vulnerabilities of the system [24].…”
Section: Introductionmentioning
confidence: 99%
“…The following year, Perez-Diaz et al have used six machine learning algorithms[122] in their IDS inside an SDN simulated environment. Still in 2020, Balarezo et al have investigated the feasibility and mitigation of LDoS shrew attacks on the control plane connections of an SDN network[123]. Several other papers related to SDN appeared in 2021.…”
mentioning
confidence: 99%