2016 IEEE 41st Conference on Local Computer Networks (LCN) 2016
DOI: 10.1109/lcn.2016.108
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Crossfire Attacks Using SDN-Based Moving Target Defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
57
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(57 citation statements)
references
References 10 publications
0
57
0
Order By: Relevance
“…Aydeger et al [12] proposed a SDN-based MTD (moving target defense) mechanism to defend against specific types of DDoS attacks called Crossfire. The SDN-based mitigation approach consists to enhance the packet forwarding process in such away routes containing congested links are avoided.…”
Section: Software Defined Networking Based Solutionsmentioning
confidence: 99%
“…Aydeger et al [12] proposed a SDN-based MTD (moving target defense) mechanism to defend against specific types of DDoS attacks called Crossfire. The SDN-based mitigation approach consists to enhance the packet forwarding process in such away routes containing congested links are avoided.…”
Section: Software Defined Networking Based Solutionsmentioning
confidence: 99%
“…• Reconnaissance (or scanning) attacks: Scanning attacks are used by attackers to gather information and intelligence about a target system before an actual attack is launched. attacks include the use of hidden proxies, IP/port shuffling and/or address mapping [13,34,51,61,82,83,88,93,142,145,158,105]. For example, Meier et al [105] proposed a novel network obfuscation approach and implemented a framework named 'NetHide' which can successfully battle against the possible attacks such as Link-Flooding Attacks (LFAs) launched by even advanced attackers.…”
Section: Attack Typesmentioning
confidence: 99%
“…Compared to the simulation-based studies, results from emulation testbed-based experiments can even provide a higher validity on experimental results although emulationbased studies are not common as much as simulation studies. Aydeger et al [13] proposed an SDN-based route mutation technique to deal with DDoS attacks which are validated via the implementation on the Mininet emulator with a Floodlight SDN controller. Further, Aydeger et al [14] defined a route mutation MTD technique for the Internet Service Provider (ISP) network context through NFV and virtual shadows network aiming to thwart possible DDoS attack.…”
Section: Emulation Model-based Mtd Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Another line of work tries to reduce the quality of information an attacker can retrieve through exploration. In [58], the authors use a centralized approach to obfuscate the network links so that the topology that an attacker can retrieve via crossfire attacks is noisy and unreliable. In this work, each state is a possible path from the source to the destination of the crossfire attack.…”
Section: A What To Switch? ≈ What Actions To Play?mentioning
confidence: 99%