2015 IEEE 35th International Conference on Distributed Computing Systems Workshops 2015
DOI: 10.1109/icdcsw.2015.27
|View full text |Cite
|
Sign up to set email alerts
|

Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN)

Abstract: Software-defined networking (SDN) and OpenFlow have been driving new security applications and services. However, even if some of these studies provide interesting visions of what can be achieved, they stop short of presenting realistic application scenarios and experimental results. In this paper, we discuss a novel attack detection approach that coordinates monitors distributed over a network and controllers centralized on an SDN Open Virtual Switch (OVS), selectively inspecting network packets on demand. Wi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
22
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 67 publications
(22 citation statements)
references
References 6 publications
0
22
0
Order By: Relevance
“…(1). The Bandwidth Exhaustion [18] of the DoS attack is the exhaustion of the bandwidth that occurs during the attack of an intruder.…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…(1). The Bandwidth Exhaustion [18] of the DoS attack is the exhaustion of the bandwidth that occurs during the attack of an intruder.…”
Section: Performance Analysismentioning
confidence: 99%
“…The field of cloud computing [1,2,4] has expanded in a wide range with a speedy acceptance for the few years. It has been so as company sought more well-organized and operative ways in exploiting its IT investment.…”
Section: Cloud Computingmentioning
confidence: 99%
“…Furthermore, the study of IDS has been an important aspect of network security. There have been numerous developments of IDS solutions to deter malicious traffic [7,8,14,15,30,33,37,42], but they heavily rely on user-space detection.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, existing proposals leverage either a centralized IDS, ie, a single IDS that analyzes the traffic of the whole network, or a distributed IDS where multiple IDSs are spread across the network and sending alerts to a centralized server for further analysis. () In this work, we focus on proposals that use a single IDS to analyze the traffic of the whole network and the solutions they proposed to reduce the amount of inspected traffic. For instance, Androulidakis et al proposed to analyze only small flows, as they assume that small flows are predominant in malicious traffic.…”
Section: Related Workmentioning
confidence: 99%