2020
DOI: 10.36227/techrxiv.12720482
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Software-defined Networking Based DDoS Defense Mechanisms

Abstract: Distributed Denial of Service attack (DDoS) is recognized to be one of the catastrophic attacks against various digital communication entities. Software-defined networking (SDN) is an emerging technology for computer networks that uses open protocols for controlling switches and routers placed at the network edges by using specialized open programmable interfaces. In this paper, a detailed study on DDoS threats prevalent in SDN is presented. Firstly, SDN features are examined from the perspective of security, … Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…Multiple bots (network nodes compromised and controlled by an attacker) are often used to launch DDoS attacks. Direct attacks on a victim typically use flooding in which many packets are sent from multiple bots to the victim; examples include TCP SYN floods, UDP floods, ICMP floods, and HTTP floods [24].…”
Section: A Ddos Attack Types and Known Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Multiple bots (network nodes compromised and controlled by an attacker) are often used to launch DDoS attacks. Direct attacks on a victim typically use flooding in which many packets are sent from multiple bots to the victim; examples include TCP SYN floods, UDP floods, ICMP floods, and HTTP floods [24].…”
Section: A Ddos Attack Types and Known Solutionsmentioning
confidence: 99%
“…Another tactic used in DDoS attacks is amplification: the attacker sends requests to network service providers such as Domain Name System (DNS) servers or network time providers (NTP) spoofing victim's IP address as the source IP address so that the responses, which are typically several times larger than the queries/requests, are sent to the victim [24]. In addition, protocol exploitation attacks like TCP SYN flooding can be performed on the victim infrastructure by taking advantage of TCP connection establishment mechanism and sending the flood of TCP SYN packets with no ACK responses to consume the victim machine resources [25].…”
Section: A Ddos Attack Types and Known Solutionsmentioning
confidence: 99%
“…Most of the current literature available addresses mainly on DDoS protection emphasizing on techniques for preventing of apparently malicious traffic at the network or application layer [24,6,12,5]. There is limited number of literatures that are available to provide deployable solutions specifically for mitigating EDoS attacks in Cloud Computing environment.…”
Section: Existing Edos Mitigation Techniquesmentioning
confidence: 99%
“…Economic Denial of Sustainability (EDoS) is a new breed of security and economical threats to the CC paradigm [22]. Unlike the traditional Distributed Denial of Service (DDoS) [10] which brings down a service by exhausting the resources of a targeted server in traditional setup, EDoS takes advantage of the elasticity feature provided as a cloud service [10,24]. This causes the resources to dynamically scale to meet the demand (because of EDoS attack) resulting in a hefty bill for the customer.…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless, the literature is evident that SDN-based networks are confronted with varied drastic subtle attacks like Denial of service (DoS), Distributed denial of service (DDoS), Brute force, Web attacks, Botnet etc [7]. Consequently, the security of the SDN controller is of paramount concern that deserves to receive a decent expanse of attention [8], [9]. To detect and mitigate the evolving latest cyber security threats, intelligent learning-based detection mechanisms should be devised.…”
Section: Introductionmentioning
confidence: 99%