Skip to main content

2020 | OriginalPaper | Buchkapitel

Detection of DDoS Attack Using SDN in IoT: A Survey

verfasst von : P. J. Beslin Pajila, E. Golden Julie

Erschienen in: Intelligent Communication Technologies and Virtual Mobile Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

IOT: Internet of Things is a developing technique, it is the system of vehicles, home apparatuses, physical gadgets, and different things installed with hardware, programming, sensors, actuators, and system availability which empower these items to associate and trade data. IOT is made out of vast number of various end frameworks associated with web. Physical gadgets installed with RFID, sensor, etc. which enables item to communicate with one another. Security is a serious issue because all the heterogeneous end systems are communicated with each other through internet.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chuah, J.W.: The Internet of Things: an overview and new perspectives in systems design. In: International Symposium on Integrated Circuits (2014). 978-1-4799-4833-8/14 Chuah, J.W.: The Internet of Things: an overview and new perspectives in systems design. In: International Symposium on Integrated Circuits (2014). 978-1-4799-4833-8/14
2.
Zurück zum Zitat Agrawal, S., Das, M.L.: Internet of Things – A Paradigm Shift of Future Internet Applications, Institute of Technology, Nirma University, Ahmedabad 382 481, 08-10 (2011) Agrawal, S., Das, M.L.: Internet of Things – A Paradigm Shift of Future Internet Applications, Institute of Technology, Nirma University, Ahmedabad 382 481, 08-10 (2011)
3.
Zurück zum Zitat Xu, X.: Study on security problems and key technologies of the Internet of Things. In: International Conference on Computation and Information Sciences (2013) Xu, X.: Study on security problems and key technologies of the Internet of Things. In: International Conference on Computation and Information Sciences (2013)
4.
Zurück zum Zitat Kanuparthi, A., Karri, R., Addepalli, S.: Hardware and embedded security in the context of Internet of Things. In: CyCAR 2013: Proceedings of the 2013 ACM Workshop on Security, Privacy & Dependability for Cyber Vehicles, pp. 61–64 (2013) Kanuparthi, A., Karri, R., Addepalli, S.: Hardware and embedded security in the context of Internet of Things. In: CyCAR 2013: Proceedings of the 2013 ACM Workshop on Security, Privacy & Dependability for Cyber Vehicles, pp. 61–64 (2013)
5.
Zurück zum Zitat Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges, countermeasures, and future directions, impact of next-generation mobile technologies on IoT: cloud convergence Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges, countermeasures, and future directions, impact of next-generation mobile technologies on IoT: cloud convergence
6.
Zurück zum Zitat Yu, W., Köse, S.: A lightweight masked AES implementation for securing IoT against CPA attacks. IEEE Trans. Circ. Syst. I Regul. Pap. 64(11), 2934–2944 (2017)MathSciNetCrossRef Yu, W., Köse, S.: A lightweight masked AES implementation for securing IoT against CPA attacks. IEEE Trans. Circ. Syst. I Regul. Pap. 64(11), 2934–2944 (2017)MathSciNetCrossRef
7.
Zurück zum Zitat Xu, T., Gao, D., Dong, P., Zhang, H., Foh, C.H., Chao, H.-C.: Defending against new-flow attack in SDN-based Internet of Things, special section on security and privacy in applications and services for future Internet of Things, vol. 5 (2017)CrossRef Xu, T., Gao, D., Dong, P., Zhang, H., Foh, C.H., Chao, H.-C.: Defending against new-flow attack in SDN-based Internet of Things, special section on security and privacy in applications and services for future Internet of Things, vol. 5 (2017)CrossRef
8.
Zurück zum Zitat Sicari, S., Rizzardi, A., Miorandi, D., Coen-Porisini, A.: Dynamic policies in Internet of Things: enforcement and synchronization. IEEE Internet of Things J. 4(6), 2228–2238 (2017) Sicari, S., Rizzardi, A., Miorandi, D., Coen-Porisini, A.: Dynamic policies in Internet of Things: enforcement and synchronization. IEEE Internet of Things J. 4(6), 2228–2238 (2017)
9.
Zurück zum Zitat Ngu, A.H.H., Gutierrez, M., Metsis, V., Nepal, S., Sheng, Q.Z.: IoT middleware: a survey on issues and enabling technologies. IEEE Internet of Things J. 4(1), 1 (2017)CrossRef Ngu, A.H.H., Gutierrez, M., Metsis, V., Nepal, S., Sheng, Q.Z.: IoT middleware: a survey on issues and enabling technologies. IEEE Internet of Things J. 4(1), 1 (2017)CrossRef
10.
Zurück zum Zitat Fermantle, P., Scott, P.: A security survey of middleware for the Internet of Things. PeerJ PrePrints 3, e1521 (2015) Fermantle, P., Scott, P.: A security survey of middleware for the Internet of Things. PeerJ PrePrints 3, e1521 (2015)
11.
Zurück zum Zitat Razzaque, M.A., Milojevic-Jevric, M., Palade, A., Clarke, S.: Middleware for Internet of Things: a survey. IEEE Internet of Things J. 3(1), 1 (2016)CrossRef Razzaque, M.A., Milojevic-Jevric, M., Palade, A., Clarke, S.: Middleware for Internet of Things: a survey. IEEE Internet of Things J. 3(1), 1 (2016)CrossRef
12.
Zurück zum Zitat Moldovan, G., Tragosy, E.Z., Fragkiadakisy, A., Pöhlsz, H.C., Calvox, D.: An IoT middleware for enhanced security and privacy: the RERUM approach (2016). ISSN: 2157-4960 Moldovan, G., Tragosy, E.Z., Fragkiadakisy, A., Pöhlsz, H.C., Calvox, D.: An IoT middleware for enhanced security and privacy: the RERUM approach (2016). ISSN: 2157-4960
13.
Zurück zum Zitat Shin, S., Gu, G.: Attacking software-defined networks: a first feasibility study. In: Proceedings of the 2nd ACM SIGCOMM Workshop Hot Topics Software Defined Networks, New York, NY, USA, pp. 165–166 (2013) Shin, S., Gu, G.: Attacking software-defined networks: a first feasibility study. In: Proceedings of the 2nd ACM SIGCOMM Workshop Hot Topics Software Defined Networks, New York, NY, USA, pp. 165–166 (2013)
14.
Zurück zum Zitat Pena, J.G.V., Yu, W.E.: Development of a distributed firewall using software defined networking technology. In: Proceedings of the 4th IEEE International Conference on Information Science and Technology (ICIST), Shenzhen, China, pp. 449–452 (2014) Pena, J.G.V., Yu, W.E.: Development of a distributed firewall using software defined networking technology. In: Proceedings of the 4th IEEE International Conference on Information Science and Technology (ICIST), Shenzhen, China, pp. 449–452 (2014)
15.
Zurück zum Zitat Seufert, S., O’Brain, D.: Machine learning for automatic defence against Distributed Denial of Service attacks. In: IEEE International Conference on Communications (2007) Seufert, S., O’Brain, D.: Machine learning for automatic defence against Distributed Denial of Service attacks. In: IEEE International Conference on Communications (2007)
16.
Zurück zum Zitat Yuan, X., Li, C., Li, X.: DeepDefense: identifying DDoS attack via deep learning. In: IEEE International Conference on Smart Computing (SMARTCOMP) (2017). 29-31 Electronic ISBN 978-1-5090-6517-2, Print on Demand (PoD) ISBN 978-1-5090-6518-9 Yuan, X., Li, C., Li, X.: DeepDefense: identifying DDoS attack via deep learning. In: IEEE International Conference on Smart Computing (SMARTCOMP) (2017). 29-31 Electronic ISBN 978-1-5090-6517-2, Print on Demand (PoD) ISBN 978-1-5090-6518-9
17.
Zurück zum Zitat Hoyos Ll, M.S., Isaza E, G.A., Vélez, J.I., Castillo O, L.: Distributed Denial of Service (DDoS) attacks detection using machine learning prototype Hoyos Ll, M.S., Isaza E, G.A., Vélez, J.I., Castillo O, L.: Distributed Denial of Service (DDoS) attacks detection using machine learning prototype
18.
Zurück zum Zitat Jararweh, Y., Al-Ayyoub, M., Darabseh, A., Benkhelifa, E., Vouk, M., Rindos, A.: SDIoT: a software defined based Internet of Things framework. Springer, Heidelberg (2015). Print ISSN 1868-5137, Online ISSN 1868-5145CrossRef Jararweh, Y., Al-Ayyoub, M., Darabseh, A., Benkhelifa, E., Vouk, M., Rindos, A.: SDIoT: a software defined based Internet of Things framework. Springer, Heidelberg (2015). Print ISSN 1868-5137, Online ISSN 1868-5145CrossRef
26.
Zurück zum Zitat Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against Distributed Denial of Service (DDoS). IEEE Commun. Surv. Tutor. 15(4), 2046–2069 (2013)CrossRef Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against Distributed Denial of Service (DDoS). IEEE Commun. Surv. Tutor. 15(4), 2046–2069 (2013)CrossRef
27.
Zurück zum Zitat Kaufman, C., Perlman, R., Sommerfeld, B.: DoS protection for UDP-based protocols. In: Proceedings of the 10th ACM Conference on Computer and Communication Security—CCS 2003, p. 2 (2003) Kaufman, C., Perlman, R., Sommerfeld, B.: DoS protection for UDP-based protocols. In: Proceedings of the 10th ACM Conference on Computer and Communication Security—CCS 2003, p. 2 (2003)
28.
Zurück zum Zitat Peng, T., Leckie, C., Ramamohanarao, K.: Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput. Surv. 39(1), 3es (2007)CrossRef Peng, T., Leckie, C., Ramamohanarao, K.: Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput. Surv. 39(1), 3es (2007)CrossRef
29.
Zurück zum Zitat Czyz, J., Kallitsis, M., Papadopoulos, C., Bailey, M.: Taming the 800 Pound Gorilla: the rise and decline of NTP DDoS attacks. In: IMC, pp. 435–448 (2014) Czyz, J., Kallitsis, M., Papadopoulos, C., Bailey, M.: Taming the 800 Pound Gorilla: the rise and decline of NTP DDoS attacks. In: IMC, pp. 435–448 (2014)
30.
Zurück zum Zitat ArunRaj Kumar, P., Selvakumar, S.: Distributed Denial of Service attack detection using an ensemble of neural classifier. Comput. Commun. 34(11), 1328–1341 (2011)CrossRef ArunRaj Kumar, P., Selvakumar, S.: Distributed Denial of Service attack detection using an ensemble of neural classifier. Comput. Commun. 34(11), 1328–1341 (2011)CrossRef
31.
Zurück zum Zitat Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX/OpenFlow. In: LCN 2010 Proceedings of the 2010 IEEE 35th Conference on Local Computer Networks, Washington, pp. 408–415. IEEE (2010) Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX/OpenFlow. In: LCN 2010 Proceedings of the 2010 IEEE 35th Conference on Local Computer Networks, Washington, pp. 408–415. IEEE (2010)
32.
Zurück zum Zitat Dotcenko, S., Vladyko, A., Letenko, I.: A fuzzy logic-based information security management for software-defined networks. In: 16th International Conference on Advanced Communication Technology (ICACT), pp. 167–171. IEEE (2014) Dotcenko, S., Vladyko, A., Letenko, I.: A fuzzy logic-based information security management for software-defined networks. In: 16th International Conference on Advanced Communication Technology (ICACT), pp. 167–171. IEEE (2014)
33.
Zurück zum Zitat Xu, X., Sun, Y., Huang, Z.: Defending DDoS attacks using hidden Markov models and cooperative reinforcement learning. In: Proceedings of the 2007 Pacific Asia Conference on Intelligence and Security Informatics, PAISI 2007, pp. 196–207 (2007). ISBN 978-3-540-71548-1 Xu, X., Sun, Y., Huang, Z.: Defending DDoS attacks using hidden Markov models and cooperative reinforcement learning. In: Proceedings of the 2007 Pacific Asia Conference on Intelligence and Security Informatics, PAISI 2007, pp. 196–207 (2007). ISBN 978-3-540-71548-1
34.
Zurück zum Zitat Bera, S., Misra, S., Vasilakos, A.V.: Software-defined networking for Internet of Things: a survey. IEEE Internet of Things J. 4(6), 1994–2008 (2017). Electronic ISSN: 2327-4662CrossRef Bera, S., Misra, S., Vasilakos, A.V.: Software-defined networking for Internet of Things: a survey. IEEE Internet of Things J. 4(6), 1994–2008 (2017). Electronic ISSN: 2327-4662CrossRef
36.
Zurück zum Zitat Yen, T.-F., Reiter, M.K.: Traffic aggregation for malware detection. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 207–227. Springer, Heidelberg (2008) Yen, T.-F., Reiter, M.K.: Traffic aggregation for malware detection. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 207–227. Springer, Heidelberg (2008)
37.
Zurück zum Zitat Shin, S., Porras, P., Yegneswaran, V., Fong, M., Gu, G., Tyson, M., Texas, A., Station, C., Park, M.: Fresco: modular composable security services for software-defined networks. In: Network and Distributed System Security Symposium, pp. 1–16 (2013) Shin, S., Porras, P., Yegneswaran, V., Fong, M., Gu, G., Tyson, M., Texas, A., Station, C., Park, M.: Fresco: modular composable security services for software-defined networks. In: Network and Distributed System Security Symposium, pp. 1–16 (2013)
38.
Zurück zum Zitat Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: clustering analysis of network traffic for protocol- and structure-independent Botnet detection. In: USENIX Security Symposium, vol. 5(2), pp. 139–154 (2008) Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: clustering analysis of network traffic for protocol- and structure-independent Botnet detection. In: USENIX Security Symposium, vol. 5(2), pp. 139–154 (2008)
39.
Zurück zum Zitat Jin, R., Wang, B.: Malware detection for mobile devices using software-defined networking. In: Proceedings of the 2013 Second GENI Research and Educational Experiment Workshop, GREE 2013, Washington, pp. 81–88. IEEE (2013) Jin, R., Wang, B.: Malware detection for mobile devices using software-defined networking. In: Proceedings of the 2013 Second GENI Research and Educational Experiment Workshop, GREE 2013, Washington, pp. 81–88. IEEE (2013)
40.
Zurück zum Zitat Lim, S., Ha, J., Kim, H., Kim, Y., Yang, S.: A SDN-oriented DDoS blocking scheme for Botnet-based attacks. In: Sixth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 63–68. IEEE (2014) Lim, S., Ha, J., Kim, H., Kim, Y., Yang, S.: A SDN-oriented DDoS blocking scheme for Botnet-based attacks. In: Sixth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 63–68. IEEE (2014)
41.
Zurück zum Zitat Mehdi, S.K., Khalid, J., Khayam, S.A.: Revisiting traffic anomaly detection using software defined networking. In: Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection, pp. 161–180 (2011) Mehdi, S.K., Khalid, J., Khayam, S.A.: Revisiting traffic anomaly detection using software defined networking. In: Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection, pp. 161–180 (2011)
42.
Zurück zum Zitat Schechter, S.E., Jung, J., Berger, A.W.: Fast detection of scanning worm infections. In: International Workshop on Recent Advances in Intrusion Detection. Springer, Heidelberg (2004) Schechter, S.E., Jung, J., Berger, A.W.: Fast detection of scanning worm infections. In: International Workshop on Recent Advances in Intrusion Detection. Springer, Heidelberg (2004)
43.
Zurück zum Zitat Giotis, K., Argyropoulos, C., Androulidakis, G., Kalogeras, D., Maglaris, V.: Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput. Netw. 62, 122–136 (2014)CrossRef Giotis, K., Argyropoulos, C., Androulidakis, G., Kalogeras, D., Maglaris, V.: Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput. Netw. 62, 122–136 (2014)CrossRef
44.
Zurück zum Zitat Chin, T., Mountrouidou, X., Li, X., Xiong, K.: Selective packet inspection to detect DoS flooding using software defined networking (SDN). In: 2015 IEEE 35th International Conference on distributed Computing Systems Workshops (ICDCSW), pp. 95–99. IEEE (2015) Chin, T., Mountrouidou, X., Li, X., Xiong, K.: Selective packet inspection to detect DoS flooding using software defined networking (SDN). In: 2015 IEEE 35th International Conference on distributed Computing Systems Workshops (ICDCSW), pp. 95–99. IEEE (2015)
45.
Zurück zum Zitat Singh, K.J., De, T.: DDOS attack detection and mitigation technique based on Http count and verification using CAPTCHA. In: 2015 International Conference on Computational Intelligence and Networks (2015) Singh, K.J., De, T.: DDOS attack detection and mitigation technique based on Http count and verification using CAPTCHA. In: 2015 International Conference on Computational Intelligence and Networks (2015)
46.
Zurück zum Zitat Yin, D., Zhang, L., Yang, K.: A DDoS attack detection and mitigation with software-defined Internet of Things framework. In: IEEE Access, Special Section on Security and Trusted Computing for Industrial Internet of Things, pp. 24694–24705, 30 April 2018CrossRef Yin, D., Zhang, L., Yang, K.: A DDoS attack detection and mitigation with software-defined Internet of Things framework. In: IEEE Access, Special Section on Security and Trusted Computing for Industrial Internet of Things, pp. 24694–24705, 30 April 2018CrossRef
47.
Zurück zum Zitat Zhang, J., Zhang, X., Imran, M.A., Evans, B., Zhang, Y., Wang, W.: Energy efficient hybrid satellite terrestrial 5G networks with software defined features. J. Commun. Netw. 19(2), 147–161 (2017)CrossRef Zhang, J., Zhang, X., Imran, M.A., Evans, B., Zhang, Y., Wang, W.: Energy efficient hybrid satellite terrestrial 5G networks with software defined features. J. Commun. Netw. 19(2), 147–161 (2017)CrossRef
48.
Zurück zum Zitat Huo, R., et al.: Software defined networking, caching, and computing or green wireless networks. IEEE Commun. Mag. 54(11), 185–193 (2016)CrossRef Huo, R., et al.: Software defined networking, caching, and computing or green wireless networks. IEEE Commun. Mag. 54(11), 185–193 (2016)CrossRef
49.
Zurück zum Zitat Guest Editorial: IEEE Systems Journals Special Issue on “Intelligent Internet of Things”. IEEE Syst. J. 10(3) (2016) Guest Editorial: IEEE Systems Journals Special Issue on “Intelligent Internet of Things”. IEEE Syst. J. 10(3) (2016)
50.
Zurück zum Zitat Chung, C.-J., Khatkar, P., Xing, T., Lee, J., Huang, D.: NICE: network intrusion detection and countermeasure. IEEE Trans. Dependable Secure Comput. 10(4), 198–211 (2013)CrossRef Chung, C.-J., Khatkar, P., Xing, T., Lee, J., Huang, D.: NICE: network intrusion detection and countermeasure. IEEE Trans. Dependable Secure Comput. 10(4), 198–211 (2013)CrossRef
51.
Zurück zum Zitat Xing, T., Huang, D., Xu, L., Chung, C.J., Khatkar, P.: SnortFlow: a OpenFlow-based intrusion prevention system in cloud environment. In: Proceedings of the 2013 2nd GENI Research and Educational Experiment Workshop, GREE 2013, pp. 89–92 (2013) Xing, T., Huang, D., Xu, L., Chung, C.J., Khatkar, P.: SnortFlow: a OpenFlow-based intrusion prevention system in cloud environment. In: Proceedings of the 2013 2nd GENI Research and Educational Experiment Workshop, GREE 2013, pp. 89–92 (2013)
Metadaten
Titel
Detection of DDoS Attack Using SDN in IoT: A Survey
verfasst von
P. J. Beslin Pajila
E. Golden Julie
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-28364-3_44