Skip to main content
Top

2021 | OriginalPaper | Chapter

Detection and Prevention from DDoS Attack Using Software-Defined Security

Authors : Sumit Badotra, Surya Narayan Panda, Priyanka Datta

Published in: Progress in Advanced Computing and Intelligent Engineering

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The network which is able to accommodate today’s real-time need is growing in a very fast manner. But simultaneously also occurs an increase in the rate of network attacks and threats. Distributed Denial of Service (DDoS) is one of the attacks in which intruder attempts to disrupt normal network traffic by flooding huge traffic into the network and ultimately halt the network services and resources. There are numerous solutions available for the detection and prevention of DDoS attacks in traditional networks but making use of Software-Defined Security (SDS) is a new way of securing the network. The basic principle of separating the intelligence of the network from the infrastructure can be considered as the new hope for securing the network. This chapter aims to provide the need for SDS in networks with related literature survey we have also found out the research gaps from research done till now or going on. A method to prevent a network from DDoS attacks is also proposed using SDS.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Turner J et al (2008) OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput Commun Rev 38(2):69–74 McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Turner J et al (2008) OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput Commun Rev 38(2):69–74
2.
go back to reference Sharma K, Khandelwal N, Prabhakar M (2011) An overview of security problems in MANET. In: ISEM international conference Sharma K, Khandelwal N, Prabhakar M (2011) An overview of security problems in MANET. In: ISEM international conference
3.
go back to reference O’Brien WJ, Formoso CT, Ruben V, London K (2008) Construction supply chain management handbook. CRC Press O’Brien WJ, Formoso CT, Ruben V, London K (2008) Construction supply chain management handbook. CRC Press
4.
go back to reference Xia W, Wen Y, Foh CH, Niyato D, Xie H (2014) A survey on software-defined networking. IEEE Commun Surv Tutor 17(1):27–51 Xia W, Wen Y, Foh CH, Niyato D, Xie H (2014) A survey on software-defined networking. IEEE Commun Surv Tutor 17(1):27–51
5.
go back to reference Nunes BAA, Mendonca M, Nguyen XN, Obraczka K, Turletti T (2014) A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun Surv Tutor 16(3):1617–1634 Nunes BAA, Mendonca M, Nguyen XN, Obraczka K, Turletti T (2014) A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun Surv Tutor 16(3):1617–1634
6.
go back to reference Braga R, de Souza Mota E, Passito A (2010) Lightweight DDoS flooding attack detection using NOX/OpenFlow. In: LCN, vol 10, pp 408–415 Braga R, de Souza Mota E, Passito A (2010) Lightweight DDoS flooding attack detection using NOX/OpenFlow. In: LCN, vol 10, pp 408–415
7.
go back to reference Jun JH, Lee D, Ahn CW, Kim SH (2014) DDoS attack detection using flow entropy and packet sampling on huge networks of ICN, pp 185–190 Jun JH, Lee D, Ahn CW, Kim SH (2014) DDoS attack detection using flow entropy and packet sampling on huge networks of ICN, pp 185–190
8.
go back to reference Jyothi V, Wang X, Addepalli SK, Karri R (2016) Brain: behavior based adaptive intrusion detection in networks: using hardware performance counters to detect ddos attacks. In: 2016 29th international conference on VLSI design and 2016 15th international conference on embedded systems (VLSID). IEEE, pp. 587–588 Jyothi V, Wang X, Addepalli SK, Karri R (2016) Brain: behavior based adaptive intrusion detection in networks: using hardware performance counters to detect ddos attacks. In: 2016 29th international conference on VLSI design and 2016 15th international conference on embedded systems (VLSID). IEEE, pp. 587–588
9.
go back to reference Li J, Berg S, Zhang M, Reiher P, Wei T (2014) Drawbridge: software-defined ddos-resistant traffic engineering. ACM SIGCOMM Comput Commun Rev 44(4):591–592 (ACM) Li J, Berg S, Zhang M, Reiher P, Wei T (2014) Drawbridge: software-defined ddos-resistant traffic engineering. ACM SIGCOMM Comput Commun Rev 44(4):591–592 (ACM)
10.
go back to reference Wang X, Chen M, Xing C (2015) SDSNM: a software-defined security networking mechanism to defend against DDoS attacks. In: 2015 ninth international conference on frontier of computer science and technology. IEEE, pp 115–121 Wang X, Chen M, Xing C (2015) SDSNM: a software-defined security networking mechanism to defend against DDoS attacks. In: 2015 ninth international conference on frontier of computer science and technology. IEEE, pp 115–121
11.
go back to reference Yu J, Fang C, Lu L, Li Z (2010) Mitigating application layer distributed denial of service attacks via effective trust management. IET Commun 4(16):1952–1962 Yu J, Fang C, Lu L, Li Z (2010) Mitigating application layer distributed denial of service attacks via effective trust management. IET Commun 4(16):1952–1962
12.
go back to reference Singh KJ, De T (2015) DDOS attack detection and mitigation technique based on Http count and verification using CAPTCHA. In: 2015 international conference on computational intelligence and networks. IEEE, pp 196–197 Singh KJ, De T (2015) DDOS attack detection and mitigation technique based on Http count and verification using CAPTCHA. In: 2015 international conference on computational intelligence and networks. IEEE, pp 196–197
13.
go back to reference Al-Ali Z, Al-Duwairi B, Al-Hammouri AT (2015) Handling system overload resulting from DDoS attacks and flash crowd events. In: 2015 IEEE 2nd international conference on cyber security and cloud computing. IEEE, pp. 512–512 Al-Ali Z, Al-Duwairi B, Al-Hammouri AT (2015) Handling system overload resulting from DDoS attacks and flash crowd events. In: 2015 IEEE 2nd international conference on cyber security and cloud computing. IEEE, pp. 512–512
14.
go back to reference Bhuyan MH, Bhattacharyya DK, Kalita JK (2015) An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recogn Lett 51:1–7 Bhuyan MH, Bhattacharyya DK, Kalita JK (2015) An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recogn Lett 51:1–7
15.
go back to reference Qin X, Xu T, Wang C (2015) DDoS attack detection using flow entropy and clustering technique. In: 2015 11th international conference on computational intelligence and security (CIS). IEEE, pp 412–415 Qin X, Xu T, Wang C (2015) DDoS attack detection using flow entropy and clustering technique. In: 2015 11th international conference on computational intelligence and security (CIS). IEEE, pp 412–415
16.
go back to reference David J, Thomas C (2015) DDoS attack detection using fast entropy approach on flow-based network traffic. Proc Comput Sci 50:30–36 David J, Thomas C (2015) DDoS attack detection using fast entropy approach on flow-based network traffic. Proc Comput Sci 50:30–36
17.
go back to reference Yu S, Tian Y, Guo S, Wu DO (2013) Can we beat DDoS attacks in clouds? IEEE Trans Parallel Distrib Syst 25(9):2245–2254 Yu S, Tian Y, Guo S, Wu DO (2013) Can we beat DDoS attacks in clouds? IEEE Trans Parallel Distrib Syst 25(9):2245–2254
18.
go back to reference Alqahtani S, Gamble RF (2015) DDoS attacks in service clouds. In: 2015 48th Hawaii international conference on system sciences. IEEE, pp 5331–5340 Alqahtani S, Gamble RF (2015) DDoS attacks in service clouds. In: 2015 48th Hawaii international conference on system sciences. IEEE, pp 5331–5340
19.
go back to reference Shin S, Yegneswaran V, Porras P, Gu G (2013) Avant-guard: scalable and vigilant switch flow management in software-defined networks. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security. ACM, pp 413–424 Shin S, Yegneswaran V, Porras P, Gu G (2013) Avant-guard: scalable and vigilant switch flow management in software-defined networks. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security. ACM, pp 413–424
20.
go back to reference Shoeb A, Chithralekha T (2016) Resource management of switches and controller during saturation time to avoid DDoS in SDN. In: 2016 IEEE international conference on engineering and technology (ICETECH). IEEE, pp. 152–157 Shoeb A, Chithralekha T (2016) Resource management of switches and controller during saturation time to avoid DDoS in SDN. In: 2016 IEEE international conference on engineering and technology (ICETECH). IEEE, pp. 152–157
21.
go back to reference Wang B, Zheng Y, Lou W, Hou YT (2015) DDoS attack protection in the era of cloud computing and software-defined networking. Comput Netw 81:308–319 Wang B, Zheng Y, Lou W, Hou YT (2015) DDoS attack protection in the era of cloud computing and software-defined networking. Comput Netw 81:308–319
22.
go back to reference Zheng J, Li Q, Gu G, Cao J, Yau DK, Wu J (2018) Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis. IEEE Trans Inf Forensics Security 13(7):1838–1853 Zheng J, Li Q, Gu G, Cao J, Yau DK, Wu J (2018) Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis. IEEE Trans Inf Forensics Security 13(7):1838–1853
23.
go back to reference Tseng Y, Zhang Z, Naït-Abdesselam F (2016) Controllersepa: a security-enhancing SDN controller plug-in for openflow applications. In: 2016 17th international conference on parallel and distributed computing, applications and technologies (PDCAT). IEEE, pp 268–273 Tseng Y, Zhang Z, Naït-Abdesselam F (2016) Controllersepa: a security-enhancing SDN controller plug-in for openflow applications. In: 2016 17th international conference on parallel and distributed computing, applications and technologies (PDCAT). IEEE, pp 268–273
24.
go back to reference Badotra S, Singh J (2019) Creating firewall in transport layer and application layer using software defined networking. In: Innovations in computer science and engineering. Springer, pp 95–103 Badotra S, Singh J (2019) Creating firewall in transport layer and application layer using software defined networking. In: Innovations in computer science and engineering. Springer, pp 95–103
25.
go back to reference Hameed S, Ahmed Khan H (2018) SDN based collaborative scheme for mitigation of DDoS attacks. Future Internet 10(3):23 Hameed S, Ahmed Khan H (2018) SDN based collaborative scheme for mitigation of DDoS attacks. Future Internet 10(3):23
26.
go back to reference Pal C, Veena S, Rustagi RP, Murthy KNB (2014) Implementation of simplified custom topology framework in Mininet. In: 2014 Asia-Pacific conference on computer aided system engineering (APCASE). IEEE, pp 48–53 Pal C, Veena S, Rustagi RP, Murthy KNB (2014) Implementation of simplified custom topology framework in Mininet. In: 2014 Asia-Pacific conference on computer aided system engineering (APCASE). IEEE, pp 48–53
27.
go back to reference Shalimov A, Zuikov D, Zimarina D, Pashkov V, Smeliansky R (2013) Advanced study of SDN/OpenFlow controllers. In: Proceedings of the 9th central & eastern European software engineering conference in Russia. ACM, p 1 Shalimov A, Zuikov D, Zimarina D, Pashkov V, Smeliansky R (2013) Advanced study of SDN/OpenFlow controllers. In: Proceedings of the 9th central & eastern European software engineering conference in Russia. ACM, p 1
28.
go back to reference Chen M, Qian Y, Mao S, Tang W, Yang X (2016) Software-defined mobile networks security. Mob Netw Appl 21(5):729–743 Chen M, Qian Y, Mao S, Tang W, Yang X (2016) Software-defined mobile networks security. Mob Netw Appl 21(5):729–743
29.
go back to reference Badotra S, Panda SN (2020) SNORT based early DDoS detection system using Open daylight and open networking operating system in software-defined networking. In: Cluster Computing Badotra S, Panda SN (2020) SNORT based early DDoS detection system using Open daylight and open networking operating system in software-defined networking. In: Cluster Computing
30.
go back to reference Oktian YE, Lee S, Lee H, Lam J (2017) Distributed SDN controller system: a survey on design choice. Comput Netw 121:100–111 Oktian YE, Lee S, Lee H, Lam J (2017) Distributed SDN controller system: a survey on design choice. Comput Netw 121:100–111
31.
go back to reference Kaur S, Singh J, Ghumman NS (2014) Network programmability using POX controller. In: ICCCS international conference on communication, computing & systems, vol 138, IEEE Kaur S, Singh J, Ghumman NS (2014) Network programmability using POX controller. In: ICCCS international conference on communication, computing & systems, vol 138, IEEE
33.
go back to reference Shalimov A, Zuikov D, Zimarina D, Pashkov V, Smeliansky R (2013) Advanced study of SDN/OpenFlow controllers. In: Proceedings of the 9th central & eastern European software engineering conference in Russia. ACM, p 1 Shalimov A, Zuikov D, Zimarina D, Pashkov V, Smeliansky R (2013) Advanced study of SDN/OpenFlow controllers. In: Proceedings of the 9th central & eastern European software engineering conference in Russia. ACM, p 1
35.
go back to reference Badotra S, Panda SN Evaluation and comparison of OpenDayLight and open networking operating system in software-defined networking. Cluster Comput 1–11 Badotra S, Panda SN Evaluation and comparison of OpenDayLight and open networking operating system in software-defined networking. Cluster Comput 1–11
36.
go back to reference Badotra S, Singh J (2017) Open daylight as a controller for software defined networking. Int J Adv Res Comput Sci 8(5) Badotra S, Singh J (2017) Open daylight as a controller for software defined networking. Int J Adv Res Comput Sci 8(5)
37.
go back to reference Badotra S, Panda SN (2019) A review on software-defined networking enabled iot cloud computing. IIUM Eng J 20(2):105–126 Badotra S, Panda SN (2019) A review on software-defined networking enabled iot cloud computing. IIUM Eng J 20(2):105–126
38.
go back to reference Morales LV, Murillo AF, Rueda SJ (2015) Extending the floodlight controller. In: 2015 IEEE 14th international symposium on network computing and applications. IEEE, pp 126–133 Morales LV, Murillo AF, Rueda SJ (2015) Extending the floodlight controller. In: 2015 IEEE 14th international symposium on network computing and applications. IEEE, pp 126–133
Metadata
Title
Detection and Prevention from DDoS Attack Using Software-Defined Security
Authors
Sumit Badotra
Surya Narayan Panda
Priyanka Datta
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-6584-7_21