Skip to main content
Top
Published in: Wireless Personal Communications 1/2021

17-06-2021

Mitigation of Malicious Flooding in Software Defined Networks Using Dynamic Access Control List

Authors: J. Ramprasath, V. Seethalakshmi

Published in: Wireless Personal Communications | Issue 1/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Software defined networks (SDN) creates an environment for designing customized networks based on consumer needs. SDN can effectively apply the decoupling methods on the forwarding plane and the control plane. The SDN controller will forward the traffic information to northbound API and controller obtain the traffic information from openflow virtual switch. SDN routes data and control packets to their destinations based on flow labels, but it lacks protection features to prevent malicious traffic. The SDN environment faces denial of service (DoS) attacks and distribute denial of service attacks, it leads to service unavailability. This paper is mainly focused on dynamically configuring the firewall to identify DoS attacks and decrease malevolent traffic. Virtual networks are simulated using mininet with dynamic access control list rules, and the result show that the suggested solution has improved attack alleviation time bins.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Jarray, A., & Karmouch. A. (2013). Cost-efficient mapping for fault-tolerant virtual networks. IEEE Transactions on Computers, 64(3), 668–681.MathSciNetCrossRef Jarray, A., & Karmouch. A. (2013). Cost-efficient mapping for fault-tolerant virtual networks. IEEE Transactions on Computers, 64(3), 668–681.MathSciNetCrossRef
2.
go back to reference Deng, S., Gao, X., Lu, Z., Li, Z., & Gao, X. (2019). DoS vulnerabilities and mitigation strategies in software-defined networks. Journal of Network and Computer Applications, 125. 209–219.CrossRef Deng, S., Gao, X., Lu, Z., Li, Z., & Gao, X. (2019). DoS vulnerabilities and mitigation strategies in software-defined networks. Journal of Network and Computer Applications, 125. 209–219.CrossRef
3.
go back to reference Cui, Y., Yan, L., Li, S., Xing, H., Pan, W., Zhu, J. & Zheng, X. (2016). SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks. Journal of Network and Computer Applications, 68, 65–79.CrossRef Cui, Y., Yan, L., Li, S., Xing, H., Pan, W., Zhu, J. & Zheng, X. (2016). SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks. Journal of Network and Computer Applications, 68, 65–79.CrossRef
4.
go back to reference Behal, S., Kumar, K., & Sachdeva, M. (2018). D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events. Journal of Network and Computer Applications, 111, 49–63.CrossRef Behal, S., Kumar, K., & Sachdeva, M. (2018). D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events. Journal of Network and Computer Applications, 111, 49–63.CrossRef
5.
go back to reference Li, Y., Wang, Z., Yao, J., Yin, X., Shi, X., Wu, J. & Zhang, H. (2019). MSAID: Automated detection of interference in multiple SDN applications. Journal of Computer Networks, 153, 49–62.CrossRef Li, Y., Wang, Z., Yao, J., Yin, X., Shi, X., Wu, J. & Zhang, H. (2019). MSAID: Automated detection of interference in multiple SDN applications. Journal of Computer Networks, 153, 49–62.CrossRef
6.
go back to reference Birkinshaw, C., Rouka, E., & Vassilakis, V.G. (2019). Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks. Journal of Network and Computer Applications, 136, 71–85.CrossRef Birkinshaw, C., Rouka, E., & Vassilakis, V.G. (2019). Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks. Journal of Network and Computer Applications, 136, 71–85.CrossRef
7.
go back to reference Hosseini, S., & Azizi, M. (2019). The hybrid technique for DDoS detection with supervised learning algorithms. Journal of Computer Networks, Volume 158, 35–45.CrossRef Hosseini, S., & Azizi, M. (2019). The hybrid technique for DDoS detection with supervised learning algorithms. Journal of Computer Networks, Volume 158, 35–45.CrossRef
8.
go back to reference Ramprasath, J., Ramakrishnan, S., Saravana Perumal, P., Sivaprakasam, M., & Manokaran, U. V. (2016). Secure network implementation using VLAN and ACL. International Journal of Advanced Engineering Research and Science, 3(1), 2349–6495. Ramprasath, J., Ramakrishnan, S., Saravana Perumal, P., Sivaprakasam, M., & Manokaran, U. V. (2016). Secure network implementation using VLAN and ACL. International Journal of Advanced Engineering Research and Science, 3(1), 2349–6495.
9.
go back to reference Ramprasath, J., & Seethalakshmi, V. (2021). Improved network monitoring using software-defined networking for DDoS detection and mitigation evaluation. Wireless Personal Communications, 116(3). 2743–2757.CrossRef Ramprasath, J., & Seethalakshmi, V. (2021). Improved network monitoring using software-defined networking for DDoS detection and mitigation evaluation. Wireless Personal Communications, 116(3). 2743–2757.CrossRef
10.
go back to reference Smyth, D., O, Shea, D., Cionca, V., & McSweeney, S. (2019). Attacking distributed software-defined networks by leveraging network state consistency. Journal of Computer Networks, 156, 9–19. Smyth, D., O, Shea, D., Cionca, V., & McSweeney, S. (2019). Attacking distributed software-defined networks by leveraging network state consistency. Journal of Computer Networks, 156, 9–19.
11.
go back to reference Ramprasath, J., Ramya, P., & Rathnapriya, T. (2020). Malicious attack detection in software defined networking using machine learning approach. International Journal of Advances in Engineering and Emerging Technology, 11(1), 22–27. Ramprasath, J., Ramya, P., & Rathnapriya, T. (2020). Malicious attack detection in software defined networking using machine learning approach. International Journal of Advances in Engineering and Emerging Technology, 11(1), 22–27.
12.
go back to reference Ponmanikandan, V., Ramprasath, J., Rakunanthan, K. S., & Santhosh Kumar, M. (2020). An ecosystem for vulnerable traffic analysis and mitigation services in software defined networking. International Research Journal of Engineering and Technology, 7(6), 5287–5295. Ponmanikandan, V., Ramprasath, J., Rakunanthan, K. S., & Santhosh Kumar, M. (2020). An ecosystem for vulnerable traffic analysis and mitigation services in software defined networking. International Research Journal of Engineering and Technology, 7(6), 5287–5295.
13.
go back to reference Cui, J., Wang, M., Luo, Y., & Zhong, H. (2019). DDoS detection and defense mechanism based on cognitive-inspired computing in SDN. Journal of Future Generation Computer Systems, 97 275–283.CrossRef Cui, J., Wang, M., Luo, Y., & Zhong, H. (2019). DDoS detection and defense mechanism based on cognitive-inspired computing in SDN. Journal of Future Generation Computer Systems, 97 275–283.CrossRef
14.
go back to reference Giotis, K., Argyropoulos, C., Androulidakis, G., Kalogeras, D., & Maglaris, V. (2014). Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Journal of Computer Networks, 62 122–136.CrossRef Giotis, K., Argyropoulos, C., Androulidakis, G., Kalogeras, D., & Maglaris, V. (2014). Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Journal of Computer Networks, 62 122–136.CrossRef
15.
go back to reference Carvalho, L. F., Abrão, T., de Souza Mendes, L., & Proença Jr, M. L. (2018). An ecosystem for anomaly detection and mitigation in software-defined networking. Journal of Expert Systems with Applications, 104, 121–133.CrossRef Carvalho, L. F., Abrão, T., de Souza Mendes, L., & Proença Jr, M. L. (2018). An ecosystem for anomaly detection and mitigation in software-defined networking. Journal of Expert Systems with Applications, 104, 121–133.CrossRef
16.
go back to reference Jammal, M., Singh, T., Shami, A., Asal, R. & Li, Y. (2014). Survey Paper Software defined networking: State of the art and research challenges. Journal of Computer Networks, 72, 74–98.CrossRef Jammal, M., Singh, T., Shami, A., Asal, R. & Li, Y. (2014). Survey Paper Software defined networking: State of the art and research challenges. Journal of Computer Networks, 72, 74–98.CrossRef
17.
go back to reference Singh, M. P. & Bhandari, A. (2020). New-flow based DDoS attacks in SDN: Taxonomy, rationales, and research challenges. Journal of Computer Communications, 154, 509–527.CrossRef Singh, M. P. & Bhandari, A. (2020). New-flow based DDoS attacks in SDN: Taxonomy, rationales, and research challenges. Journal of Computer Communications, 154, 509–527.CrossRef
18.
go back to reference Imran, M., Durad, M. H., Khan, F. A., & Derhab, A. (2019). Toward an optimal solution against denial of service attacks in software defined networks. Journal of Future Generation Computer Systems, 92, 444–453.CrossRef Imran, M., Durad, M. H., Khan, F. A., & Derhab, A. (2019). Toward an optimal solution against denial of service attacks in software defined networks. Journal of Future Generation Computer Systems, 92, 444–453.CrossRef
19.
go back to reference Ramprakash, P., Sakthivadivel, M., Krishnaraj, N., & Ramprasath, J. (2014). Host-based intrusion detection system using sequence of system calls. International Journal of Engineering and Management Research, 4(2), 241–247. Ramprakash, P., Sakthivadivel, M., Krishnaraj, N., & Ramprasath, J. (2014). Host-based intrusion detection system using sequence of system calls. International Journal of Engineering and Management Research, 4(2), 241–247.
20.
go back to reference Anand, N., Babu, S., & Manoj, B.S. (2018). On detecting compromised controller in software defined networks. Journal of Computer Networks, 137, 107–118.CrossRef Anand, N., Babu, S., & Manoj, B.S. (2018). On detecting compromised controller in software defined networks. Journal of Computer Networks, 137, 107–118.CrossRef
21.
go back to reference Tran, T. V. & Ahn, H. (2017). Challenges of and solution to the control load of stateful firewall in software defined networks. Journal of Computer Standards & Interfaces, 54, 293–304.CrossRef Tran, T. V. & Ahn, H. (2017). Challenges of and solution to the control load of stateful firewall in software defined networks. Journal of Computer Standards & Interfaces, 54, 293–304.CrossRef
22.
go back to reference Jayasri, P., Atchaya, A., Sanfeeya Parveen, M., & Ramprasath, J. (2021). Intrusion detection system in software defined networks using machine learning approach. International Journal of Advanced Engineering Research and Science, 8, 4. Jayasri, P., Atchaya, A., Sanfeeya Parveen, M., & Ramprasath, J. (2021). Intrusion detection system in software defined networks using machine learning approach. International Journal of Advanced Engineering Research and Science, 8, 4.
23.
go back to reference Krishnaraj, N., & Smys, S. (2019). A Multihoming ACO-MDV routing for maximum power efficiency in an IoT environment. International Journal on Wireless Personal Communications, 109(1), 243–256. Krishnaraj, N., & Smys, S. (2019). A Multihoming ACO-MDV routing for maximum power efficiency in an IoT environment. International Journal on Wireless Personal Communications, 109(1), 243–256.
Metadata
Title
Mitigation of Malicious Flooding in Software Defined Networks Using Dynamic Access Control List
Authors
J. Ramprasath
V. Seethalakshmi
Publication date
17-06-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08626-6

Other articles of this Issue 1/2021

Wireless Personal Communications 1/2021 Go to the issue