Skip to main content
Top

2020 | OriginalPaper | Chapter

Research on DDoS Abnormal Traffic Detection Under SDN Network

Authors : Zhaohui Ma, Jialiang Huang

Published in: Parallel Architectures, Algorithms and Programming

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The seperation of control layer from data layer through SDN (software defined network) enables network administrators to plan the network programmatically without changing network devices, realizing flexible configuration of network devices and fast forwarding of data flows. However, due to its construction, SDN is vulnerable to be attacked by Distributed Denial of Service (DDoS) attack. So it is important to detect DDoS attack in SDN network. This paper presents a DDoS detection scheme based on the machine learning method of SVM (support vector machine) support vector machine in SDN environment. By extracting the flow table information features in SDN network, the data is detected and the data model of DDoS traffic can be trained, and the purpose of DDoS abnormal traffic identification is finally realized.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Xiao, M.: Comparative analysis of commercial SDN schemes for cloud computing data centers. J. Mianyang Norm. Univ. 38(02), 83–87+139 (2019) Xiao, M.: Comparative analysis of commercial SDN schemes for cloud computing data centers. J. Mianyang Norm. Univ. 38(02), 83–87+139 (2019)
2.
go back to reference Jiang, M.: Application analysis of SDN in data center. Commun. World 26(01), 91–92 (2019) Jiang, M.: Application analysis of SDN in data center. Commun. World 26(01), 91–92 (2019)
3.
go back to reference Lu, W., Liu, T., Liu, X., Ye, Q.: Research on intelligent SDN wave separation network deployment. Post Telecommun. Des. Technol. (01), 26–30 (2019) Lu, W., Liu, T., Liu, X., Ye, Q.: Research on intelligent SDN wave separation network deployment. Post Telecommun. Des. Technol. (01), 26–30 (2019)
4.
go back to reference Zhang, Q.: Automatic deployment framework of security service chain based on SDN/NFV. Appl. Comput. Syst. 27(03), 198–204 (2008)CrossRef Zhang, Q.: Automatic deployment framework of security service chain based on SDN/NFV. Appl. Comput. Syst. 27(03), 198–204 (2008)CrossRef
5.
go back to reference Liu, T.: Research on node security control technology of SDN network. Beijing University of Posts and Telecommunications (2017) Liu, T.: Research on node security control technology of SDN network. Beijing University of Posts and Telecommunications (2017)
6.
go back to reference Yang, Y., Yang, J., Sun, Y.: Research on implementation mechanism and defense of distributed denial of service attack. Comput. Eng. Des. 25(5), 657–660 (2004) Yang, Y., Yang, J., Sun, Y.: Research on implementation mechanism and defense of distributed denial of service attack. Comput. Eng. Des. 25(5), 657–660 (2004)
7.
go back to reference Liu, S.: Link flooding attack detection and defense based on SDN and NFV. Wuhan University (2017) Liu, S.: Link flooding attack detection and defense based on SDN and NFV. Wuhan University (2017)
8.
go back to reference Zheng, Z., Wang, M.: Application of k-means clustering algorithm based on big data in network security detection. J. Hubei Second Normal Univ. 33(02), 36–40 (2016) Zheng, Z., Wang, M.: Application of k-means clustering algorithm based on big data in network security detection. J. Hubei Second Normal Univ. 33(02), 36–40 (2016)
9.
go back to reference Tang, G.: Research on secure control and forwarding technology of SDN network based on password identification. University of Information Engineering of Strategic Support Force (2018) Tang, G.: Research on secure control and forwarding technology of SDN network based on password identification. University of Information Engineering of Strategic Support Force (2018)
10.
go back to reference Cheng, J., Gong, J., Yang, W., Zang, X.: Research on network intrusion tracking and response system based on SDN technology. J. Commun. 39(S1), 244–250 (2008) Cheng, J., Gong, J., Yang, W., Zang, X.: Research on network intrusion tracking and response system based on SDN technology. J. Commun. 39(S1), 244–250 (2008)
11.
go back to reference Yu, P., Qi, Y., Li, Q.: DDoS attack detection method based on random forest classification model. Comput. Appl. Res. 34(10), 3068–3072 (2017) Yu, P., Qi, Y., Li, Q.: DDoS attack detection method based on random forest classification model. Comput. Appl. Res. 34(10), 3068–3072 (2017)
12.
go back to reference Jadidi, J.Z, Muthukkumarasamy, V., Sithirasenan, E., et al.: Flow-based anomaly detection using neural network optimized with GSA algorithm. In: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops, Philadelphia, PA, pp. 76–81 (2013) Jadidi, J.Z, Muthukkumarasamy, V., Sithirasenan, E., et al.: Flow-based anomaly detection using neural network optimized with GSA algorithm. In: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops, Philadelphia, PA, pp. 76–81 (2013)
13.
go back to reference Van Trung, P., Huong, T.T., Van Tuyen, D., et al.: A multi-criteria-based DDoS-atack prevention solution using software defined networking. In: 2015 International Conference on Advanced Technologies for Communications (ATC), Ho Chi Minh City, pp. 308–313 (2015) Van Trung, P., Huong, T.T., Van Tuyen, D., et al.: A multi-criteria-based DDoS-atack prevention solution using software defined networking. In: 2015 International Conference on Advanced Technologies for Communications (ATC), Ho Chi Minh City, pp. 308–313 (2015)
14.
go back to reference Tang, T.A., Mhamd, L., McLernon, D., et al.: Deep learning approach for network intrusion detection in software defined networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), Marakesh, Moroco, pp. 258–263 (2016) Tang, T.A., Mhamd, L., McLernon, D., et al.: Deep learning approach for network intrusion detection in software defined networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), Marakesh, Moroco, pp. 258–263 (2016)
15.
go back to reference Yu, K.: Large-scale deep learning at Baidu. In: 22nd ACM International Conference on Information & Knowledge Management, pp. 2211–2212 (2013) Yu, K.: Large-scale deep learning at Baidu. In: 22nd ACM International Conference on Information & Knowledge Management, pp. 2211–2212 (2013)
16.
go back to reference Robinson, R.R.R., Thomas, C.: Ranking of machine learning algorithms based on the performance in classifying DDos attacks. In: 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS), Trivandrum, pp. 185–190 (2015) Robinson, R.R.R., Thomas, C.: Ranking of machine learning algorithms based on the performance in classifying DDos attacks. In: 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS), Trivandrum, pp. 185–190 (2015)
Metadata
Title
Research on DDoS Abnormal Traffic Detection Under SDN Network
Authors
Zhaohui Ma
Jialiang Huang
Copyright Year
2020
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-2767-8_33