Skip to main content
Erschienen in: Wireless Personal Communications 3/2021

01.01.2021

Improved Network Monitoring Using Software-Defined Networking for DDoS Detection and Mitigation Evaluation

verfasst von: J. Ramprasath, V. Seethalakshmi

Erschienen in: Wireless Personal Communications | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Software-Defined Networking (SDN) is termed to be a promising paradigm since it provides a perfect administration for the network separating the data plane from the control plane. This is unlike the traditional network that has worked with the coupled data and the control plane that allows no scope for innovation. The decoupling of the forwarding and the control plane allows many advantages, such as a programmable control plane, migration, protocols, etc. Despite the provisions in the SDN that provides flexibility and agility in the performance of the network. The network environment suffers from security threats that occur due to DDoS. As the traditional methods prove to be insufficient for DDoS detection and mitigation since they lag in simple and autonomous management. The article presents the fast and flexible method for the early identification of the abnormal traffic flow for detecting the DDoS attacks and the mitigation techniques in SDN will reduce the severity of the DDoS attacks. The proposed method is simulated using the Mininet to show the proficiency of the system in terms of reliability, flexibility, processing overhead, cost, and throughput.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hu, F., Hao, Q., & Bao, K. (2014). A survey on software-defined network and openflow: From concept to implementation. IEEE Communications Surveys & Tutorials, 16(4), 2181–2206.CrossRef Hu, F., Hao, Q., & Bao, K. (2014). A survey on software-defined network and openflow: From concept to implementation. IEEE Communications Surveys & Tutorials, 16(4), 2181–2206.CrossRef
2.
Zurück zum Zitat Nunes, B. A. A., Mendonca, M., Nguyen, X.-N., Obraczka, K., & Turletti, T. (2014). A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Communications Surveys & Tutorials, 16(3), 1617–1634.CrossRef Nunes, B. A. A., Mendonca, M., Nguyen, X.-N., Obraczka, K., & Turletti, T. (2014). A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Communications Surveys & Tutorials, 16(3), 1617–1634.CrossRef
3.
Zurück zum Zitat Smys, S. (2019). DDOS attack detection in telecommunication network using machine learning. Journal of Ubiquitous Computing and Communication Technologies (UCCT), 1(01), 33–44.CrossRef Smys, S. (2019). DDOS attack detection in telecommunication network using machine learning. Journal of Ubiquitous Computing and Communication Technologies (UCCT), 1(01), 33–44.CrossRef
4.
Zurück zum Zitat Van Adrichem, Niels, L.M., Christian D., and Kuipers, F.A. (2018) Opennetmon: Network monitoring in openflow software-defined networks.” In 2014 IEEE Network Operations and Management Symposium (NOMS), pp. 1–8. IEEE. Van Adrichem, Niels, L.M., Christian D., and Kuipers, F.A. (2018) Opennetmon: Network monitoring in openflow software-defined networks.” In 2014 IEEE Network Operations and Management Symposium (NOMS), pp. 1–8. IEEE.
5.
Zurück zum Zitat Kim, H., & Feamster, N. (2013). Improving network management with software defined networking. IEEE Communications Magazine, 51(2), 114–119.CrossRef Kim, H., & Feamster, N. (2013). Improving network management with software defined networking. IEEE Communications Magazine, 51(2), 114–119.CrossRef
6.
Zurück zum Zitat Luo, T., Hwee-Pink, T., & Quek, T. Q. S. (2012). Sensor OpenFlow: Enabling software-defined wireless sensor networks. IEEE Communications Letters, 16(11), 1896–1899.CrossRef Luo, T., Hwee-Pink, T., & Quek, T. Q. S. (2012). Sensor OpenFlow: Enabling software-defined wireless sensor networks. IEEE Communications Letters, 16(11), 1896–1899.CrossRef
7.
Zurück zum Zitat Mugunthan, S. R. (2019). Soft computing based autonomous low rate DDOS attack detection and security for cloud computing. Journal of Soft Computing. Paradig. (JSCP), 1(02), 80–90. Mugunthan, S. R. (2019). Soft computing based autonomous low rate DDOS attack detection and security for cloud computing. Journal of Soft Computing. Paradig. (JSCP), 1(02), 80–90.
8.
Zurück zum Zitat Li, W., Weizhi, M., & Lam, F. K. (2016). A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures. Journal of Network and Computer Applications, 68, 126–139.CrossRef Li, W., Weizhi, M., & Lam, F. K. (2016). A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures. Journal of Network and Computer Applications, 68, 126–139.CrossRef
9.
Zurück zum Zitat Pakzad, F., Marius, P., Wee, L. T., & Jadwiga, I. (2016). Efficient topology discovery in OpenFlow-based software defined networks. Computer Communications, 77, 52–61.CrossRef Pakzad, F., Marius, P., Wee, L. T., & Jadwiga, I. (2016). Efficient topology discovery in OpenFlow-based software defined networks. Computer Communications, 77, 52–61.CrossRef
10.
Zurück zum Zitat Akyildiz, I. F., Ahyoung Lee, P., Wang, M. L., & Chou, W. (2016). Research challenges for traffic engineering in software defined networks. IEEE Network, 30(3), 52–58.CrossRef Akyildiz, I. F., Ahyoung Lee, P., Wang, M. L., & Chou, W. (2016). Research challenges for traffic engineering in software defined networks. IEEE Network, 30(3), 52–58.CrossRef
11.
Zurück zum Zitat Smys, S., Abul, B., & Haoxiang, W. (2020). Hybrid Intrusion Detection System for Internet of Things (IoT). Journal of ISMAC, 2(04), 190–199.CrossRef Smys, S., Abul, B., & Haoxiang, W. (2020). Hybrid Intrusion Detection System for Internet of Things (IoT). Journal of ISMAC, 2(04), 190–199.CrossRef
12.
Zurück zum Zitat Rai, Sandesh, Kalpana Sharma, and Dependra Dhakal. “A Survey on Detection and Mitigation of Distributed Denial-of-Service Attack in Named Data Networking.” In Advances in Communication, Cloud, and Big Data, pp. 163-171. Springer, Singapore, 2019. Rai, Sandesh, Kalpana Sharma, and Dependra Dhakal. “A Survey on Detection and Mitigation of Distributed Denial-of-Service Attack in Named Data Networking.” In Advances in Communication, Cloud, and Big Data, pp. 163-171. Springer, Singapore, 2019.
13.
Zurück zum Zitat Rai, S., and Dependra D. (2018) A survey on detection and mitigation of interest flooding attack in named data networking. In Advanced Computational and Communication Paradigms, pp. 523–531. Springer, Singapore Rai, S., and Dependra D. (2018) A survey on detection and mitigation of interest flooding attack in named data networking. In Advanced Computational and Communication Paradigms, pp. 523–531. Springer, Singapore
14.
Zurück zum Zitat Rao, N. Srihari, Chandra Sekharaiah, K., and Ananda Rao, A., (2019). A survey of distributed denial-of-service (DDoS) defense techniques in ISP domains.” In Innovations in Computer Science and Engineering, pp. 221-230. Springer, Singapore Rao, N. Srihari, Chandra Sekharaiah, K., and Ananda Rao, A., (2019). A survey of distributed denial-of-service (DDoS) defense techniques in ISP domains.” In Innovations in Computer Science and Engineering, pp. 221-230. Springer, Singapore
15.
Zurück zum Zitat Shakya, S. (2020). Process Mining Error Detection for Securing the IoT System. Journal of ISMAC, 2(03), 147–153.CrossRef Shakya, S. (2020). Process Mining Error Detection for Securing the IoT System. Journal of ISMAC, 2(03), 147–153.CrossRef
16.
Zurück zum Zitat Carl, G., Kesidis, G., Brooks, R. R., & Rai, S. (2006). Denial-of-service attack-detection techniques. IEEE Internet Computing, 10(1), 82–89.CrossRef Carl, G., Kesidis, G., Brooks, R. R., & Rai, S. (2006). Denial-of-service attack-detection techniques. IEEE Internet Computing, 10(1), 82–89.CrossRef
17.
Zurück zum Zitat Yan, Q., Richard Y u, F., Qingxiang, G., & Jianqiang, L. (2015). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602–622.CrossRef Yan, Q., Richard Y u, F., Qingxiang, G., & Jianqiang, L. (2015). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602–622.CrossRef
18.
Zurück zum Zitat Ahmed, M., Abdun, N. M., & Jiankun, H. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31.CrossRef Ahmed, M., Abdun, N. M., & Jiankun, H. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31.CrossRef
19.
Zurück zum Zitat Bawany, N. Z., Jawwad, A. S., & Khaled, S. (2017). DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arabian Journal for Science and Engineering, 42(2), 425–441.CrossRef Bawany, N. Z., Jawwad, A. S., & Khaled, S. (2017). DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arabian Journal for Science and Engineering, 42(2), 425–441.CrossRef
20.
Zurück zum Zitat Yan, Q., Wenyao, H., Xupeng, L., Qingxiang, G., & Richard, F. (2018). A multi-level DDoS mitigation framework for the industrial internet of things. IEEE Communications Magazine, 56(2), 30–36.CrossRef Yan, Q., Wenyao, H., Xupeng, L., Qingxiang, G., & Richard, F. (2018). A multi-level DDoS mitigation framework for the industrial internet of things. IEEE Communications Magazine, 56(2), 30–36.CrossRef
21.
Zurück zum Zitat Marinakis, Y., Marinaki, M., & Matsatsinis, N. (2008). A stochastic nature inspired metaheuristic for clustering analysis. International Journal of Business Intelligence and Data Mining, 3(1), 30–44.CrossRef Marinakis, Y., Marinaki, M., & Matsatsinis, N. (2008). A stochastic nature inspired metaheuristic for clustering analysis. International Journal of Business Intelligence and Data Mining, 3(1), 30–44.CrossRef
22.
Zurück zum Zitat Haoxiang, W., & Smys, S. (2020). Secure and Optimized Cloud-Based Cyber-Physical Systems with Memory-Aware Scheduling Scheme. Journal of trends in Computer Science and Smart technology (TCSST), 2(03), 141–147.CrossRef Haoxiang, W., & Smys, S. (2020). Secure and Optimized Cloud-Based Cyber-Physical Systems with Memory-Aware Scheduling Scheme. Journal of trends in Computer Science and Smart technology (TCSST), 2(03), 141–147.CrossRef
23.
Zurück zum Zitat Han, W., & Lei, C. (2012). A survey on policy languages in network and security management. Computer Networks, 56(1), 477–489.CrossRef Han, W., & Lei, C. (2012). A survey on policy languages in network and security management. Computer Networks, 56(1), 477–489.CrossRef
24.
Zurück zum Zitat Krishnaraj, N., & Smys, S. (2019). A multihoming ACO-MDV routing for maximum power efficiency in an IoT environment. Wireless Personal Communications, Springer, 109(1), 243–256.CrossRef Krishnaraj, N., & Smys, S. (2019). A multihoming ACO-MDV routing for maximum power efficiency in an IoT environment. Wireless Personal Communications, Springer, 109(1), 243–256.CrossRef
25.
Zurück zum Zitat Seethalakshmi, V., & Mohan Kumar, G., (2014). Fuzzy analysis and Performance Evaluation of QoS based Routing in MANET”, Journal of Electrical Engineering, 14(3), Article 14.3.3, 1–10. Seethalakshmi, V., & Mohan Kumar, G., (2014). Fuzzy analysis and Performance Evaluation of QoS based Routing in MANET”, Journal of Electrical Engineering, 14(3), Article 14.3.3, 1–10.
26.
Zurück zum Zitat Seethalakshmi, V., & Mohan Kumar, G., (2014). Analysis of QoS based Routing Algorithm in MANET Using Fuzzy logic. In International Journal of Computing and Digital Systems, Scientific Publishing Center, University of Bahrain, Vol. 3, No. 2, pp. 111–122. Seethalakshmi, V., & Mohan Kumar, G., (2014). Analysis of QoS based Routing Algorithm in MANET Using Fuzzy logic. In International Journal of Computing and Digital Systems, Scientific Publishing Center, University of Bahrain, Vol. 3, No. 2, pp. 111–122.
27.
Zurück zum Zitat Ramprakash, P., Sakthivadivel, M., Krishnaraj, N., & Ramprasath, J. (2014). Host-based Intrusion Detection System using Sequence of System Calls. International Journal of Engineering and Management Research, Vandana Publications, 4(2), 241–247. Ramprakash, P., Sakthivadivel, M., Krishnaraj, N., & Ramprasath, J. (2014). Host-based Intrusion Detection System using Sequence of System Calls. International Journal of Engineering and Management Research, Vandana Publications, 4(2), 241–247.
Metadaten
Titel
Improved Network Monitoring Using Software-Defined Networking for DDoS Detection and Mitigation Evaluation
verfasst von
J. Ramprasath
V. Seethalakshmi
Publikationsdatum
01.01.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-08042-2

Weitere Artikel der Ausgabe 3/2021

Wireless Personal Communications 3/2021 Zur Ausgabe

Neuer Inhalt