Skip to main content
Erschienen in: Wireless Personal Communications 4/2017

02.06.2016

Impact of DoS Attack in Software Defined Network for Virtual Network

verfasst von: Shyamala Ramachandran, Valli Shanmugam

Erschienen in: Wireless Personal Communications | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A virtual network is a computer network which does not contain any physical link between two computational nodes instead they connect through the virtual links. In recent years the virtual network is managed by Software Defined Network (SDN). SDN is one of the most emerging network technologies in the current trends. Most of the companies configure their networks in SDN. It has been found important to understand the security issues that are being raised in any large scale developments from any new technologies that have been raised in recent years. Though the system acquires lot of benefits from SDN the system have to do some little work in security phase. This work confers four kinds of Denial-of-Service (DoS) attacks that are specific to networks in the OpenFlow SDN in different layers. Those attacks are Ping of Death, HTTP Unbearable Load King, SYN flood and Smurf attack. We introduced these attacks in SDN. These have been emulated on Mininet and an analysis is provided that was obtained on the consequence of these attacks. The DoS attack that is more severe than others has been found out and a suitable prevention techniques for that DoS attack is suggested.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chin, T., Mountrouidou, X., Li, X., & Xiong, K. (2015). Selective packet inspection to detect DoS flooding using software defined networking (SDN). In IEEE 35th international conference on distributed computing systems workshops (ICDCSW) (pp. 95–99). Chin, T., Mountrouidou, X., Li, X., & Xiong, K. (2015). Selective packet inspection to detect DoS flooding using software defined networking (SDN). In IEEE 35th international conference on distributed computing systems workshops (ICDCSW) (pp. 95–99).
2.
Zurück zum Zitat Ding, A. Y., Crowcroft, J., Tarkoma, S., & Flinck, H. (2014). Software defined networking for security enhancement in wireless mobile networks. Computer Networks (COMNET), 66, 94–101.CrossRef Ding, A. Y., Crowcroft, J., Tarkoma, S., & Flinck, H. (2014). Software defined networking for security enhancement in wireless mobile networks. Computer Networks (COMNET), 66, 94–101.CrossRef
3.
Zurück zum Zitat Feghali, A., Kilany, R., & Chamoun, M. (2015). SDN security problems and solutions analysis. In International conference on protocol engineering (ICPE) and international conference on new technologies of distributed systems (NTDS) (pp. 1–5). Feghali, A., Kilany, R., & Chamoun, M. (2015). SDN security problems and solutions analysis. In International conference on protocol engineering (ICPE) and international conference on new technologies of distributed systems (NTDS) (pp. 1–5).
4.
Zurück zum Zitat Ali, S. T., Sivaraman, V., Radford, V., & Jha, S. (2015). A survey of securing networks using software defined networking. In IEEE transactions on reliability (Vol. 64, No. 3, pp. 1086–1097). doi:10.1109/TR.2015.2421391. Ali, S. T., Sivaraman, V., Radford, V., & Jha, S. (2015). A survey of securing networks using software defined networking. In IEEE transactions on reliability (Vol. 64, No. 3, pp. 1086–1097). doi:10.​1109/​TR.​2015.​2421391.
5.
Zurück zum Zitat Kandoi, R., & Antikainen, M. (2015). Denial-of-service attacks in OpenFlow SDN networks. In IFIP/IEEE international symposium on integrated network management (IM) (pp. 1322–1326). Kandoi, R., & Antikainen, M. (2015). Denial-of-service attacks in OpenFlow SDN networks. In IFIP/IEEE international symposium on integrated network management (IM) (pp. 1322–1326).
6.
Zurück zum Zitat Dhawan, M., Poddar, R., Mahajan, K., & Mann, V. (2012). SPHINX: Detecting security attacks in software-defined networks. In IEEE conference publication of network application protocols and services (NETAPPS) (Vol. 3, No. 9, pp. 47–52). Dhawan, M., Poddar, R., Mahajan, K., & Mann, V. (2012). SPHINX: Detecting security attacks in software-defined networks. In IEEE conference publication of network application protocols and services (NETAPPS) (Vol. 3, No. 9, pp. 47–52).
7.
Zurück zum Zitat Liyanage, M., Ahmed, I., Ylianttila, M., Santos, J. L., Kantola, R., Perez, O. L. (2015). Security for future software defined mobile networks. In 9th international conference on next generation mobile applications, services and technologies (pp. 256–264). Liyanage, M., Ahmed, I., Ylianttila, M., Santos, J. L., Kantola, R., Perez, O. L. (2015). Security for future software defined mobile networks. In 9th international conference on next generation mobile applications, services and technologies (pp. 256–264).
8.
Zurück zum Zitat Lo, C. C., Wu, P. Y., & Kuo, Y. H. (2015). Flow entry conflict detection scheme for software-defined network. In International telecommunication networks and applications conference (ITNAC) (pp. 220–225). Lo, C. C., Wu, P. Y., & Kuo, Y. H. (2015). Flow entry conflict detection scheme for software-defined network. In International telecommunication networks and applications conference (ITNAC) (pp. 220–225).
9.
Zurück zum Zitat Shyamala, R., & Valli, S. (2009). Secure route discovery in MAODV for wireless sensor networks. UbiCC Journal, 4, 775–783. Shyamala, R., & Valli, S. (2009). Secure route discovery in MAODV for wireless sensor networks. UbiCC Journal, 4, 775–783.
10.
Zurück zum Zitat Shyamala, R., & Valli, S. (2011). Impact of sybil and wormhole attacks in location based geographic multicast routing protocol for wireless sensor networks. Journal of Computer Science, 7, 973–979.CrossRef Shyamala, R., & Valli, S. (2011). Impact of sybil and wormhole attacks in location based geographic multicast routing protocol for wireless sensor networks. Journal of Computer Science, 7, 973–979.CrossRef
11.
Zurück zum Zitat Shyamala, R., & Valli, S. (2012). Performance comparison of routing attacks in MANET and WSN. International Journal of Ad hoc, Sensor and Ubiquitous Computing (IJASUC), 3, 41–52.CrossRef Shyamala, R., & Valli, S. (2012). Performance comparison of routing attacks in MANET and WSN. International Journal of Ad hoc, Sensor and Ubiquitous Computing (IJASUC), 3, 41–52.CrossRef
12.
Zurück zum Zitat Shyamala, R., & Valli, S. (2012). Impact of blackhole and rushing attack on the location-based routing protocol for wireless sensor networks. Proceedings of Advances in Intelligent System and Computing, 176, 349–359.CrossRef Shyamala, R., & Valli, S. (2012). Impact of blackhole and rushing attack on the location-based routing protocol for wireless sensor networks. Proceedings of Advances in Intelligent System and Computing, 176, 349–359.CrossRef
13.
Zurück zum Zitat Shyamala, R., & Valli, S. (2013). An approach to secure leach using tesla based certificate. Life Science Journal, 10(2), 1018–1027. Shyamala, R., & Valli, S. (2013). An approach to secure leach using tesla based certificate. Life Science Journal, 10(2), 1018–1027.
14.
Zurück zum Zitat Shyamala, R., & Valli, S. (2013). Securing GMR protocol using TESLA based certificate for WSN. European Journal of Scientific and Research, 94(2), 186–196. Shyamala, R., & Valli, S. (2013). Securing GMR protocol using TESLA based certificate for WSN. European Journal of Scientific and Research, 94(2), 186–196.
15.
Zurück zum Zitat Singh, S., Khan, R. A., & Agrawal, A. (2015). Prevention mechanism for infrastructure based Denial-of-Service attack over software Defined Network. In International conference on computing, communication and automation (ICCCA) (pp. 348–353). Singh, S., Khan, R. A., & Agrawal, A. (2015). Prevention mechanism for infrastructure based Denial-of-Service attack over software Defined Network. In International conference on computing, communication and automation (ICCCA) (pp. 348–353).
16.
Zurück zum Zitat Nishtha, P., & Sood, M. (2014) Software defined network—Architectures. In International conference on parallel, distributed and grid computing (PDGC) (pp. 451–456). doi:10.1109/PDGC.2014.7030788. Nishtha, P., & Sood, M. (2014) Software defined network—Architectures. In International conference on parallel, distributed and grid computing (PDGC) (pp. 451–456). doi:10.​1109/​PDGC.​2014.​7030788.
17.
Zurück zum Zitat Tri, N., Hiep, T., & Kim, K. (2015). Assessing the impact of resource attack in Software Defined Network. In International conference on information networking (ICOIN) (pp. 420–425). Tri, N., Hiep, T., & Kim, K. (2015). Assessing the impact of resource attack in Software Defined Network. In International conference on information networking (ICOIN) (pp. 420–425).
18.
Zurück zum Zitat Wang, H., Xu, L., & Gu, G. (2015). FloodGuard: a dos attack prevention extension in software-defined networks. In 45th Annual IEEE/IFIP international conference on dependable systems and networks (DSN) (pp. 239–250). Wang, H., Xu, L., & Gu, G. (2015). FloodGuard: a dos attack prevention extension in software-defined networks. In 45th Annual IEEE/IFIP international conference on dependable systems and networks (DSN) (pp. 239–250).
19.
Zurück zum Zitat Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602–622.CrossRef Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602–622.CrossRef
Metadaten
Titel
Impact of DoS Attack in Software Defined Network for Virtual Network
verfasst von
Shyamala Ramachandran
Valli Shanmugam
Publikationsdatum
02.06.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3370-1

Weitere Artikel der Ausgabe 4/2017

Wireless Personal Communications 4/2017 Zur Ausgabe

Neuer Inhalt