Username   Password       Forgot your password?  Forgot your username? 


Generating Extension Strategy for Mitigation of DoS Attacks Against SDN Controllers

Volume 14, Number 8, August 2018, pp. 1754-1764
DOI: 10.23940/ijpe.18.08.p12.17541764

Hui Xu, Xiang Liu, Juan Yang, and Zhiwei Ye

School of Computer Science, Hubei University of Technology, Wuhan, 430068, China

(Submitted on May 16, 2018; Revised on June 29, 2018; Accepted on July 20, 2018)


With the development and popularization of Software-Defined Networking (SDN), security threats on SDN are on the rise. As one of the most common attacks on the Internet, Denial of Service (DoS) may possibly prevent SDN controllers from offering services through the consumption of network or system resources. This paper introduces Extenics into the research on strategy generation for the mitigation of DoS attacks against SDN controllers from the formal point of view. Considering the problem of generating the extension strategy for mitigation of DoS attacks against SDN controllers for SDN controllers, the extension strategy generation method based on Extenics is utilized. According to the performance indicators of SDN controllers, the generated mitigation strategy focuses on the dynamic adjustment of computing resources in order to reduce the negative effects of DoS attacks. The experimental analysis validates that the application of the extension strategy generation method is feasible and promotes the formalization to generate the strategy for mitigation of DoS attacks against SDN controllers.


References: 13

              1. A. Tootoonchian, S. Gorbunov, Y. Ganjali, M. Casado, and R. Sherwood, “On Controller Performance in Software-defined Networks,” in Proceedings of 2nd USENIX Workshop on Hot Topics in Management of Internet Cloud and Enterprise Networks and Services, pp. 10, 2012
              2. H. Y. Lou and J. Dou, “Research on DoS Attacks Against Control Level in OpenFlow-based SDN,” Computer Science, No. S2, pp. 341-344, 2015
              3. M. M. Wang, J. W. Liu, J. Chen, J. Mao, and K. F. Mao, “Software Defined Networking: Security Model, Threats and Mechanism,” Journal of Software, Vol. 27, No. 4, pp. 969-992, 2016
              4. F. Xiao, J. Q. Ma, X. S. Huang, and R. C. Wang, “DDoS Attack Detection based on KNN in Software Defined Networks,” Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), No. 1, pp. 84-88, 2015
              5. R. Braga, E. Mota, and A. Passito, “Lightweight DDoS Flooding Attack Detection using NOX/OpenFlow,” in Proceedings of IEEE 35th Conference on Local Computer Networks, pp. 408-415, Denver, USA, October 2010
              6. H. F. Li, “Research on DDoS Detection and Mitigation based on Software,” Thesis, East China Normal University, 2015
              7. Q. Y. Zuo, M. Chen, X. L. Wang, and B. Liu, “Online Traffic Anomaly Detection Method for SDN,” Journal of Xidian University, No. 1, pp. 155-160, 2015
              8. S. X. Zhang, J. Liu, Y. X. Lai, Y. He, and P. Yang, “DoS/DDoS Attack Detection and Defense System based on SDN Architectures,” Application of Electronic Technique, No. 12, pp. 113-115, 119, 2015
              9. Y. E. Oktian, S. Lee, and H. Lee, “Mitigating Denial of Service (DoS) Attacks in OpenFlow Networks,” in Proceedings of 2014 International Conference on Information and Communication Technology Convergence, pp. 325-330, 2014
              10. N. I. G. Dharma, M. F. Muthohar, J. D. A. Prayuda, K. Priagung, and D. Choi, “Time-based DDoS Detection and Mitigation for SDN Controller,” in Proceedings of 17th Asia-Pacific Network Operations and Management Symposium, pp. 550-553, 2015
              11. M. Kuerban, Y. Tian, Q. Yang, Y. Jia, B. Huebert, and D. Poss, “FlowSec: DoS Attack Mitigation Strategy on SDN Controller,” in Proceedings of 2016 IEEE International Conference on Networking, Architecture and Storage, pp. 1-2, 2016
              12. C. Y. Yang and W. Cai, “Extenics,” Science Press, Beijing, Simplified Chinese version, 2014
              13. L. X. Li, C. Y. Yang, and H. W. Li, “Extension Strategy Generation System,” Science Press, Beijing, Simplified Chinese version, 2006


                          Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

                          This site uses encryption for transmitting your passwords.