DISSERTATION

Mitigation techniques against distributed denial of service attacks on software defined networks

Abstract

With the rise of devices integrated with computer networks, coined as the Internet-of-Things (IoT), it was only a matter of time before cyber criminals found new ways to cripple critical communication-based infrastructures. A common type of attack that has been around for years, adopting itself for vast variances, is the infamous denial-of-service (DoS) attack. These attacks strategically halt network services by injecting heavy traffic, directly stalling the availability of a system for legitimate users. This can cause companies to lose millions of dollars in revenue and even open the system up to new vulnerabilities. Due to the criticality of a rapid and effective upgrade to security, many companies and engineers have designed systems to detect and/or mitigate possible incoming attacks. The introduction of virtualized and programmable networks, named software defined networks (SDNs), advances modern communication applications with performance flexibility while enhancing security-based controls. Many solutions focused on keeping track of the potential damage caused by each individual IP (packet filtering approaches). As cyber criminals evolved, they looked to become sneakier and harder to detect. Expanding upon the attack format of DoS attacks, the distributed denial-of-service (DDoS) attack emerged. This format utilized a coordinated army of interconnected devices to disguise the attack as random/normal traffic. This work investigates mitigation techniques against DDoS attacks on SDNs. An SDN is setup with Mininet, a Linux-based network emulator, to create a virtual internet testbed for experiments. An arms race iterates on the SDN testbed between offense launching botnet DDoS attacks with progressive sophistications, and defense deploying SDN controls with emerging technologies from other faucets of cyber engineering. The investigation focuses on the transmission control protocol’s synchronize flood attack that exploits vulnerabilities in the three-way TCP handshake protocol to lock up a host from serving new users. The defensive strategy starts with a common packet filtering-based design from the literature to mitigate attacks. Utilizing machine learning and smart algorithms, SDNs actively monitors all possible traffic as a collective dataset to detect DDoS attacks in real time. A constant upgrade to stronger defenses is necessary, as cyber/network security is an ongoing front where attackers always have the element of surprise. The defense further invests on entropy methods to improve early detection of DDoS attacks within the testbed environment. Entropy allows SDNs to learn the expected normal traffic patterns for a network as a whole using real time mathematical calculations, so that the SDN controllers can sense the distributed attack vectors building up before they overwhelm the network. The work reveals the vulnerabilities of SDNs to stealthy DDoS attacks and demonstrates the effectiveness of deploying entropy in SDN controllers for detection and mitigation purposes. Future work includes provisions to use these entropy detection methods as part of a larger system to redirect traffic and protect networks dynamically in real time.

Keywords:
Denial-of-service attack Computer security Computer science Denial Software Service (business) Distributed computing Computer network Operating system Business Psychology The Internet

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Software-Defined Networks and 5G
Physical Sciences →  Computer Science →  Computer Networks and Communications
Information and Cyber Security
Physical Sciences →  Computer Science →  Information Systems

Related Documents

BOOK-CHAPTER

Cog-SDN: Mitigation Mechanism for Distributed Denial of Service Attacks in Software Defined Networks

P. Mohana PriyaK. R. Manjula

Communications in computer and information science Year: 2019 Pages: 202-215
JOURNAL ARTICLE

Preventing Distributed Denial of Service Attacks in Software Defined Mesh Networks

Santosh ManiManisha J. Nene

Journal:   2021 International Conference on Intelligent Technologies (CONIT) Year: 2021 Pages: 1-7
JOURNAL ARTICLE

Distributed Denial of Service (DDoS) Attacks in Software-defined Networks (SDN)

Jasmeen Kaur ChahalPuninder KaurAvinash Sharma

Journal:   2021 5th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT) Year: 2021 Pages: 291-295
© 2026 ScienceGate Book Chapters — All rights reserved.