Early detection and mitigation of TCP SYN flood attacks in SDN using chi-square test

被引:1
|
作者
Shalini, P. V. [1 ,2 ,3 ]
Radha, V. [3 ]
Sanjeevi, Sriram G. [1 ]
机构
[1] Natl Inst Technol Warangal, Hyderabad, India
[2] Inst Dev & Res Banking Technol, Hyderabad, India
[3] Inst Dev & Res Banking Technol, Ctr Cloud Comp, Hyderabad, India
来源
JOURNAL OF SUPERCOMPUTING | 2023年 / 79卷 / 09期
关键词
DDoS; SDN; Chi-square; TCP SYN flood;
D O I
10.1007/s11227-023-05057-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Software Defined Networking (SDN) is a network paradigm with the separation of the control plane from the data plane. Centralized management of the network and dynamic programming ability are the advantages of this separation. However, SDN suffers from security threats like DDoS attacks. In this paper, we propose an early detection and mitigation model to detect the DDoS attacks caused by the TCP SYN flood. This model uses the programming ability of SDN to collect features from net-work traffic at the centralized controller. For that, we implement the proposed model as a module in the POX controller. Our model extracts the header features: MAC addresses and TCP flags to construct the list of number of half-open connections per each host in the network within a given time period. The extended chi-square goodness of fit test serves as a basis for the detection method in our model. We calculate the x(2) value for the list of half-open connections and from this p_value is derived. When p_value drops below the threshold value, the attack is detected. We also mitigate the attack by blocking the attack traffic from the attackers' within the network using source MAC addresses. The experiments results show that the model is successful in TCP SYN flood detection and mitigation at the source end, i.e. attack-originating network. We compare our model with existing literature and show improvement over attack detection and discuss the advantages of the proposed model over the existing schemes in the literature.
引用
收藏
页码:10353 / 10385
页数:33
相关论文
共 50 条
  • [21] Evaluating rank histograms using decompositions of the chi-square test statistic
    Jolliffe, Ian T.
    Primo, Cristina
    MONTHLY WEATHER REVIEW, 2008, 136 (06) : 2133 - 2139
  • [22] Predicting mortality amongst Jordanian men with heart attacks using the chi-square automatic interaction detection model
    Bani Hani, Salam
    Ahmad, Muayyad
    HEALTH INFORMATICS JOURNAL, 2024, 30 (03)
  • [23] Using Chi-Square Test and Heuristic Search for Detecting Metamorphic Malware
    Belaoued, Mohamed
    Mazouzi, Smaine
    Noureddine, Seddari
    Salah, Bougueroua
    2015 FIRST INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES OF INFORMATION AND COMMUNICATION (NTIC), 2015,
  • [24] CHI-SQUARE TEST FOR LAPLACE DISTRIBUTION USING EXTREME AND MEDIAN RSS
    Al-Subh, Sameer Ahmad Hasan
    ADVANCES AND APPLICATIONS IN STATISTICS, 2018, 53 (05) : 611 - 623
  • [25] Reducing the Computation Time in the State Chi-Square Test for IMU Fault Detection
    Yun, Se Hyun
    Kang, Chul Woo
    Park, Chan Gook
    2014 14TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2014), 2014, : 879 - 883
  • [26] FAILURE-DETECTION OF DYNAMICAL-SYSTEMS WITH THE STATE CHI-SQUARE TEST
    DA, R
    JOURNAL OF GUIDANCE CONTROL AND DYNAMICS, 1994, 17 (02) : 271 - 277
  • [27] A Flow based Anomaly Detection System using Chi-square Technique
    Muraleedharan, N.
    Parmar, Arun
    Kumar, Manish
    2010 IEEE 2ND INTERNATIONAL ADVANCE COMPUTING CONFERENCE, 2010, : 285 - 289
  • [28] An Sql Injection Detection Model Using Chi-Square with Classification Techniques
    Adebiyi, Marion Olubunmi
    Arowolo, Micheal Olaolu
    Archibong, Goodnews Ime
    Mshelia, Moses Damilola
    Adebiyi, Ayodele Ariyo
    INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ENERGY TECHNOLOGIES (ICECET 2021), 2021, : 289 - 296
  • [29] Failure detection method using Fuzzy ART neural network based on State Chi-square Test
    Jiang, Chunhong
    Chen, Zhe
    Moshi Shibie yu Rengong Zhineng/Pattern Recognition and Artificial Intelligence, 2002, 15 (01):
  • [30] Crypto-Ransomware Detection: A Honey-File Based Approach Using Chi-Square Test
    Arakkal, Ajith
    Sharafudheen, Shehzad Pazheri
    Vasudevan, A. R.
    INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 449 - 458