Early detection and mitigation of TCP SYN flood attacks in SDN using chi-square test

被引:1
|
作者
Shalini, P. V. [1 ,2 ,3 ]
Radha, V. [3 ]
Sanjeevi, Sriram G. [1 ]
机构
[1] Natl Inst Technol Warangal, Hyderabad, India
[2] Inst Dev & Res Banking Technol, Hyderabad, India
[3] Inst Dev & Res Banking Technol, Ctr Cloud Comp, Hyderabad, India
来源
JOURNAL OF SUPERCOMPUTING | 2023年 / 79卷 / 09期
关键词
DDoS; SDN; Chi-square; TCP SYN flood;
D O I
10.1007/s11227-023-05057-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Software Defined Networking (SDN) is a network paradigm with the separation of the control plane from the data plane. Centralized management of the network and dynamic programming ability are the advantages of this separation. However, SDN suffers from security threats like DDoS attacks. In this paper, we propose an early detection and mitigation model to detect the DDoS attacks caused by the TCP SYN flood. This model uses the programming ability of SDN to collect features from net-work traffic at the centralized controller. For that, we implement the proposed model as a module in the POX controller. Our model extracts the header features: MAC addresses and TCP flags to construct the list of number of half-open connections per each host in the network within a given time period. The extended chi-square goodness of fit test serves as a basis for the detection method in our model. We calculate the x(2) value for the list of half-open connections and from this p_value is derived. When p_value drops below the threshold value, the attack is detected. We also mitigate the attack by blocking the attack traffic from the attackers' within the network using source MAC addresses. The experiments results show that the model is successful in TCP SYN flood detection and mitigation at the source end, i.e. attack-originating network. We compare our model with existing literature and show improvement over attack detection and discuss the advantages of the proposed model over the existing schemes in the literature.
引用
收藏
页码:10353 / 10385
页数:33
相关论文
共 50 条
  • [31] DDoS Attacks Detection and Mitigation in SDN using Machine Learning
    Rahman, Obaid
    Quraishi, Mohammad Ali Gauhar
    Lung, Chung-Horng
    2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, : 184 - 189
  • [32] ESTIMATING UPPER AND LOWER BOUNDARIES OF BETA DISTRIBUTION USING A CHI-SQUARE TEST
    KNOX, LJ
    WHITWELL, JC
    MUTZ, MJ
    TEXTILE RESEARCH JOURNAL, 1972, 42 (11) : 688 - &
  • [33] Chi-square test under indeterminacy: an application using pulse count data
    Aslam, Muhammad
    BMC MEDICAL RESEARCH METHODOLOGY, 2021, 21 (01)
  • [34] Evaluating mobile phone handoff behavior using chi-square statistical test
    Rajput, Saeed A.
    Pandya, A. S.
    Saxena, S.
    Ostroff, Steve
    PROCEEDINGS IEEE SOUTHEASTCON 2008, VOLS 1 AND 2, 2008, : 372 - +
  • [35] Aspect-Based Sentiment Words and Their Polarities Using Chi-Square Test
    Bhagat, Pradnya
    Korkankar, Pratik D.
    Pawar, Jyoti D.
    COMPUTACION Y SISTEMAS, 2023, 27 (02): : 389 - 399
  • [36] Chi-square test under indeterminacy: an application using pulse count data
    Muhammad Aslam
    BMC Medical Research Methodology, 21
  • [37] Application of hybrid chi-square test method in fault detection of integrated navigation system
    Zhang, Hua-Qiang
    Li, Dong-Xing
    Zhang, Guo-Qiang
    Zhongguo Guanxing Jishu Xuebao/Journal of Chinese Inertial Technology, 2016, 24 (05): : 696 - 700
  • [38] SDN-Based Intrusion Detection System for Early Detection and Mitigation of DDoS Attacks
    Manso, Pedro
    Moura, Jose
    Serrao, Carlos
    INFORMATION, 2019, 10 (03)
  • [39] Lumen Coronary Artery Border Detection Using Texture and Chi-square Classification
    Sofian, Hannah
    Muhammad, Suraya
    Ming, Joel Than Chia
    Noor, Norliza Mohd
    2015 INTERNATIONAL CONFERENCE ON IMAGE AND VISION COMPUTING NEW ZEALAND (IVCNZ), 2015,
  • [40] Anomaly Detection in Medical WSNs Using Enclosing Ellipse and Chi-square Distance
    Salem, Osman
    Liu, Yaning
    Mehaoua, Ahmed
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 3658 - 3663