SECO: SDN sEcure COntroller Algorithm for Detecting and Defending Denial of Service Attacks

被引:0
|
作者
Wang, Song [1 ]
Chavez, Karina Gomez [1 ]
Kandeepan, Sithamparanathan [1 ]
机构
[1] RMIT Univ, Sch Engn, Melbourne, Vic 3000, Australia
关键词
Software Defined Network; Denial of Service; OpenFlow; Security; Mininet;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Software Defined Network (SDN) brings additional flexibility to the traditional network allowing the implementation of intelligent information processing. SDN introduces a new architecture, where the controller acts as the brain of the network controlling several tasks such as routing, load balancing and providing the required quality of service (QoS). However, having a centralized controller makes the network vulnerable in terms of security. This paper introduces SDN sEcure COntroller (SECO) a novel and simple detect and defense algorithm, running in the controller, for improving SDN security features under Denial of Service (DoS) attacks. The network performance during attack is tested with and without the SECO algorithm. In this paper we show by means of simulations that the DoS attacks can degrade the controller's performance and the proposed algorithm could significantly reduce the impact of such DoS attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Defending against distributed denial of service attacks with bating puzzle auction
    Kim, S
    Wee, K
    Hong, M
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 361 - 366
  • [22] Analysis of Link Discovery Service Attacks in SDN Controller
    Nguyen, Tri-Hai
    Yoo, Myungsik
    2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2017, : 259 - 261
  • [23] FloodShield: Securing the SDN Infrastructure Against Denial-of-Service Attacks
    Zhang, Menghao
    Bi, Jun
    Bai, Jiasong
    Li, Guanyu
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 681 - 692
  • [24] Defending against denial of service attacks using a modified priority queue: Bouncer
    Safko, Gregory
    Proceedings of the IEEE SoutheastCon 2006, 2006, : 114 - 119
  • [25] Defending against denial of service attacks using a modified priority queue: Bouncer
    Safko, Gregory
    Conf Proc IEEE SOUTHEASTCON, (114-119):
  • [26] Detecting distributed denial of service attacks by sharing distributed beliefs
    Peng, T
    Leckie, C
    Ramamohanarao, K
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 214 - 225
  • [27] Detecting denial-of-service attacks with incomplete audit data
    Patcha, A
    Park, JM
    ICCCN 2005: 14th International Conference on Computer Communications and Networks, Proceedings, 2005, : 263 - 268
  • [28] Detecting dsitributed denial of service attacks with discrete wavelet transform
    Ren, JA
    Li, JP
    Chen, F
    Wavelet Analysis and Active Media Technology Vols 1-3, 2005, : 1412 - 1418
  • [29] Detecting Denial of Service attacks using machine learning algorithms
    Kumari, Kimmi
    Mrunalini, M.
    JOURNAL OF BIG DATA, 2022, 9 (01)
  • [30] Detecting Denial-of-Service attacks using the wavelet transform
    Hamdi, Mohamed
    Boudriga, Noureddine
    COMPUTER COMMUNICATIONS, 2007, 30 (16) : 3203 - 3213