HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN

被引:0
|
作者
Reza Mohammadi
Chhagan Lal
Mauro Conti
机构
[1] Bu-Ali Sina University,
[2] TU Delft,undefined
[3] University of Padua,undefined
[4] Italy/TU Delft,undefined
来源
International Journal of Information Security | 2023年 / 22卷
关键词
SDN; DDoS; Flooding attack; Machine learning;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, the number of Distributed Denial of Service (DDoS) attacks is growing rapidly. The aim of these type of attacks is to make the prominent and critical services unavailable for legitimate users. HTTP flooding is one of the most common DDoS attacks and because of its implementation in application layer, it is difficult to detect and prevent by the current defense mechanisms. This attack not only makes the web servers unavailable, but consumes the computational resources of the network equipment and congests communication links. Recently, the advent of Software Defined Networking (SDN) paradigm has enabled the network providers to detect and mitigate application layer DDoS attacks such as HTTP flooding. In this paper, we propose a defense mechanism named HTTPScout which leverages the benefits of SDN together with Machine Learning (ML) techniques to detect and mitigate HTTP flooding attack. HTTPScout is implemented as a security module in RYU controller and monitors the behavior of HTTP traffic flows. Upon detecting a malicious flow, it blocks the source of the attack at the edge switch and preserves the network resources from the adversarial effects of the attack. Simulation results confirm that HTTPScout brings a significant improvement of 64% in bandwidth consumption and 80% in the number of forwarding rules compared to normal SDN.
引用
收藏
页码:367 / 379
页数:12
相关论文
共 50 条
  • [1] HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN
    Mohammadi, Reza
    Lal, Chhagan
    Conti, Mauro
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (02) : 367 - 379
  • [2] Credibility-Based Countermeasure Against Slow HTTP DoS Attacks by Using SDN
    Wang, You-Chiun
    Ye, Ren-Xuan
    2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 890 - 895
  • [3] Mitigating Evasion Attacks on Machine Learning based NIDS Systems in SDN
    Ganesan, Aparna
    Sarac, Kamil
    PROCEEDINGS OF THE 2021 IEEE 7TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2021): ACCELERATING NETWORK SOFTWARIZATION IN THE COGNITIVE AGE, 2021, : 268 - 272
  • [4] Machine-Learning Techniques for Detecting Attacks in SDN
    Elsayed, Mahmoud Said
    Nhien-An Le-Khac
    Dev, Soumyabrata
    Jurcut, Anca Delia
    PROCEEDINGS OF 2019 IEEE 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2019), 2019, : 277 - 281
  • [5] Machine learning algorithms to detect DDoS attacks in SDN
    Santos, Reneilson
    Souza, Danilo
    Santo, Walter
    Ribeiro, Admilson
    Moreno, Edward
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (16):
  • [6] Detecting Saturation Attacks in SDN via Machine Learning
    Khamaiseh, Sarver
    Serra, Edoardo
    Li, Zhiyuan
    Xu, Dianxiang
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND SECURITY (ICCCS), 2019,
  • [7] SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks
    Mohammadi, Reza
    Javidan, Reza
    Conti, Mauro
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2017, 14 (02): : 487 - 497
  • [8] DDoS Attacks Detection and Mitigation in SDN using Machine Learning
    Rahman, Obaid
    Quraishi, Mohammad Ali Gauhar
    Lung, Chung-Horng
    2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, : 184 - 189
  • [9] A Machine Learning Approach for Detecting DoS Attacks in SDN Switches
    Abhiroop, T.
    Babu, Sarath
    Manoj, B. S.
    2018 TWENTY FOURTH NATIONAL CONFERENCE ON COMMUNICATIONS (NCC), 2018,
  • [10] Improved SDN Responsiveness to UDP Flood Attacks
    Mutu, Laura
    Saleh, Rania
    Matrawy, Ashraf
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 715 - 716