Skip to main content
Log in

Impact of DoS Attack in Software Defined Network for Virtual Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A virtual network is a computer network which does not contain any physical link between two computational nodes instead they connect through the virtual links. In recent years the virtual network is managed by Software Defined Network (SDN). SDN is one of the most emerging network technologies in the current trends. Most of the companies configure their networks in SDN. It has been found important to understand the security issues that are being raised in any large scale developments from any new technologies that have been raised in recent years. Though the system acquires lot of benefits from SDN the system have to do some little work in security phase. This work confers four kinds of Denial-of-Service (DoS) attacks that are specific to networks in the OpenFlow SDN in different layers. Those attacks are Ping of Death, HTTP Unbearable Load King, SYN flood and Smurf attack. We introduced these attacks in SDN. These have been emulated on Mininet and an analysis is provided that was obtained on the consequence of these attacks. The DoS attack that is more severe than others has been found out and a suitable prevention techniques for that DoS attack is suggested.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Chin, T., Mountrouidou, X., Li, X., & Xiong, K. (2015). Selective packet inspection to detect DoS flooding using software defined networking (SDN). In IEEE 35th international conference on distributed computing systems workshops (ICDCSW) (pp. 95–99).

  2. Ding, A. Y., Crowcroft, J., Tarkoma, S., & Flinck, H. (2014). Software defined networking for security enhancement in wireless mobile networks. Computer Networks (COMNET), 66, 94–101.

    Article  Google Scholar 

  3. Feghali, A., Kilany, R., & Chamoun, M. (2015). SDN security problems and solutions analysis. In International conference on protocol engineering (ICPE) and international conference on new technologies of distributed systems (NTDS) (pp. 1–5).

  4. Ali, S. T., Sivaraman, V., Radford, V., & Jha, S. (2015). A survey of securing networks using software defined networking. In IEEE transactions on reliability (Vol. 64, No. 3, pp. 1086–1097). doi:10.1109/TR.2015.2421391.

  5. Kandoi, R., & Antikainen, M. (2015). Denial-of-service attacks in OpenFlow SDN networks. In IFIP/IEEE international symposium on integrated network management (IM) (pp. 1322–1326).

  6. Dhawan, M., Poddar, R., Mahajan, K., & Mann, V. (2012). SPHINX: Detecting security attacks in software-defined networks. In IEEE conference publication of network application protocols and services (NETAPPS) (Vol. 3, No. 9, pp. 47–52).

  7. Liyanage, M., Ahmed, I., Ylianttila, M., Santos, J. L., Kantola, R., Perez, O. L. (2015). Security for future software defined mobile networks. In 9th international conference on next generation mobile applications, services and technologies (pp. 256–264).

  8. Lo, C. C., Wu, P. Y., & Kuo, Y. H. (2015). Flow entry conflict detection scheme for software-defined network. In International telecommunication networks and applications conference (ITNAC) (pp. 220–225).

  9. Shyamala, R., & Valli, S. (2009). Secure route discovery in MAODV for wireless sensor networks. UbiCC Journal, 4, 775–783.

    Google Scholar 

  10. Shyamala, R., & Valli, S. (2011). Impact of sybil and wormhole attacks in location based geographic multicast routing protocol for wireless sensor networks. Journal of Computer Science, 7, 973–979.

    Article  Google Scholar 

  11. Shyamala, R., & Valli, S. (2012). Performance comparison of routing attacks in MANET and WSN. International Journal of Ad hoc, Sensor and Ubiquitous Computing (IJASUC), 3, 41–52.

    Article  Google Scholar 

  12. Shyamala, R., & Valli, S. (2012). Impact of blackhole and rushing attack on the location-based routing protocol for wireless sensor networks. Proceedings of Advances in Intelligent System and Computing, 176, 349–359.

    Article  Google Scholar 

  13. Shyamala, R., & Valli, S. (2013). An approach to secure leach using tesla based certificate. Life Science Journal, 10(2), 1018–1027.

    Google Scholar 

  14. Shyamala, R., & Valli, S. (2013). Securing GMR protocol using TESLA based certificate for WSN. European Journal of Scientific and Research, 94(2), 186–196.

    Google Scholar 

  15. Singh, S., Khan, R. A., & Agrawal, A. (2015). Prevention mechanism for infrastructure based Denial-of-Service attack over software Defined Network. In International conference on computing, communication and automation (ICCCA) (pp. 348–353).

  16. Nishtha, P., & Sood, M. (2014) Software defined network—Architectures. In International conference on parallel, distributed and grid computing (PDGC) (pp. 451–456). doi:10.1109/PDGC.2014.7030788.

  17. Tri, N., Hiep, T., & Kim, K. (2015). Assessing the impact of resource attack in Software Defined Network. In International conference on information networking (ICOIN) (pp. 420–425).

  18. Wang, H., Xu, L., & Gu, G. (2015). FloodGuard: a dos attack prevention extension in software-defined networks. In 45th Annual IEEE/IFIP international conference on dependable systems and networks (DSN) (pp. 239–250).

  19. Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602–622.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shyamala Ramachandran.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ramachandran, S., Shanmugam, V. Impact of DoS Attack in Software Defined Network for Virtual Network. Wireless Pers Commun 94, 2189–2202 (2017). https://doi.org/10.1007/s11277-016-3370-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3370-1

Keywords

Navigation