Abstract
A virtual network is a computer network which does not contain any physical link between two computational nodes instead they connect through the virtual links. In recent years the virtual network is managed by Software Defined Network (SDN). SDN is one of the most emerging network technologies in the current trends. Most of the companies configure their networks in SDN. It has been found important to understand the security issues that are being raised in any large scale developments from any new technologies that have been raised in recent years. Though the system acquires lot of benefits from SDN the system have to do some little work in security phase. This work confers four kinds of Denial-of-Service (DoS) attacks that are specific to networks in the OpenFlow SDN in different layers. Those attacks are Ping of Death, HTTP Unbearable Load King, SYN flood and Smurf attack. We introduced these attacks in SDN. These have been emulated on Mininet and an analysis is provided that was obtained on the consequence of these attacks. The DoS attack that is more severe than others has been found out and a suitable prevention techniques for that DoS attack is suggested.
Similar content being viewed by others
References
Chin, T., Mountrouidou, X., Li, X., & Xiong, K. (2015). Selective packet inspection to detect DoS flooding using software defined networking (SDN). In IEEE 35th international conference on distributed computing systems workshops (ICDCSW) (pp. 95–99).
Ding, A. Y., Crowcroft, J., Tarkoma, S., & Flinck, H. (2014). Software defined networking for security enhancement in wireless mobile networks. Computer Networks (COMNET), 66, 94–101.
Feghali, A., Kilany, R., & Chamoun, M. (2015). SDN security problems and solutions analysis. In International conference on protocol engineering (ICPE) and international conference on new technologies of distributed systems (NTDS) (pp. 1–5).
Ali, S. T., Sivaraman, V., Radford, V., & Jha, S. (2015). A survey of securing networks using software defined networking. In IEEE transactions on reliability (Vol. 64, No. 3, pp. 1086–1097). doi:10.1109/TR.2015.2421391.
Kandoi, R., & Antikainen, M. (2015). Denial-of-service attacks in OpenFlow SDN networks. In IFIP/IEEE international symposium on integrated network management (IM) (pp. 1322–1326).
Dhawan, M., Poddar, R., Mahajan, K., & Mann, V. (2012). SPHINX: Detecting security attacks in software-defined networks. In IEEE conference publication of network application protocols and services (NETAPPS) (Vol. 3, No. 9, pp. 47–52).
Liyanage, M., Ahmed, I., Ylianttila, M., Santos, J. L., Kantola, R., Perez, O. L. (2015). Security for future software defined mobile networks. In 9th international conference on next generation mobile applications, services and technologies (pp. 256–264).
Lo, C. C., Wu, P. Y., & Kuo, Y. H. (2015). Flow entry conflict detection scheme for software-defined network. In International telecommunication networks and applications conference (ITNAC) (pp. 220–225).
Shyamala, R., & Valli, S. (2009). Secure route discovery in MAODV for wireless sensor networks. UbiCC Journal, 4, 775–783.
Shyamala, R., & Valli, S. (2011). Impact of sybil and wormhole attacks in location based geographic multicast routing protocol for wireless sensor networks. Journal of Computer Science, 7, 973–979.
Shyamala, R., & Valli, S. (2012). Performance comparison of routing attacks in MANET and WSN. International Journal of Ad hoc, Sensor and Ubiquitous Computing (IJASUC), 3, 41–52.
Shyamala, R., & Valli, S. (2012). Impact of blackhole and rushing attack on the location-based routing protocol for wireless sensor networks. Proceedings of Advances in Intelligent System and Computing, 176, 349–359.
Shyamala, R., & Valli, S. (2013). An approach to secure leach using tesla based certificate. Life Science Journal, 10(2), 1018–1027.
Shyamala, R., & Valli, S. (2013). Securing GMR protocol using TESLA based certificate for WSN. European Journal of Scientific and Research, 94(2), 186–196.
Singh, S., Khan, R. A., & Agrawal, A. (2015). Prevention mechanism for infrastructure based Denial-of-Service attack over software Defined Network. In International conference on computing, communication and automation (ICCCA) (pp. 348–353).
Nishtha, P., & Sood, M. (2014) Software defined network—Architectures. In International conference on parallel, distributed and grid computing (PDGC) (pp. 451–456). doi:10.1109/PDGC.2014.7030788.
Tri, N., Hiep, T., & Kim, K. (2015). Assessing the impact of resource attack in Software Defined Network. In International conference on information networking (ICOIN) (pp. 420–425).
Wang, H., Xu, L., & Gu, G. (2015). FloodGuard: a dos attack prevention extension in software-defined networks. In 45th Annual IEEE/IFIP international conference on dependable systems and networks (DSN) (pp. 239–250).
Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602–622.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ramachandran, S., Shanmugam, V. Impact of DoS Attack in Software Defined Network for Virtual Network. Wireless Pers Commun 94, 2189–2202 (2017). https://doi.org/10.1007/s11277-016-3370-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3370-1