Skip to main content

RETRACTED ARTICLE: Bayesian trust analysis of flooding attacks in distributed software defined networking nodes

This article was retracted on 23 May 2022

This article has been updated

Abstract

As the networking infrastructure is becoming complex, there is a parallel increase in the networking scenario to become more vulnerable to various types of sophisticated malicious attacks. This leads to the data and information loss. The most feasible way to reduce the vulnerable and malicious attacks is by evaluating trust of the interacting agents in a network. The primary objective of this paper is to analyze the flooding attacks caused due to the communication protocols like TCP and UDP in software defined spine leaf topology. The trust analysis is done using Bayesian networks for a reliable communication network. The probability and the causal effect of the denial of service in the proposed distributed networking scenario are reasoned out. The trust analysis will help to increase the confidence over a dedicated communication at the time of malicious attack over the distributed network. This analysis will enable the software defined control plane to make a crucial and needed decision over its communication with other nodes during compromised security attack through communication protocols.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Change history

References

  • Betge Brezetz S, Kamga MD, Guesmi A (2013) End-to-end privacy policy enforcement in cloud infrastructure. In: IEEE conference on cloud networking, CloudNet, San Francisco, USA

  • Betgé Brezetz S, Kamga GB, Joutei A, Maalmi O (2014) SDN-based trusted path control. In: International conference and workshop on the network of the future (NOF), pp 1–5

  • Bin Z, Peng Dan BX, Weiming W (2016) Research and implementation of the SDN resources transaction process based on trust mechanism. China Commun 1(13):190–197

    Google Scholar 

  • Botelho F, Ramos MV, Bessani A (2013) On the feasibility of a consistent and fault-tolerant data store for sdns. In: European workshop software defined networks (EWSDN), pp 38–43

  • Desai M, Nandagopal T (2010) Coping with link failures in centralized control, plane architecture. In: IEEE COMSNET, pp 1–10

  • Fitting M (1994) Kleen’s three valued logics and their children. Fundamenta Informaticae 20:113–131

    MathSciNet  Article  Google Scholar 

  • Heller B, McKeown N (2012) The controller placement problem. In: ACM SIGCOMM HotSDN, pp 7–12

  • Ivanovska M, Josang A (2016) Predictive reasoning in subjective bayesian networks. Norsk Informatikkonferanse, Bergen

    Google Scholar 

  • Josang A (2016) Subjective logic: a formalism for reasoning under uncertainty. Springer, Berlin

    Book  Google Scholar 

  • Josang A (2019) Belief mosaics of subjective opinions. In: 22th International conference on information fusion (FUSION 2019). Ottawa

  • Jøsang A, Quattrociocchi W (2009) Advanced features in Bayesian reputation systems. In: Proceedings of the 6th international conference on trust, privacy & security in digital business (TrustBus’09), Linz, Austria

  • Kamapantula BK, Abdelzaher A, Ghosh P, Mayo M, Perkins EJ, Das SK (2014) Leveraging the robustness of genetic networks: a case study on bio-inspired wireless sensor network topologies. J Ambient Intell Hum Comput 5(3):323–339

    Article  Google Scholar 

  • Kreutz F, Ramo S, Uhlig (2015) Software defined networking: a comprehensive survey. IEEE Commun Surv Tutor 103(1):14–76

    Google Scholar 

  • Laouid A, Dahmani A, Hassen HR, Bounceur A, Euler R, Lalem F, Tari A (2019) A self-managing volatile key scheme for wireless sensor networks. J Ambient Intell Hum Comput 10(9):3349–3364

    Article  Google Scholar 

  • Liyanage M, Ahmed I, Ylianttila M, Santos JL (2015) Security for future software defined mobile networks. In: 9th International conference on next generation mobile applications, services and technologies, Cambridge, pp 256–264

  • Moorthy V, Venkataraman R (2015) Analysis of data transmission management through software defined POX controller. IEEE Global Wireless Summit, Hyderabad

    Google Scholar 

  • Moorthy V, Venkataraman R, Rama Rao T (2020) Security and privacy attacks during data communication in Software Defined Mobile Clouds. Comput Commun 153:515–526

    Article  Google Scholar 

  • Muller LF, Oliveira R, Barcellos MP (2014) Survivor: an enhanced controller placement strategy for improving sdn survivability. In: IEEE GLOBECOM, pp 1909–1915

  • Open Networking Foundation (2015) Principles and practices for securing software defined networks, 2275 E. Bayshore Road, Suite 103, Palo Alto, CA 94303. https://www.opennetworking.org

  • Peng T, Ramamohanarao K (2003) Protection from distributed denial of service attacks using history-based IP filtering. IEEE Int Conf Commun 1:482–486

    Article  Google Scholar 

  • Rao S (2011) Denial of service attacks and mitigation techniques: real time implementation with detailed analysis. SANS Institute Reading Room site

  • Salvestrini F, Ciulli N (2013) Towards a distributed SDN control: inter platform signalling among flow processing platforms. In: IEEE SDN conference on future networks and services, SDN4FNS

  • Schuba KL, Zamboni D (1997) Analysis of denial of service attack on TCP. In: IEEE symposium in security and privacy, pp 208–223

  • Yan Q, Richard Y, Li J (2016) Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun Surv Tutor 18:602–622

    Article  Google Scholar 

Download references

Acknowledgements

We, the authors gratefully acknowledge the motivation and support offered by the SRM Institute of Science and Technology, Kattankulathur Campus and the Department of Computer Science & Engineering to carry out this piece of research work. Our special thanks to Dr. Raj Gururajan for his motivating suggestions and ideas offered for improvising the research objective during the review interactions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vaishnavi Moorthy.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s12652-022-03924-8

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Moorthy, V., Venkataraman, R. & Gururajan, R. RETRACTED ARTICLE: Bayesian trust analysis of flooding attacks in distributed software defined networking nodes. J Ambient Intell Human Comput 12, 7489–7498 (2021). https://doi.org/10.1007/s12652-020-02428-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02428-7

Keywords

  • Wireless sensor networks
  • Communication
  • Software defined networks
  • Flooding attacks
  • Trust analysis