Advertisement

Detracting TCP-Syn Flooding Attacks in Software Defined Networking Environment

  • E. SakthivelEmail author
  • R. Anitha
  • S. Arunachalam
  • M. Hindumathy
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 35)

Abstract

Internet is the platform where everything is connected with everything and also is accessible from anywhere. Moreover the users are widely spread across the globe, traditional IP networks are complex and very hard to manage. Software-Defined Networking (SDN) is a completely a virtual model which changes the traditional network of affairs by dividing the network’s control plane from the data plane, intern the network control is done by the SDN program to be a centralized one. However, it has been proven time and again that the SDN is vulnerable to various kinds of attacks like Distributed Denial of Service (DDoS), Denial of Service (DoS), dictionary attacks etc. DDoS attacks mounted by botnets has been termed as biggest threat to internet security today, they target a specific service, mobilizing only a small amount of legitimate looking traffic to compromise the server. Identification methods and blocking the network from the attacks using unstable statistics of the traffic is very challenging and it has been assigned to the server. In this paper, an attack detection and mitigation application has been implemented in an SDN environment. Additionally, a mechanism has been developed on the server side to differentiate between legitimate and illegitimate users such that service to former is not affected.

Keywords

SDN DDOS Botnets 

References

  1. 1.
    Lawal, B.H., Nuray, A.T.: Real-time detection and mitigation of distributed denial of service (DDoS) attacks in software defined networking (SDN). In: 2018 26th Signal Processing and Communications Applications Conference (SIU), Izmir, pp. 1–4 (2018)Google Scholar
  2. 2.
    Ubale, T., Jain, A.K.: Taxonomy of DDoS attacks in software-defined networking environment. In: Singh, P., Paprzycki, M., Bhargava, B., Chhabra, J., Kaushal, N., Kumar, Y. (eds.) Futuristic Trends in Network and Communication Technologies. FTNCT 2018. Communications in Computer and Information Science, vol. 958. Springer, Singapore (2019)Google Scholar
  3. 3.
    Eddy, W.M.: TCP SYN flooding attacks and common mitigations. J. Inf. Secur. 2(3) (2011). 2007 article cited by “Effectiveness of Built-in Security Protection of Microsoft’s Windows Server 2003 against TCP SYN Based DDoS AttacksGoogle Scholar
  4. 4.
    Nugraha, M., Paramita, I., Musa, A., Choi, D., Cho, B.: Utilizing openflow and sflow to detect and mitigate syn flooding attack. J. Korea Multimed. Soc. 17(8), 988–994 (2014)CrossRefGoogle Scholar
  5. 5.
    Ambrosin, M., Conti, M., De Gaspari, F., Poovendran, R.: Lineswitch: efficiently managing switch flow in software-defined networking while effectively tackling dos attacks. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 639–644. ACM (2015)Google Scholar
  6. 6.
    Chin, T., Mountrouidou, X., Li, X., Xiong, K.: Selective packet inspection to detect dos flooding using software defined networking (SDN). In: Proceedings of International Conference on Distributed Computing Systems Workshops, pp. 95–99. IEEE (2015)Google Scholar
  7. 7.
    Fichera, L., Galluccio, S.C., Grancagnolo, G.M., Palazzo, S.: OPERETTA: an OPEnflow-based remedy to mitigate TCP SYNFLOD attacks against web servers. Comput. Netw. 92, 89–100 (2015)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • E. Sakthivel
    • 1
    Email author
  • R. Anitha
    • 2
  • S. Arunachalam
    • 1
  • M. Hindumathy
    • 1
  1. 1.Department of Information TechnologySri Venkateswara College of EngineeringSriperumbudurIndia
  2. 2.Department of Computer Science and EngineeringSri Venkateswara College of EngineeringSriperumbudurIndia

Personalised recommendations