Data Visualization: Experiment to Impose DDoS Attack and Its Recovery on Software-Defined Networks
- 144 Downloads
The entire network is doing paradigm shift towards the software-defined networks by separating forwarding plane from control plane. This gives a clear call to researchers for joining the ocean of software-defined networks for doing research considering its security aspects. The biggest advantage of SDN is programmability of the forwarding plane. By making the switches programmable, it can take live instructions from controllers. The versions of OpenFlow protocol and the compatibility of programmable switches with OpenFlow were the stepping stone making software-defined networks thrashed towards reality. The control plane has come up with multiple options of controllers such as NOX , Ryu , Floodlight , OpenDayLight , ONOS  and the list is big. The major players are Java based which keeps the doors open for enhancement of features by the contributors. However, more is expected from the practicality of P4Lang programmed switches by bringing skilled people to the industry who can actually implement programmable switches with ease. The obvious reason for delayed progress in the area of software-defined networks is the lack of awareness towards data visualization options existing as of now. The purpose of writing this chapter is to throw light upon the existing options available for data visualization in the area of SDN especially addressing the security aspect by analyzing the experiment of distributed denial of service (DDoS) attack on SDN with clarity on its usage, features, applicability and scopes for its adaptabilities in the world of networks which is going towards SDN. This chapter is a call to network researchers to join the train of SDN and push forward the SDN technology by proved results of data visualization of network and security matrices. The sections and subsections show clearly the experimental steps to implement DDoS attack on SDN and further provide solution to overcome the attack.
KeywordsDDoS SDN Security Denial of service Floodlight Mininet
- 1.Asadollahi, S., & Goswami, B. (2017). Software defined network, controller comparison. IJIRCCE, 5(2), 211–217.Google Scholar
- 2.Das, S., Goswami, B., & Asadollahi, S. (2017). Investigating software-defined network and networks-function virtualization for emergent network-oriented services. IJIRCCE, 5(2), 201–205.Google Scholar
- 3.Asadollahi, S., Goswami, B., & Sameer, M. (2018). Ryu controller’s scalability experiment on software defined networks. In Proceedings of IEEE International Conference on Current Trends in Advanced Computing (ICCTAC) (pp. 1–5). IEEE, Bangalore, India.Google Scholar
- 4.Asadollahi, S., & Goswami, B. (2017). Experimenting with scalability of floodlight controller in software defined networks. In International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT) (pp. 1–5). IEEE, Mysore, India.Google Scholar
- 5.Goswami, B., & Asadollahi, S. (2017). Implementation of SDN using OpenDayLight controller. IJIRCCE, 5(2), 218–227.Google Scholar
- 6.Manuel, T., & Goswami, B. H. (2019). Experimenting with scalability of beacon controller in software defined network. International Journal of Recent Technology and Engineering (IJRTE), 7(5S2), 550–555.Google Scholar
- 7.Sameer, M., & Goswami, B. (2018). Experimenting with ONOS scalability on software defined network. Journal of Advanced Research in Dynamical & Control Systems, 10(14-Special Issue), 1820–1830.Google Scholar
- 8.Goswami, B., & Asadollahi, S. S. (2018). Enhancement of LAN infrastructure performance for data center in presence of network security. In: Lobiyal, D., Mansotra, V., & Singh, U. (Eds.), Next-generation networks. Advances in intelligent systems and computing (vol. 638). Singapore: Springer.Google Scholar
- 9.Asadollahi, S., & Goswami, B. (2017). Revolution in existing network under the influence of software defined network. In Proceedings of the 11th INDIACom (pp. 1012–1017). IEEE, New Delhi, India.Google Scholar
- 10.Asadollahi, S., & Goswami, B. (2016). Key establishment technique for secure diversified wireless network. In ICCSNIT—2016, Pattaya, Thailand. Open Access.Google Scholar
- 11.Goswami, B. (2012). Study and analysis of symmetric key-cryptograph DES, data encryption standard. SWP-2012, Rajkot. India. MHRD Sponsored. India.Google Scholar
- 12.Hameed, S. S., & Goswami, B. (2018). SMX algorithm: A novel approach to avalanche effect on advanced encryption standard AES. In Proceedings of the 12th INDIACom (pp. 727–232). IEEE, New Delhi, India.Google Scholar
- 13.Gosai, M., Goswami, B., & Kar, U. (2014). Experimental based performance testing of different TCP protocol variants in comparison of RCP+ over hybrid network scenario. International Journal of Innovations & Advancement in Computer Science (IJIACS), 3(2), 31–37.Google Scholar
- 14.Asadollahi, S., & Goswami, B. (2017). Scalability of software defined network on floodlight controller using OFNet. In International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT) (pp. 1–5). IEEE, Mysore, India.Google Scholar
- 15.De Oliveira, R. L. S., et al. (2014). Using mininet for emulation and prototyping software-defined networks. In 2014 IEEE Colombian Conference on Communications and Computing (COLCOM). IEEE.Google Scholar
- 16.Fettig, A., & Lefkowitz, G. (2005). Twisted network programming essentials. O’Reilly Media, Inc.Google Scholar
- 17.Rehman, S. U., Song, W.-C., & Kang, M. (2014). Network-wide traffic visibility in OF@ TEIN SDN testbed using sFlow. In The 16th Asia-Pacific Network Operations and Management Symposium. IEEE.Google Scholar
- 18.Visitsathapong, C. (2014). Path switching delay measurements in software-defined networks. Diss.Google Scholar
- 19.Xterm: Emulator. Available at https://invisible-island.net/xterm/. Last accessed on September 2018.
- 20.IPERF: Networks tool. Available at https://iperf.fr/. Last accessed on September 2018.
- 21.Gnuplot: Graph tool. Available at http://www.gnuplot.info/. Last accessed on September 2018.