Skip to main content

Detection of DoS, DDoS Attacks in Software-Defined Networking

  • Conference paper
  • First Online:
Research in Intelligent and Computing in Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1254))

  • 1226 Accesses

Abstract

In the traditional network system, control plane (CP) and data plane (DP) are both located on the same network device. If that device fails, the whole system will stop working and the traffics cannot be managed by the administrator. In distributed denial of service (DDoS) or denial of service (DoS), the attackers usually use botnets to generate a large or medium size traffic flow toward the server where the service is active. Nowadays, many techniques have been proposed to detect DoS, DDoS attacks but they are not very effective. However, the separation of CP and DP in software-defined networking (SDN) provides a good foundation for attack detection and prevention no matter whether the attackers attack some parts of the SDN or all of them. In this research, we use entropy to calculate the randomness level of the size of the packet to CP, the system’s brain. With this method, the controller can handle faster and we can get more correct output compared with the machine learning method in the SDN.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Polat H, Polat O, Cetin A (2020) Detecting DDoS attacks in software-defined networks through feature selection methods and machine learning models. Sustain 12(3)

    Google Scholar 

  2. Andres P et al (2015) FlowFence: a denial of service defense system for software defined networking. In: Proceedings global information infrastructure networking symposium, pp 1–6

    Google Scholar 

  3. Seungwon S et al (2013) Avant-guard: scalable and vigilant switch flow management in software-defined networks. In: Proceedings 2013 ACM SIGSAC conference computer and communications security, ACM, pp 413–424

    Google Scholar 

  4. Chen K et al (2016) SDNShield: towards more comprehensive defense against DDoS attacks on SDN control plane. In: 2016 IEEE conference on communications and network security (CNS), IEEE, pp 28–36

    Google Scholar 

  5. Moustafa N (2016) The evaluation of network anomaly detection systems: statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. vol 25, No 1–3, Australia, pp 18–31

    Google Scholar 

  6. Lopez AD, Mohan AP, Nair S (2019) Network traffic behavioral analytics for detection of DDoS attacks. SMU Data Sci Rev 2(1) 2019

    Google Scholar 

  7. Khare M, Oak R (2020) Real-Time distributed denial-of-service (DDoS) attack detection using decision trees for server performance maintenance. In: Performance management of integrated systems and its applications in software engineering, Springer, Singapore, pp 1–9

    Google Scholar 

  8. Sharma A, Agrawal C, Singh A, Kumar K (2020) Real-Time DDoS detection based on entropy using Hadoop framework. In: Computing in engineering and technology, Springer, Singapore, pp 297–305

    Google Scholar 

  9. Nooribakhsh M, Mollamotalebi M (2020) A review on statistical approaches for anomaly detection in DDoS attacks. Inf Secur J: A Global Perspect, 1–16

    Google Scholar 

  10. Riad AM, Elhenawy I, Hassan A, Nanc (2013) Visualize network anomaly detection. 5(5)

    Google Scholar 

  11. Idhammad M, Afdel K, Belouch M (2017) DoS detection method based on artificial neural. 8(4)

    Google Scholar 

  12. Akhunzada E, Ahmed A, Gani M, Khan K, Imran M (2015) Securing software defined network: toxonomy, requirements, and open issues, Malaysia, pp 39

    Google Scholar 

  13. Gu G, Shin S (2012) CloudWatcher: network security monitoring using openflow. pp 1–6

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dinh-Tu Truong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Truong, DT., Tran, KD., Nguyen, QB., Tran, DT. (2021). Detection of DoS, DDoS Attacks in Software-Defined Networking. In: Kumar, R., Quang, N.H., Kumar Solanki, V., Cardona, M., Pattnaik, P.K. (eds) Research in Intelligent and Computing in Engineering. Advances in Intelligent Systems and Computing, vol 1254. Springer, Singapore. https://doi.org/10.1007/978-981-15-7527-3_3

Download citation

Publish with us

Policies and ethics