Skip to main content

Software-Defined Networks and Methods to Mitigate Attacks on the Network

  • Conference paper
  • First Online:
Progress in Advanced Computing and Intelligent Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 713))

Abstract

Software-defined network (SDN) is becoming an advance technology. It is not only used to manage IP networks but also manages data centers as well as cloud data and it can be applied in various types of networks. Earlier approaches for IP networks were more complex and IP networks are now a big network; thus, it is very difficult to manage those networks in terms of configuring thenetwork devices, applying policies on the network dynamically and get the knowledge of the faults, load and changes in the network. Software-defined approach made it easy to manage and configure the network. The role of the SDN controller in network devices can be extended with an application that effectively solves a particular problem and provide a flexible management service. One of the protocols used for this technology is OpenFlow. It basically works on southbound interface, i.e., between controller and network devices. Many solutions to utilize the network and exploit as much information possible from the network is one of the aim of researchers and many solutions have been proposed for the same. One of the most important and distinct features is to detect denial-of-service (DoS) attack quickly and precisely. In this paper, we are going to give an introduction about how and why SDN is trending and also analysis of solutions to detect and save a network from DDoS attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Benson, T., Akella, A., Maltz, D.: Unraveling the complexity of network management. In: Proceedings 6th USENIX Symposiu Networked Systems Design Implement, pp. 335–348 (2009)

    Google Scholar 

  2. Kreutz, B.D., Ramos, F.M.V., Verssimo, P.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-DefinedNetworking: a comprehensive survey

    Google Scholar 

  3. Mirkovic, J., Reiher, P.: A taxonomy of ddos attack and ddos defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39–53 (2004)

    Article  Google Scholar 

  4. DDoS Attack Loss. http://blog.radware.com/security/2013/05/how-much-can-a-ddos-attack-cost-your-business/

  5. Neustar annual ddos attacks and impact report. https://www.neustar.biz/resources/whitepapers/ddos-protection/2014-annual-ddos-attacks-and-impact-report.pdf

  6. RFC: OpenFlow Switch Specification ver 1.5.1

    Google Scholar 

  7. Software Defined networking. https://www.opennetworking.orgl

  8. Kreutz, D., Ramos, F.M.V., Verissimo, P.: Towards secure and dependable software-defined networks. ACM, HotSDN’13, pp. 1–6 (2013)

    Google Scholar 

  9. Giotis, K., Argyropoulos, C., Androulidakis, G., Kalogeras, D., Maglaris, V.: Combining OpenFlow and sFlow for an effective and Scalable anomaly detection and mitigation mechanism on SDN environments. J. Comput. Netw. 62, 122–136 (2014). Elsevier

    Article  Google Scholar 

  10. Wang, Y., Zhang, Y., Singh, V., Lumezanu, C., Jiang, G.: NetFuse: short-circuiting traffic surges in the cloud. In: IEEE International Conference on communications, pp. 3514–3518 (2013)

    Google Scholar 

  11. Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX/OpenFlow. Proc. IEEE LCN 3(1), 408–415 (2010)

    Google Scholar 

  12. Tcamwiki. http://en.wikipedia.org/wiki/TCAM

  13. Kaushik, V.K., Sharma, H.K., Gopalani, D.: Load balancing in cloud- computing using high level fragmentation of dataset

    Google Scholar 

  14. Malik, S.: Dynamic load balancing in a network of workstation, 95.515 Research Report, 19th November, 2000

    Google Scholar 

  15. Rajoriya, S.: Load balancing techniques in cloud computing: an overview. Int. J. Sci. Res. 3(7) (2014)

    Google Scholar 

  16. Mousavi, S.M., St-Hilaire, M.: Early detection of DDoS attacks against SDN controllers. In: International Conference on Computing, Networking and Communications, Communications and Information Security Symposium (2015)

    Google Scholar 

Download references

Acknowledgements

We would like to express our gratitude to our Principal Scientist, Mr. Manoj Jain, and our Senior Member Research Staff, Mrs. Uma Devi B., who gave us immense opportunity to do this wonderful research on the topic Software-Defined Networking [SDN], which engaged us in doing a lot of researches and helped us in every possible way.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shubham Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, S., Kumar, S., Sarimela, V. (2019). Software-Defined Networks and Methods to Mitigate Attacks on the Network. In: Pati, B., Panigrahi, C., Misra, S., Pujari, A., Bakshi, S. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 713. Springer, Singapore. https://doi.org/10.1007/978-981-13-1708-8_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1708-8_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1707-1

  • Online ISBN: 978-981-13-1708-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics