4.6 Article

Source-Based Defense Against DDoS Attacks in SDN Based on sFlow and SOM

Journal

IEEE ACCESS
Volume 10, Issue -, Pages 2097-2116

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3139511

Keywords

Denial-of-service attack; Cloud computing; Image edge detection; Botnet; Monitoring; IP networks; Centralized control; DDoS attacks detection; network security; software-defined networking; self-organizing map; source-based defense

Funding

  1. Key-Area Research and Development Program of Guangdong Province, China [2019B010137001, 2020B0101120002]

Ask authors/readers for more resources

This paper proposes a defense method based on sFlow and improved SOM model in SDN, including macro-detection and micro-detection, to effectively identify and defend against DDoS attacks through a response strategy based on the global view.
In the traditional distributed control network, due to the difficulty in detection and the ambiguous defense responsibility, it is not efficient and effective to detect Distributed Denial of Service (DDoS) attacks in the network where they are launched, which is so-called source-based defense mechanism. Moreover, with the development of cloud computing, Internet of Things (IoT), and mobile Internet, the number of terminals and the communication bandwidth in a single autonomous domain have increased significantly, providing much more easy conditions for organizing large-scale botnets to launch a threatening DDoS attack. Therefore, there is an urgent need for source-based defense against DDoS attacks. The emerging Software-Defined Networking (SDN) provides some new ideas and advantages to solve this problem, such as centralized control and network programmability. In this paper, we proposed a defense method based on sFlow and improved Self-Organizing Map (SOM) model in SDN. This method consists of an sFlow-based macro-detection, which could cover the entire network to perceive DDoS attacks, a SOM-based micro-detection, which is used to recognize the attack traffic, and a response strategy based on the global view given by the controller. The experimental results under open data and simulated attack scenarios have proved the effectiveness of the proposed method, and it also has better overall detection performance than k-means and k-medoids.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available