4.6 Article

Source-Based Defense Against DDoS Attacks in SDN Based on sFlow and SOM

期刊

IEEE ACCESS
卷 10, 期 -, 页码 2097-2116

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3139511

关键词

Denial-of-service attack; Cloud computing; Image edge detection; Botnet; Monitoring; IP networks; Centralized control; DDoS attacks detection; network security; software-defined networking; self-organizing map; source-based defense

资金

  1. Key-Area Research and Development Program of Guangdong Province, China [2019B010137001, 2020B0101120002]

向作者/读者索取更多资源

This paper proposes a defense method based on sFlow and improved SOM model in SDN, including macro-detection and micro-detection, to effectively identify and defend against DDoS attacks through a response strategy based on the global view.
In the traditional distributed control network, due to the difficulty in detection and the ambiguous defense responsibility, it is not efficient and effective to detect Distributed Denial of Service (DDoS) attacks in the network where they are launched, which is so-called source-based defense mechanism. Moreover, with the development of cloud computing, Internet of Things (IoT), and mobile Internet, the number of terminals and the communication bandwidth in a single autonomous domain have increased significantly, providing much more easy conditions for organizing large-scale botnets to launch a threatening DDoS attack. Therefore, there is an urgent need for source-based defense against DDoS attacks. The emerging Software-Defined Networking (SDN) provides some new ideas and advantages to solve this problem, such as centralized control and network programmability. In this paper, we proposed a defense method based on sFlow and improved Self-Organizing Map (SOM) model in SDN. This method consists of an sFlow-based macro-detection, which could cover the entire network to perceive DDoS attacks, a SOM-based micro-detection, which is used to recognize the attack traffic, and a response strategy based on the global view given by the controller. The experimental results under open data and simulated attack scenarios have proved the effectiveness of the proposed method, and it also has better overall detection performance than k-means and k-medoids.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据