4.6 Article

TFAD: TCP flooding attack detection in software-defined networking using proxy-based and machine learning-based mechanisms

出版社

SPRINGER
DOI: 10.1007/s10586-022-03666-4

关键词

TCP SYN attack; TCP ACK attack; Machine Learning; Software-defined networks; Proxy-based

向作者/读者索取更多资源

Software-defined networks (SDN) provide a centralized administration programming interface to govern the network infrastructure by creating a configurable link between the control and data planes. However, the logic of the SDN environment depends on the control plane, making the controller vulnerable to security attacks. To address the serious threat of TCP flooding, we propose a technique called TCP Flooding Attack Detection (TFAD) using proxy-based and Machine-Learning-based mechanisms (ML-TFAD).
Software-defined networks (SDN) offer a centralized administration programming interface to govern the network infrastructure. It overtook conventional networks by creating a configurable link between the control and data planes. As the logic of the SDN environment completely depends on the control plane, the controller is vulnerable to many security attacks. To degrade the network's performance, attackers will saturate the control plane resources. TCP flooding is a serious threat in which attackers restrict legitimate users from accessing the network resources. To handle this problem, we propose a TCP Flooding Attack Detection (TFAD) technique using proxy-based and Machine-Learning-based mechanisms (ML-TFAD). The TFAD technique contains two proxies, SYN and ACK: the former defends against TCP SYN flood attacks and the latter against TCP ACK flood attacks. The ML-TFAD module uses the C4.5 decision tree algorithm, which detects SYN flood attacks before reaching the targeted server. The CAIDA 2007 DDoS dataset is involved in training the proposed model. The proposed mechanisms help remove half-opened connections from the server queue at the earliest to accommodate TCP connection requests from legitimate users.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据