期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
SDN中基于卡方检验的DDoS防御 被引量:3
1
作者 王杨俊杰 解忧 张卫涛 《计算机工程与设计》 北大核心 2018年第9期2743-2747,共5页
针对SDN网络控制平面资源耗尽的新型DDoS攻击方式,设计并实现SDN网络环境下基于卡方检验的DDoS攻击防御系统。通过检测Packet_In消息上传加速度的异常来触发DDoS攻击检测模块;DDoS攻击检测模块收集Packet_In消息携带的信息,结合卡方检... 针对SDN网络控制平面资源耗尽的新型DDoS攻击方式,设计并实现SDN网络环境下基于卡方检验的DDoS攻击防御系统。通过检测Packet_In消息上传加速度的异常来触发DDoS攻击检测模块;DDoS攻击检测模块收集Packet_In消息携带的信息,结合卡方检验检测DDoS攻击并筛选攻击源;根据攻击源的信息,下发应对DDoS攻击的流表,有效缓解DDoS攻击造成的网络拥塞。研究结果表明,设计的防御系统能够准确检测并有效防御DDoS攻击,对于SDN网络环境的安全保护具有重要意义。 展开更多
关键词 软件定义网络 OpenFlow交换机 DDOS攻击 卡方检验 packet_in消息
在线阅读 下载PDF
IQR-based approach for DDoS detection and mitigation in SDN 被引量:1
2
作者 Rochak Swami Mayank Dave Virender Ranga 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第7期76-87,共12页
Software-defined networking(SDN) is a trending networking paradigm that focuses on decoupling of the control logic from the data plane. This decoupling brings programmability and flexibility for the network management... Software-defined networking(SDN) is a trending networking paradigm that focuses on decoupling of the control logic from the data plane. This decoupling brings programmability and flexibility for the network management by introducing centralized infrastructure. The complete control logic resides in the controller, and thus it becomes the intellectual and most important entity of the SDN infrastructure. With these advantages, SDN faces several security issues in various SDN layers that may prevent the growth and global adoption of this groundbreaking technology. Control plane exhaustion and switch buffer overflow are examples of such security issues. Distributed denial-of-service(DDoS) attacks are one of the most severe attacks that aim to exhaust the controller’s CPU to discontinue the whole functioning of the SDN network. Hence, it is necessary to design a quick as well as accurate detection scheme to detect the attack traffic at an early stage. In this paper, we present a defense solution to detect and mitigate spoofed flooding DDoS attacks. The proposed defense solution is implemented in the SDN controller. The detection method is based on the idea of an statistical measure — Interquartile Range(IQR). For the mitigation purpose, the existing SDN-in-built capabilities are utilized. In this work, the experiments are performed considering the spoofed SYN flooding attack. The proposed solution is evaluated using different performance parameters, i.e., detection time, detection accuracy, packet_in messages, and CPU utilization. The experimental results reveal that the proposed defense solution detects and mitigates the attack effectively in different attack scenarios. 展开更多
关键词 SDN DDOS IQR CONTROLLER CPU utilization packet_in
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部