2023
DOI: 10.1007/s11042-023-16781-0
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive survey on low-rate and high-rate DDoS defense approaches in SDN: taxonomy, research challenges, and opportunities

Suruchi Karnani,
Neha Agrawal,
Rohit Kumar
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 125 publications
0
2
0
Order By: Relevance
“…DDoS attacks manipulate the basic principles of network communication and can target different planes of the SDN network, including the control and data planes. Commonly, DDoS floods the victim with an extensive volume of packets, consuming network resources, including bandwidth or server processing capacity, or using vulnerabilities in network protocols to suspend communication between other parts of the network [17].…”
Section: Specific Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…DDoS attacks manipulate the basic principles of network communication and can target different planes of the SDN network, including the control and data planes. Commonly, DDoS floods the victim with an extensive volume of packets, consuming network resources, including bandwidth or server processing capacity, or using vulnerabilities in network protocols to suspend communication between other parts of the network [17].…”
Section: Specific Attacksmentioning
confidence: 99%
“…At this stage, an attacker has the opportunity to intercept the packet and inject harmful rules or modify the existing ones. Because of this, the majority of packets may be sent in the wrong direction [17] (5) Applications: The applications that are implemented in the SDN control layer include traffic monitoring and classification. These applications are created by third parties to add necessary security requirements.…”
Section: Vulnerable Points In the Sdn Environmentmentioning
confidence: 99%
“…These attacks are typically orchestrated through a network of compromised devices known as botnets, unleashing a deluge of traffic upon the target [1]. DDoS attacks can wreak havoc on online services, and combating these threats can be exceptionally challenging due to the multifarious sources from which the traffic originates [2,3].…”
Section: Introductionmentioning
confidence: 99%