Proceedings of the 11th International Conference on Future Internet Technologies 2016
DOI: 10.1145/2935663.2935674
|View full text |Cite
|
Sign up to set email alerts
|

An Easy Defense Mechanism Against Botnet-based DDoS Flooding Attack Originated in SDN Environment Using sFlow

Abstract: As today's networks become larger and more complex, the Distributed Denial of Service (DDoS) flooding attack threats may not only come from the outside of networks but also from inside, such as cloud computing network where exists multiple tenants possibly containing malicious tenants. So, the need of source-based defense mechanism against such attacks is pressing. In this paper, we mainly focus on the source-based defense mechanism against Botnet-based DDoS flooding attack through combining the power of Softw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
1
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…According to equation ( 2) and ( 3), the DCD is used to measure the number of flows that concurrently access to the same target, and the intensity is used to measure the total rate of all flows in a Dflow set. These two features were proposed in our early work of an easy defense method [39]. In terms of probability, assuming the probability of a node to access a certain target at a certain time is p and this probability for all nodes obeys independent and identical distribution.…”
Section: Macro Detection Based On Dcdmentioning
confidence: 99%
“…According to equation ( 2) and ( 3), the DCD is used to measure the number of flows that concurrently access to the same target, and the intensity is used to measure the total rate of all flows in a Dflow set. These two features were proposed in our early work of an easy defense method [39]. In terms of probability, assuming the probability of a node to access a certain target at a certain time is p and this probability for all nodes obeys independent and identical distribution.…”
Section: Macro Detection Based On Dcdmentioning
confidence: 99%
“…Most DDOS attacks are conducted from within botnets. A botnet is a collection of numerous PC devices that have been unintentionally brought together, typically due to an infection or other harmful code [4].…”
Section: Ddos Attackmentioning
confidence: 99%
“…Protect the production devices by drawing an attacker's attention away from the real network. 4. Gather details about the attacker's equipment, strategies, and tactics.…”
Section: Honeypotsmentioning
confidence: 99%
“…Lu and Wang [19] proposed an approach on the sourcebased guard system against DDoS flooding attack botnet based through joining the force of SDN (Software-Defined Networking) and SFLOW (Sample Flow) technology. Firstly, they defined a metric to quantify the fundamental components of this kind of attack, which implies distribution and coordinated effort.…”
Section: Related Workmentioning
confidence: 99%