2019 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW) 2019
DOI: 10.1109/ipdpsw.2019.00108
|View full text |Cite
|
Sign up to set email alerts
|

Entropy-Based DoS Attack Identification in SDN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(27 citation statements)
references
References 18 publications
0
16
0
Order By: Relevance
“…This implies that, for each attacker, the switch has to send a packet to the controller to find out what action to take by adding a new flow rule. In addition, if the detection mechanism corresponds to an entropy-based algorithm, all packets must be monitored [18], so stateless solutions are not efficient or scalable.…”
Section: Entropy-based (D)dos Attacks Detection and Mitigation In Stamentioning
confidence: 99%
See 1 more Smart Citation
“…This implies that, for each attacker, the switch has to send a packet to the controller to find out what action to take by adding a new flow rule. In addition, if the detection mechanism corresponds to an entropy-based algorithm, all packets must be monitored [18], so stateless solutions are not efficient or scalable.…”
Section: Entropy-based (D)dos Attacks Detection and Mitigation In Stamentioning
confidence: 99%
“…As we will mention in Section 3, several solutions against DoS and DDoS attacks based on statistical methods have been proposed in the literature. There are also different works that investigate the detection of these attacks using the stateless SDN paradigm [18,19]. However, statistical solutions in SDN architectures exhibit several drawbacks that are required to be addressed in order to achieve efficient methods for the detection and mitigation of these security hazards.…”
Section: Introductionmentioning
confidence: 99%
“…Since the centralized network architecture is more likely to be the target of DoS attacks, more research focuses on the detection and defense of DoS attacks in SDN. In [24], the authors built a mechanism that used statistical data to monitor the network and differentiate DoS traffic from benign traffic using entropy in an SDN environment. However, statistical solutions in SDN architectures display some flaws that need to be addressed to realize efficient methods for detecting and mitigating these security risks.…”
Section: Related Workmentioning
confidence: 99%
“…Next, we compared with other proposed solutions in the same environment, including the entropy-based detection method [24] and the DoSDefender. The results are shown in Table 4.…”
Section: Advancement Evaluationmentioning
confidence: 99%
“…Maximum entropy estimation was suggested to identify the benign and attack traffic in the SDN network [23,24]. Similar approaches were proposed to detect DDoS attacks using a statistical based entropy model [5,25,26]. A classification framework that detects the DDoS attack based on statistical features at flow level and packet level was suggested [27].…”
Section: Related Workmentioning
confidence: 99%