2018
DOI: 10.1002/dac.3543
|View full text |Cite
|
Sign up to set email alerts
|

FMD: A DoS mitigation scheme based on flow migration in software‐defined networking

Abstract: Software-defined networking (SDN) emerges as the next generation of networking architecture, aiming to improve the network manageability and adaptability.However, because of the centralized control policy, SDN is liable to suffering from the denial of service attack in both the data plane and the control plane. To resist the attack and prevent the network from being paralyzed, we propose a novel mitigation scheme named flow migration defense, which uses a slave controller as a substitution to endure flooding r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…The proposed scheme has high resource utilization and can effectively alleviate the impact of DDoS attacks on controller resource consumption. Wu et al [ 21 ] proposed a new mitigation scheme, FlowMitigation, in order to resist DDoS attacks in SDNs. The proposed scheme uses a slave controller as an alternative to tolerating flooding requests from the master controller.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed scheme has high resource utilization and can effectively alleviate the impact of DDoS attacks on controller resource consumption. Wu et al [ 21 ] proposed a new mitigation scheme, FlowMitigation, in order to resist DDoS attacks in SDNs. The proposed scheme uses a slave controller as an alternative to tolerating flooding requests from the master controller.…”
Section: Related Workmentioning
confidence: 99%
“…7 and implemented in the Mininet 2.2.2 emulator environment [32]. According to Table II, this implementation uses OpenVSwitch [33] software switches for the Open_ Flow switches and the RYU platform [34] for the controllers. Additionally, the iPerf [35] tool has been used to produce UDP flood attack traffic in order to test the scenarios.…”
Section: Investigating How the Proposal Is Affected By A Control-leve...mentioning
confidence: 99%
“…FloodDefender aims at securing both the control and data layers through leveraging table-miss engineering and packet filter approaches. FMD [32] is another solution to prevent re-forwarded request-based flooding attacks in a multi-SDN environment. FMD deploys an adaptive rate adjustment method to adjust the re-forwarding rate.…”
Section: Related Workmentioning
confidence: 99%