2017
DOI: 10.1016/j.jnca.2016.12.024
|View full text |Cite
|
Sign up to set email alerts
|

Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
28
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(28 citation statements)
references
References 34 publications
0
28
0
Order By: Relevance
“…(see Section V-A2) 1) Simulated Environment Evaluation: In this evaluation, we simulated a SDN environment in our lab to explore the feasibility of our approach. In particular, we used OpenDay-Ligh (ODL) 1 as the SDN controller (on a server with an Intel(R) Core (TM)2, Quad CPU 2.66GHz), and Open vSwitch (OVS) 2 as SDN-enabled switches. We used the open source Snort to detect malicious traffic.…”
Section: A Methodology and Experimental Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…(see Section V-A2) 1) Simulated Environment Evaluation: In this evaluation, we simulated a SDN environment in our lab to explore the feasibility of our approach. In particular, we used OpenDay-Ligh (ODL) 1 as the SDN controller (on a server with an Intel(R) Core (TM)2, Quad CPU 2.66GHz), and Open vSwitch (OVS) 2 as SDN-enabled switches. We used the open source Snort to detect malicious traffic.…”
Section: A Methodology and Experimental Resultsmentioning
confidence: 99%
“…For example, Ha et al [14] developed a traffic sampling strategy to reduce the processing capability of an IDS in SDN, which samples traffic flows according to defined sampling rates. AlEroud and Alsmadi [1] proposed a detection approach to identify DoS attack in a SDN environment, using an inference mechanism and a packet aggregation technique to create attack signatures and predict attacks.…”
Section: B Related Workmentioning
confidence: 99%
“…Other algorithms to detect DDoS attacks, such as SVM, were used in [15,16] and produced better results. An ensemble of graph theory algorithms based on KNN was used by ALEroud and Alsmadi to detect anomalous flow in SDNs [17]. An algorithm based on the variation of the entropy of the destination IP addresses of the flow in an SDN was proposed by Mousavi et al [18] to detect early DDoS attacks.…”
Section: Related Workmentioning
confidence: 99%
“…It is in actual a trust-based technique that helps to enhance the serving rate and it serves about 43% more than the conventional FCFS (First come First Serve) policy. In [12], a comprehensive discussion is presented on intrusion base detection, which illustrates detailed behavior of a DDoS attack and its effect on SDN. The re-active mode of SDN has advantages in large networks because the switch does not have to maintain large flow tables.…”
Section: Figure 2: Taxonomy Of Ddos Mitigation In Sdnmentioning
confidence: 99%