2022
DOI: 10.1155/2022/2593672
|View full text |Cite|
|
Sign up to set email alerts
|

Lightweight Statistical Approach towards TCP SYN Flood DDoS Attack Detection and Mitigation in SDN Environment

Abstract: Distributed Denial of Service (DDoS) attack is known to be one of the most lethal attacks in traditional network architecture. In this attack, the attacker uses botnets to overwhelm network resources. Botnets can be randomly compromised computers or IoT devices that are used to generate excessive traffic towards the victim, and as a result, legitimate users cannot access the services. In this research, software-defined networking (SDN) has been suggested as a solution to fight DDoS attacks. SDN uses the idea o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 41 publications
0
8
0
Order By: Relevance
“…Based on the popular sFlow and OpenFlow protocols, it is a fabric controller with an open, standards-based JavaScript development environment. Mitigation script logs (Batool et al, 2022) are once the attack has been stopped. When the attack is stopped and the mitigation block is activated, it resumes its normal course.…”
Section: Methodsmentioning
confidence: 99%
“…Based on the popular sFlow and OpenFlow protocols, it is a fabric controller with an open, standards-based JavaScript development environment. Mitigation script logs (Batool et al, 2022) are once the attack has been stopped. When the attack is stopped and the mitigation block is activated, it resumes its normal course.…”
Section: Methodsmentioning
confidence: 99%
“…This process is known as the connection establishment method of TCP protocol or three-way handshaking. The Server listens for client connection requests before a connection is established [ 28 ]. In an SDN network, for example, the OpenFlow switch must request the controller forwarding rules for each new connection it receives from the clients.…”
Section: Hld-ddosdn Generationmentioning
confidence: 99%
“…Secondly, there is no identi cation of the path followed by the attack, which could be necessary for the mitigation process later. In [26] entropybased solution is used for mitigating TCP-syn ood attacks in three steps, i.e., entropy, standard deviation, and weighted moving average. This work has shown the signi cance of entropy-based solutions due to their lightweight properties in SDN controllers.…”
Section: Literature Reviewmentioning
confidence: 99%