2018
DOI: 10.1109/tifs.2018.2805600
|View full text |Cite
|
Sign up to set email alerts
|

Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
80
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 146 publications
(80 citation statements)
references
References 12 publications
0
80
0
Order By: Relevance
“…Thus, we build another long processing chain to better explore the hijacking probability for different positions of the malicious application and the target application. Specifically, we apply four applications, i.e., DoS Detection [38], ARP Proxy [39], Hub [40], and Learning Switch [41], to form the processing chain. Figure 8 shows the two longest processing chains that contain eight SDN applications in total.…”
Section: A Experiments Setupmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, we build another long processing chain to better explore the hijacking probability for different positions of the malicious application and the target application. Specifically, we apply four applications, i.e., DoS Detection [38], ARP Proxy [39], Hub [40], and Learning Switch [41], to form the processing chain. Figure 8 shows the two longest processing chains that contain eight SDN applications in total.…”
Section: A Experiments Setupmentioning
confidence: 99%
“…The functionalities of these applications range from basic network service, such as providing network topology with Topology Manager, and network optimizations, such as balancing flows across multiple servers with Load Balancer, to advanced network security enhancement, such as detecting malicious flows with DoS Detection. For their detailed functionality description, we refer the readers to the links [34], [35], [36], [37], [38], [39], [40], [41]. In our experiments, we focus on the hijacking probability and attack effectiveness with the two longest processing chains.…”
Section: A Experiments Setupmentioning
confidence: 99%
“…Zheng et al proposed a technique named reinforcing anti-DDoS action in realtime (RADAR), a real-time defense application built on commercial off-the-shelf (COTS) unmodified SDN switches to detect and defend against various flooding attacks through adaptive correlation analysis [39]. Attacks are detected by identifying certain attack features in suspicious flows.…”
Section: Reinforcing Anti-ddos Actions In Realtime (Radar)mentioning
confidence: 99%
“…All the modules will cooperate to complete a series of tasks such as authorization, classification, and so on. Zheng et al propose Reinforcing Anti‐DDoS Actions in Realtime (RADAR) to detect and throttle DDoS attacks via adaptive correlation analysis built upon unmodified commercial off‐the‐shelf SDN switches. It is an efficient system to defend against a wide range of flooding‐based DDoS attacks, eg, link flooding, SYN flooding, and UDP‐based amplification attacks while requiring neither modifications in SDN switches/protocols nor new appliances.…”
Section: Related Workmentioning
confidence: 99%