2020
DOI: 10.1007/s10586-020-03133-y
|View full text |Cite
|
Sign up to set email alerts
|

SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
16
0
1

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 100 publications
(28 citation statements)
references
References 29 publications
0
16
0
1
Order By: Relevance
“…In the third phase, attack detection is performed by comparing the values obtained from the previous phase with the table miss of the switches. Likewise, in terms of the early detection of DDoS, IDS countermeasures have been proposed, as in [151], a paper in which the authors use IDS Snort rules 5 and generate alarms in the event of detecting an attack.…”
Section: ) Stateless Data Planementioning
confidence: 99%
See 1 more Smart Citation
“…In the third phase, attack detection is performed by comparing the values obtained from the previous phase with the table miss of the switches. Likewise, in terms of the early detection of DDoS, IDS countermeasures have been proposed, as in [151], a paper in which the authors use IDS Snort rules 5 and generate alarms in the event of detecting an attack.…”
Section: ) Stateless Data Planementioning
confidence: 99%
“…Preconditions/ Postconditions [123] OFDP vulnerable BFD [125] Fake packet-in Switch port association with host MAC [135] Lack of packet-in message authentication Independent hardware implementation [136] DoS attacks Statistics [137] DoS attacks Protocol-independent defense framework [128] Spoofing and DoS attacks ACL / Machine learning [155] Spoofing Route and Dos attacks Traffic statistics [138] DDoS attacks Entropy [140] DoS attacks Entropy [141] DoS attacks Traffic statistics [142] DDoS attacks KPCA+GA+ Machine learning [143] DDoS attacks Blockchain [144] Lack of P2P traffic identification Machine learning [145] HTTP DDoS attacks Entropy + Hardware [149] DDoS attacks PCA [150] DDoS attacks EWMA [151] DDoS attacks Snort IDS [152] DDoS attacks Machine learning [153] DDoS attacks Deep Learning [154] DDoS attacks Entropy / Machine learning [156] Inference attacks Randomization of network attributes/ Rate-limiting + Proactive rules Rate-limiting + Proxy [160] DoS attacks (LDoS) Statistics / LRU [130] Inference attacks Routing aggregation / TCAM + SRAM [161], [162] Lack of network client access control EAP / RADIUS [163] Lack of network client access control EAPoL / RADIUS [164] DoS attacks Blockchain + Hardware [129] SYN flooding and ARP spoofing attacks SYN/ACK and ACK/FIN packets' ratio / P4 cache [165] Traffic overload / Latency App+P4 [166] Traffic overload Snort IPS + P4 [167] DDoS attacks P4+Entropy+FSM [168] Lack of link protection between stateful switches MACsec [169] States exchange between stateful switches Digital signatures [170] Link floo...…”
Section: ) Stateful Data Planementioning
confidence: 99%
“…In this sense, some of the tools that where analyzed in Section III have been used in the SDN scope. For example, Snort is applied for intrusion and Distributed DoS (DDoS) detection by different authors [122,124,125]. On the other hand, Suricata is also used for intrusion detection in SDN [127,128].…”
Section: Sdnmentioning
confidence: 99%
“…The range and mobility of UAVs are considered the second concern after energy consumption, and these are also assumed as the primary influencers for UAV network topologies [4,5].…”
mentioning
confidence: 99%
“…LEACH [3] is one of the notable WSN clustering routing protocols. In this sensor, nodes are collected in groups called clusters, and each one chooses one cluster as the leading cluster, called the cluster head, and the remaining nodes in a cluster are called cluster members [4]. Nodes collect information from their surroundings and relay it to their CH.…”
mentioning
confidence: 99%