Abstract
Software-defined networks (SDN) offer a centralized administration programming interface to govern the network infrastructure. It overtook conventional networks by creating a configurable link between the control and data planes. As the logic of the SDN environment completely depends on the control plane, the controller is vulnerable to many security attacks. To degrade the network’s performance, attackers will saturate the control plane resources. TCP flooding is a serious threat in which attackers restrict legitimate users from accessing the network resources. To handle this problem, we propose a TCP Flooding Attack Detection (TFAD) technique using proxy-based and Machine-Learning-based mechanisms (ML-TFAD). The TFAD technique contains two proxies, SYN and ACK: the former defends against TCP SYN flood attacks and the latter against TCP ACK flood attacks. The ML-TFAD module uses the C4.5 decision tree algorithm, which detects SYN flood attacks before reaching the targeted server. The CAIDA 2007 DDoS dataset is involved in training the proposed model. The proposed mechanisms help remove half-opened connections from the server queue at the earliest to accommodate TCP connection requests from legitimate users.
Similar content being viewed by others
Data Availability
Not applicable
References
Kreutz, D., Ramos, F.M., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14–76 (2014)
Bawany, N.Z., Shamsi, J.A., Salah, K.: DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arab. J. Sci. Eng. 42(2), 425–441 (2017)
Netscout Threat report on DDoS attacks. https://www.netscout.com/threatreport. accessed 24 Feb 2022
Akamai Internet Security DDoS Atatack report. https://www.akamai.com/us/en/resources/our-thinking/state-of-the-internet-report/global-state-of-the-internet-security-ddos-attack-reports.jsp? accessed 24 Feb 2022
Radware security solutions DDOS attckreport. https://www.radware.com/solutions/security/ accessed 02 June 2021
Javadpour, A., Wang, G.: cTMvSDN: improving resource management using combination of Markov-process and TDMA in software-defined networking. J. Supercomput. 78, 3477–3499 (2022). https://doi.org/10.1007/s11227-021-03871-9
Javadpour, A., Wang, G., Rezaei, S.: Resource management in a peer to peer cloud network for IoT. Wirel. Pers. Commun. 115, 2471–2488 (2020). https://doi.org/10.1007/s11277-020-07691-7
Sudar, K.M., Deepalakshmi, P.: Comparative study on IDS using machine learning approaches for software defined networks. Int. J. Intell. Enterp. 7(1–3), 15–27 (2020)
Ravi, N., Shalinie, S.M., Lal, C., Conti, M.: AEGIS: detection and mitigation of TCP SYN flood on SDN controller. IEEE Trans. Netw. Serv. Manage. 18(1), 745–759 (2020)
Javadpour, A.: Providing a way to create balance between reliability and delays in SDN networks by using the appropriate placement of controllers. Wirel. Pers. Commun. 110, 1057–1071 (2020). https://doi.org/10.1007/s11277-019-06773-5
Mirmohseni, S.M., Tang, C., Javadpour, A.: Using Markov learning utilization model for resource allocation in cloud of thing network. Wirel. Pers. Commun. 115, 653–677 (2020). https://doi.org/10.1007/s11277-020-07591-w
Sahi, A., Lai, D., Li, Y., Diykh, M.: An efficient DDoS TCP flood attack detection and prevention system in a cloud environment. IEEE Access 5, 6036–6048 (2017)
Scapy-Packet Crafting Tool. https://scapy.net/ accessed 24 Feb 2022
Dang, V.T., Huong, T.T., Thanh, N.H., Nam, P.N., Thanh, N.N., Marshall, A.: SDN-based SYN Proxy-a solution to enhance performance of attack mitigation under TCP SYN flood. Comput. J. 62(4), 518–534 (2019)
Kumar, P., Tripathi, M., Nehra, A., Conti, M., Lal, C.: SAFETY: early detection and mitigation of TCP SYN flood utilizing entropy in SDN. IEEE Trans. Netw. Serv. Manage. 15(4), 1545–1559 (2018)
Sudar, K.M., Deepalakshmi, P.: A two level security mechanism to detect a DDoS flooding attack in software-defined networks using entropy-based and C4.5 technique. J. High Speed Netw. 26, 1–22 (2020)
Oo, N.H., Maw, A.H.: Effective detection and mitigation of SYN flooding attack in SDN. In: 2019 19th International Symposium on Communications and Information Technologies (ISCIT) (pp. 300–305). IEEE (2019, September)
Hong, K., Kim, Y., Choi, H., Park, J.: SDN-assisted slow HTTP DDoS attack defense method. IEEE Commun. Lett. 22(4), 688–691 (2017)
Hussain, K., Syed Jawad, H., Veena, D., Muhammad, N., Muhammad Awai, A.: An adaptive SYN flooding attack mitigation in DDOS environment. Int. J. Comput. Sci. Netw. Security (IJCSNS) 16, 27–33 (2016)
Haris, S.H.C., Ahmad, R.B., Ghan, M.A.H.A.: Detecting TCP SYN flood attack based on anomaly detectin. In: Network Applications Protocols and Services (NETAPPS), 2010 Second International Conference on IEEE, pp. 240–244 (2010)
Pai, K., Bha, A.: Detection and performance evaluation of DoS/DDoS attacks using SYN flooding attacks. Int. J. Comput. Appl. 975, 1–4 (2014)
Divakaran, D.M., Murthy, H.A., Gonsalves, T.A.: Detection of SYN flooding attacks using linear prediction analysis. In 2006 14th IEEE International Conference on Networks (Vol. 1, pp. 1–6). IEEE (2006, September)
Mohammadi, R., Javidan, R., Conti, M.: Slicots: an SDN-based lightweight countermeasure for TCPSYN flooding attacks. IEEE Trans. Netw. Serv. Manage. 14(2), 487–497 (2017)
Chen, K.Y., Junuthula, A.R., Siddhrau, I.K., Xu, Y., Chao, H.J.: SDNShield: towards more comprehensive defense against DDoS attacks on SDN control plane. In: IEEE Conference on Communications and Network Security (CNS), pp. 28–36 (2016)
Tuan, N.N., Hung, P.H., Nghia, N.D., Tho, N.V., Phan, T.V., Thanh, N.H.: A DDoS attack mitigation scheme in ISP networks using machine learning based on SDN. Electronics 9(3), 413 (2020)
Swami, R., Dave, M., Ranga, V.: Detection and analysis of TCP-SYN DDoS attack in software-defined networking. Wirel. Pers. Commun. 84, 1–23 (2021)
Cui, J., Wang, M., Luo, Y., Zhong, H.: DDoS detection and defense mechanism based on cognitive-inspired computing in SDN. Futur. Gener. Comput. Syst. 97, 275–283 (2019)
Mininet Team Mininet: An instant virtual network on your laptop (or other PC). http://mininet.org/ accessed 24 Feb 2022
Sikos, L.F.: Packet analysis for network forensics: a comprehensive survey. Forensic Sci. Int. 32, 200892 (2020). https://doi.org/10.1016/j.fsidi.2019.200892
BONESI A Network Stress Testing Application. https://github.com/Markus-Go/bonesi/ accessed 24 Feb 2022
Wireshark-Network Packet Analyzer tool. https://www.wireshark.org/ accessed 24 Feb 2022
CAIDA 2007 Dataset. https://www.caida.org/data/passive/ddos-20070804_dataset.xmlaccessed 24 Feb 2022
Sreeram, I., Vuppala, V.P.K.: HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm. Appl. Comput. Inf. 15(1), 59–66 (2019)
Sharma, V.K., Kumar, M.: Adaptive congestion control scheme in mobile ad-hoc networks. Peer-to-Peer Netw. Appl. 10(3), 633–657 (2017)
Hu, D., Hong, P., Chen, Y.: FADM: DDoS flooding attack detection and mitigation system in software-defined networking. In GLOBECOM 2017-2017 IEEE Global Communications Conference (pp. 1–7). IEEE (2017)
Sharma, V.K., Verma, L.P., Kumar, M.: CL-ADSP: cross-Layer adaptive data scheduling policy in mobile ad-hoc networks. Futur. Gener. Comput. Syst. 97, 530–563 (2019)
Sharma, V.K., Verma, L.P., Kumar, M., Naha, R.K., Mahanti, A.: A-CAFDSP: an adaptive-congestion aware Fibonacci sequence based data scheduling policy. Comput. Commun. 158, 141–165 (2020)
Hsu, F.H., Lee, C.H., Wang, C.Y., Hung, R.Y., Zhuang, Y.: DDoS flood and destination service changing sensor. Sensors 21(6), 1980 (2021)
Srinivasu, P.N., Bhoi, A.K., Nayak, S.R., Bhutta, M.R., Woźniak, M.: Blockchain technology for secured healthcare data communication among the non-terminal nodes in IoT architecture in 5G network. Electronics 10(12), 1437 (2021)
Funding
The authors did not receive support from any organization for the submitted work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest.
There is no conflict of interest.
Ethical approval
We did not use animals and Human participants in the study reported in this work
Informed consent
For this type of study informed consent is not required.
Consent for publication
For this type of study consent for publication is not required.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sudar, K.M., Deepalakshmi, P., Singh, A. et al. TFAD: TCP flooding attack detection in software-defined networking using proxy-based and machine learning-based mechanisms. Cluster Comput 26, 1461–1477 (2023). https://doi.org/10.1007/s10586-022-03666-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-022-03666-4