Abstract
DDoS attacks are a severe hazard for the network. Although researchers are putting their efforts to secure the network, the attackers are upgrading themselves at a rapid pace to breach the security of the network. By separating the control plane and data plane, researchers introduced a new network architecture known as a software-defined network (SDN). However, this architecture is more flexible, dynamic, and easy to configure than traditional IP-based networks, but it has its vulnerabilities, making it a victim of potent DDoS attacks. This paper presents the basic architecture of the SDN and the impacts of unique DDoS attacks on this architecture which would be helpful to understand the basic idea of SDN and devise a robust security solution by keeping in mind all impacts of distributed denial of service attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Feily, M., Shahrestani, A., Ramadass, S.: A survey of botnet and botnet detection. In: 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp. 268–273. IEEE (2009)
Abu Rajab, M., Zarfoss, J., Monrose, F., Terzis, A.: A multifaceted approach to understanding the botnet phenomenon. In: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, pp. 41–52 (2006)
Saha, B., Gairola, A.: Botnet: an overview. In: CERT-In White Paper, CIWP-2005-05, vol. 240 (2005)
Douligeris, C., Serpanos, D.N.: Network Security: Current Status and Future Directions. Wiley, New York (2007)
Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Network 8(3), 26–41 (1994)
Kreutz, D., Ramos, F.M., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14–76 (2014)
Benson, T., Akella, A., Maltz, D.A.: Unraveling the complexity of network management. In: NSDI, pp. 335–348 (2009)
Singh, J., Behal, S.: Detection and mitigation of DDoS attacks in SDN: a comprehensive review, research challenges and future directions. Computer Sci. Rev. 37, 100279 (2020)
Ahmad, I., Namal, S., Ylianttila, M., Gurtov, A.: Security in software defined networks: a survey. IEEE Commun. Surv. Tutor. 17(4), 2317–2346 (2015)
Fonseca, P., Bennesby, R., Mota, E., Passito, A.: A replication component for resilient openflow-based networking. In: IEEE Network Operations and Management Symposium, pp. 933–939. IEEE (2012)
Shin, S., Gu, G.: Attacking software-defined networks: a first feasibility study. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp. 165–166 (2013)
Uppal, H., Brandon, D.: Openflow based load balancing. In: CSE561: Networking Project Report, University of Washington (2010)
Voellmy, A., Kim, H., Feamster, N.: Procera: a language for high-level reactive network control. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, pp. 43–48 (2012)
Gude, N., Koponen, T., Pettit, J., Pfaff, B., Casado, M., McKeown, N., Shenker, S.: NOX: towards an operating system for networks. ACM SIGCOMM Computer Commun. Rev. 38(3), 105–110 (2008)
Dhamecha, K., Trivedi, B.: SDN issues—a survey. Int. J. Comput. Appl. 73(18) (2013)
OpenFlow: https://www.opennetworking.org/wp-content/uploads/2014/10/openflow-switch-v1.5.1.pdf. Accessed on 11 Dec 2021
Voellmy, A., Hudak, P.: Nettle: taking the sting out of programming network routers. In: International Symposium on Practical Aspects of Declarative Languages, pp. 235–249. Springer, Berlin (2011)
Stallings, W.: Software-defined networks and openflow. Internet protocol J. 16(1), 2–14 (2013)
Hu, F., Hao, Q., Bao, K.: A survey on software-defined network and openflow: from concept to implementation. IEEE Commun. Surv. Tutor. 16(4), 2181–2206 (2014)
Ubale, T., Jain, A.K.: Survey on DDoS attack techniques and solutions in software-defined network. In: Handbook of Computer Networks and Cyber Security, pp. 389–419. Springer, Berlin (2020)
Parashar, M., Poonia, A., Satish, K.: A survey of attacks and their mitigations in software defined networks. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–8. IEEE (2019)
Akhunzada, A., Ahmed, E., Gani, A., Khan, M.K., Imran, M., Guizani, S.: Securing software defined networks: taxonomy, requirements, and open issues. IEEE Commun. Mag. 53(4), 36–44 (2015)
Dover, J.M.: A denial of service attack against the open floodlight SDN controller. Technical Report, Dover Networks (2013)
Kandoi, R., Antikainen, M.: Denial-of-service attacks in openflow SDN networks. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 1322–1326. IEEE (2015)
Spitznagel, E., Taylor, D., Turner, J.: Packet classification using extended TCAMs. In: 11th IEEE International Conference on Network Protocols, 2003. Proceedings, pp. 120–131. IEEE (2003)
O. S. Specifications, 1.5. 1, Open Networking Foundation, vol. 3 (2015)
Zhang, P., Wang, H., Hu, C., Lin, C.: On denial of service attacks in software defined networks. IEEE Network 30(6), 28–33 (2016)
Yao, G., Bi, J., Guo, L.: On the cascading failures of multi-controllers in software defined networks. In: 2013 21st IEEE International Conference on Network Protocols (ICNP), pp. 1–2. IEEE (2013)
Ma, D., Xu, Z., Lin, D.: Defending blind DDoS attack on SDN based on moving target defense. In: International Conference on Security and Privacy in Communication Networks, pp. 463–480. Springer, Berlin (2014)
Kang, M.S., Lee, S.B., Gligor, V.D.: The crossfire attack. In: IEEE Symposium on Security and Privacy, pp. 127–141. IEEE (2013)
Studer, A., Perrig, A.: The coremelt attack. In: European Symposium on Research in Computer Security, pp. 37–52. Springer, Berlin (2009)
Conti, M., Gangwal, A., Gaur, M.S.: A comprehensive and effective mechanism for ddos detection in SDN. In: 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 1–8. IEEE (2017)
Pascoal, T.A., Dantas, Y.G., Fonseca, I.E., Nigam, V.: Slow TCAM exhaustion DDoS attack. In: IFIP International Conference on ICT Systems Security and Privacy Protection, pp. 17–31. Springer, Berlin (2017)
Alharbi, T., Layeghy, S., Portmann, M.: Experimental evaluation of the impact of DoS attacks in SDN. In: 27th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–6. IEEE (2017)
Dabbagh, M., Hamdaoui, B., Guizani, M., Rayes, A.: Software-defined networking security: pros and cons. IEEE Commun. Mag. 53(6), 73–79 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Singh, J., Behal, S. (2023). Impacts of DDoS Attacks in Software-Defined Networks. In: Choudrie, J., Mahalle, P., Perumal, T., Joshi, A. (eds) ICT with Intelligent Applications. Smart Innovation, Systems and Technologies, vol 311. Springer, Singapore. https://doi.org/10.1007/978-981-19-3571-8_14
Download citation
DOI: https://doi.org/10.1007/978-981-19-3571-8_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-3570-1
Online ISBN: 978-981-19-3571-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)