[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Impacts of DDoS Attacks in Software-Defined Networks

  • Conference paper
  • First Online:
ICT with Intelligent Applications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 311))

  • 529 Accesses

Abstract

DDoS attacks are a severe hazard for the network. Although researchers are putting their efforts to secure the network, the attackers are upgrading themselves at a rapid pace to breach the security of the network. By separating the control plane and data plane, researchers introduced a new network architecture known as a software-defined network (SDN). However, this architecture is more flexible, dynamic, and easy to configure than traditional IP-based networks, but it has its vulnerabilities, making it a victim of potent DDoS attacks. This paper presents the basic architecture of the SDN and the impacts of unique DDoS attacks on this architecture which would be helpful to understand the basic idea of SDN and devise a robust security solution by keeping in mind all impacts of distributed denial of service attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 143.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Feily, M., Shahrestani, A., Ramadass, S.: A survey of botnet and botnet detection. In: 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp. 268–273. IEEE (2009)

    Google Scholar 

  2. Abu Rajab, M., Zarfoss, J., Monrose, F., Terzis, A.: A multifaceted approach to understanding the botnet phenomenon. In: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, pp. 41–52 (2006)

    Google Scholar 

  3. Saha, B., Gairola, A.: Botnet: an overview. In: CERT-In White Paper, CIWP-2005-05, vol. 240 (2005)

    Google Scholar 

  4. Douligeris, C., Serpanos, D.N.: Network Security: Current Status and Future Directions. Wiley, New York (2007)

    Google Scholar 

  5. Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Network 8(3), 26–41 (1994)

    Article  Google Scholar 

  6. Kreutz, D., Ramos, F.M., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14–76 (2014)

    Google Scholar 

  7. Benson, T., Akella, A., Maltz, D.A.: Unraveling the complexity of network management. In: NSDI, pp. 335–348 (2009)

    Google Scholar 

  8. Singh, J., Behal, S.: Detection and mitigation of DDoS attacks in SDN: a comprehensive review, research challenges and future directions. Computer Sci. Rev. 37, 100279 (2020)

    Google Scholar 

  9. Ahmad, I., Namal, S., Ylianttila, M., Gurtov, A.: Security in software defined networks: a survey. IEEE Commun. Surv. Tutor. 17(4), 2317–2346 (2015)

    Article  Google Scholar 

  10. Fonseca, P., Bennesby, R., Mota, E., Passito, A.: A replication component for resilient openflow-based networking. In: IEEE Network Operations and Management Symposium, pp. 933–939. IEEE (2012)

    Google Scholar 

  11. Shin, S., Gu, G.: Attacking software-defined networks: a first feasibility study. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp. 165–166 (2013)

    Google Scholar 

  12. Uppal, H., Brandon, D.: Openflow based load balancing. In: CSE561: Networking Project Report, University of Washington (2010)

    Google Scholar 

  13. Voellmy, A., Kim, H., Feamster, N.: Procera: a language for high-level reactive network control. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, pp. 43–48 (2012)

    Google Scholar 

  14. Gude, N., Koponen, T., Pettit, J., Pfaff, B., Casado, M., McKeown, N., Shenker, S.: NOX: towards an operating system for networks. ACM SIGCOMM Computer Commun. Rev. 38(3), 105–110 (2008)

    Article  Google Scholar 

  15. Dhamecha, K., Trivedi, B.: SDN issues—a survey. Int. J. Comput. Appl. 73(18) (2013)

    Google Scholar 

  16. OpenFlow: https://www.opennetworking.org/wp-content/uploads/2014/10/openflow-switch-v1.5.1.pdf. Accessed on 11 Dec 2021

  17. Voellmy, A., Hudak, P.: Nettle: taking the sting out of programming network routers. In: International Symposium on Practical Aspects of Declarative Languages, pp. 235–249. Springer, Berlin (2011)

    Google Scholar 

  18. Stallings, W.: Software-defined networks and openflow. Internet protocol J. 16(1), 2–14 (2013)

    MathSciNet  Google Scholar 

  19. Hu, F., Hao, Q., Bao, K.: A survey on software-defined network and openflow: from concept to implementation. IEEE Commun. Surv. Tutor. 16(4), 2181–2206 (2014)

    Article  Google Scholar 

  20. Ubale, T., Jain, A.K.: Survey on DDoS attack techniques and solutions in software-defined network. In: Handbook of Computer Networks and Cyber Security, pp. 389–419. Springer, Berlin (2020)

    Google Scholar 

  21. Parashar, M., Poonia, A., Satish, K.: A survey of attacks and their mitigations in software defined networks. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–8. IEEE (2019)

    Google Scholar 

  22. Akhunzada, A., Ahmed, E., Gani, A., Khan, M.K., Imran, M., Guizani, S.: Securing software defined networks: taxonomy, requirements, and open issues. IEEE Commun. Mag. 53(4), 36–44 (2015)

    Article  Google Scholar 

  23. Dover, J.M.: A denial of service attack against the open floodlight SDN controller. Technical Report, Dover Networks (2013)

    Google Scholar 

  24. Kandoi, R., Antikainen, M.: Denial-of-service attacks in openflow SDN networks. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 1322–1326. IEEE (2015)

    Google Scholar 

  25. Spitznagel, E., Taylor, D., Turner, J.: Packet classification using extended TCAMs. In: 11th IEEE International Conference on Network Protocols, 2003. Proceedings, pp. 120–131. IEEE (2003)

    Google Scholar 

  26. O. S. Specifications, 1.5. 1, Open Networking Foundation, vol. 3 (2015)

    Google Scholar 

  27. Zhang, P., Wang, H., Hu, C., Lin, C.: On denial of service attacks in software defined networks. IEEE Network 30(6), 28–33 (2016)

    Article  Google Scholar 

  28. Yao, G., Bi, J., Guo, L.: On the cascading failures of multi-controllers in software defined networks. In: 2013 21st IEEE International Conference on Network Protocols (ICNP), pp. 1–2. IEEE (2013)

    Google Scholar 

  29. Ma, D., Xu, Z., Lin, D.: Defending blind DDoS attack on SDN based on moving target defense. In: International Conference on Security and Privacy in Communication Networks, pp. 463–480. Springer, Berlin (2014)

    Google Scholar 

  30. Kang, M.S., Lee, S.B., Gligor, V.D.: The crossfire attack. In: IEEE Symposium on Security and Privacy, pp. 127–141. IEEE (2013)

    Google Scholar 

  31. Studer, A., Perrig, A.: The coremelt attack. In: European Symposium on Research in Computer Security, pp. 37–52. Springer, Berlin (2009)

    Google Scholar 

  32. Conti, M., Gangwal, A., Gaur, M.S.: A comprehensive and effective mechanism for ddos detection in SDN. In: 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 1–8. IEEE (2017)

    Google Scholar 

  33. Pascoal, T.A., Dantas, Y.G., Fonseca, I.E., Nigam, V.: Slow TCAM exhaustion DDoS attack. In: IFIP International Conference on ICT Systems Security and Privacy Protection, pp. 17–31. Springer, Berlin (2017)

    Google Scholar 

  34. Alharbi, T., Layeghy, S., Portmann, M.: Experimental evaluation of the impact of DoS attacks in SDN. In: 27th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1–6. IEEE (2017)

    Google Scholar 

  35. Dabbagh, M., Hamdaoui, B., Guizani, M., Rayes, A.: Software-defined networking security: pros and cons. IEEE Commun. Mag. 53(6), 73–79 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jagdeep Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, J., Behal, S. (2023). Impacts of DDoS Attacks in Software-Defined Networks. In: Choudrie, J., Mahalle, P., Perumal, T., Joshi, A. (eds) ICT with Intelligent Applications. Smart Innovation, Systems and Technologies, vol 311. Springer, Singapore. https://doi.org/10.1007/978-981-19-3571-8_14

Download citation

Publish with us

Policies and ethics