Professional Documents
Culture Documents
18i 1467 (Cyber) PDF
18i 1467 (Cyber) PDF
18i 1467 (Cyber) PDF
2
3
DDoS Attacks on SDN
Volumetric Attacks
Congest network by flooding e.g., UDP reflection attacks
Create congestion by consuming all available bandwidth
State-exhaustion Attacks
Types of protocol abuse e.g., TCP SYN flood
Application layer Attacks
Consume application resources e.g., HTTP GET, DNS query Floods
4
LITERATURE REVIEW
REF # Techniques Used Benefits/Results Limitations
[1] STRIDE Threat model Design a secure application for an SDN against but it causes delays for
DDOS attack. most users
Overhead imposed on
OpenFlow protocol can effectively mitigate it via
[3] entropy-based method usage of system
flow table modifications.
resources
Ref
Approach Efficiency Overhead Scalability Cost
.
entropy-based
[3] YES NO NO NO
method
7
References
[1]Jantila, Saksit, and Kornchawal Chaipah. "A security analysis of a hybrid
mechanism to defend DDoS attacks in SDN." Procedia Computer Science 86
(2016): 437-440.
[2]Sahay, Rishikesh, et al. "ArOMA: An SDN based autonomic DDoS
mitigation framework." Computers & Security 70 (2017): 482-499.
[3]Giotis, Kostas, et al. "Combining OpenFlow and sFlow for an effective
and scalable anomaly detection and mitigation mechanism on SDN
environments." Computer Networks 62 (2014): 122-136.
8
9