Abstract

Recent trends have shown a migration of software from local machines to server-based services. These service-based networks depend on high up-times and heavy resistance in order to compete in the market. Along with this growth, denial of service attacks have equally grown. Defending against these at

Highlights

  • Networks are implemented with the core ideas of network integrity, confidentiality, and availability

  • As we observed that current solutions to denial of service attacks through the use of load balancing and buffer limits for the networks fall short of delivering quick identification and mitigation of attacking hosts [1][3], we focused our work to contribute a more rapid solution to denial of service attack compared to the previously stated solutions as well as lower processing workloads for the virtual network devices

  • We define our Software-defined networking Denial of service Mitigation (SDM) problem that our work aims to solve as follows: Given a network under DoS attack, our scheme seeks to detect and mitigate any DoS attack taking into consideration the improvement of the efficiency and the speed of mitigating denial of service attacks

Read more

Summary

Introduction

Networks are implemented with the core ideas of network integrity, confidentiality, and availability. The DoS attack in general seeks to bring down network services by flooding a service with dummy traffic with the goal of overloading the service, bring it down and affect its availability. This work serves to implement a SDN that uses the adaptability and programmability features to defend against different DoS attacks. This section will consist of detailed definitions for both the simulations and technologies used as well denial of service attacks.

Related Works
Motivations
Problem Statement
Software-defined networking Denial of service Mitigation
Mitigating Single-Host Denial of Service Attacks
Update flow table dropping DoS flow
Update flow table dropping DDoS flow
Analysis and Performance Evaluation
Analysis and Evaluation of a Single-Host DoS Attack
Analysis and Evaluation of a Distributed DoS Attack
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.