RETRACTED ARTICLE: Bayesian trust analysis of flooding attacks in distributed software defined networking nodes

As the networking infrastructure is becoming complex, there is a parallel increase in the networking scenario to become more vulnerable to various types of sophisticated malicious attacks. This leads to the data and information loss. The most feasible way to reduce the vulnerable and malicious attacks is by evaluating trust of the interacting agents in a network. The primary objective of this paper is to analyze the flooding attacks caused due to the communication protocols like TCP and UDP in software defined spine leaf topology. The trust analysis is done using Bayesian networks for a reliable communication network. The probability and the causal effect of the denial of service in the proposed distributed networking scenario are reasoned out. The trust analysis will help to increase the confidence over a dedicated communication at the time of malicious attack over the distributed network. This analysis will enable the software defined control plane to make a crucial and needed decision over its communication with other nodes during compromised security attack through communication protocols.

[1]  Audun Jøsang,et al.  Subjective Logic: A Formalism for Reasoning Under Uncertainty , 2016 .

[2]  Audun Jøsang,et al.  Advanced Features in Bayesian Reputation Systems , 2009, TrustBus.

[3]  Stéphane Betgé-Brezetz,et al.  End-to-end privacy policy enforcement in cloud infrastructure , 2013, 2013 IEEE 2nd International Conference on Cloud Networking (CloudNet).

[4]  Raimo Kantola,et al.  Security for Future Software Defined Mobile Networks , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.

[5]  Audun Jøsang,et al.  Predictive Reasoning in Subjective Bayesian Networks , 2016, NIP.

[6]  Rob Sherwood,et al.  The controller placement problem , 2012, HotSDN@SIGCOMM.

[7]  Abdelkamel Tari,et al.  A self-managing volatile key scheme for wireless sensor networks , 2019, J. Ambient Intell. Humaniz. Comput..

[8]  Kotagiri Ramamohanarao,et al.  Protection from distributed denial of service attacks using history-based IP filtering , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[9]  Fernando M. V. Ramos,et al.  Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.

[10]  Stéphane Betgé-Brezetz,et al.  SDN-based Trusted Path Control , 2014, 2014 International Conference and Workshop on the Network of the Future (NOF).

[11]  Thyaga Nandagopal,et al.  Coping with link failures in centralized control plane architectures , 2010, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010).

[12]  T. Rama Rao,et al.  Security and privacy attacks during data communication in Software Defined Mobile Clouds , 2020, Comput. Commun..

[13]  Fernando M. V. Ramos,et al.  On the Feasibility of a Consistent and Fault-Tolerant Data Store for SDNs , 2013, 2013 Second European Workshop on Software Defined Networks.

[14]  F. Richard Yu,et al.  Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[15]  Audun Jøsang Belief Mosaics of Subjective Opinions , 2019, 2019 22th International Conference on Information Fusion (FUSION).

[16]  Melvin Fitting,et al.  Kleene's Three Valued Logics and Their Children , 1994, Fundam. Informaticae.

[17]  Sajal K. Das,et al.  Leveraging the robustness of genetic networks: a case study on bio-inspired wireless sensor network topologies , 2014, J. Ambient Intell. Humaniz. Comput..

[18]  Nicola Ciulli,et al.  Towards a Distributed SDN Control: Inter-Platform Signaling among Flow Processing Platforms , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).

[19]  Audun Jøsang,et al.  Subjective Logic , 2016, Artificial Intelligence: Foundations, Theory, and Algorithms.

[20]  Peng Dan,et al.  Research and implementation of the SDN resources transaction process based on trust mechanism , 2016, China Communications.

[21]  Luciano Paschoal Gaspary,et al.  Survivor: An enhanced controller placement strategy for improving SDN survivability , 2014, 2014 IEEE Global Communications Conference.