A heterogeneous defense method using fuzzy decision making

Denial of service flood attacks are among the most common and powerful attacks which abuse the computational resources and the bandwidth of a network. In this paper, a heterogeneous defense method is proposed based on a combination of the Software Defined controller and fuzzy decision making. Numerical results show that the proposed method has a lower computational load and response time compared to the traditional methods centralized in the controller.

[1]  Yao Zheng,et al.  DDoS attack protection in the era of cloud computing and Software-Defined Networking , 2015, Comput. Networks.

[2]  Dan Schnackenberg,et al.  Statistical approaches to DDoS attack detection and response , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[3]  Nick McKeown,et al.  OpenFlow: enabling innovation in campus networks , 2008, CCRV.

[4]  Jugal K. Kalita,et al.  An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection , 2015, Pattern Recognit. Lett..

[5]  Rob Sherwood,et al.  On Controller Performance in Software-Defined Networks , 2012, Hot-ICE.

[6]  Richard E. Overill,et al.  Detection of known and unknown DDoS attacks using Artificial Neural Networks , 2016, Neurocomputing.

[7]  Markus G. Kuhn,et al.  Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[8]  Laura Galluccio,et al.  OPERETTA: An OPEnflow-based REmedy to mitigate TCP SYNFLOOD Attacks against web servers , 2015, Comput. Networks.

[9]  Aniruddha S. Gokhale,et al.  Software-Defined Networking: Challenges and research opportunities for Future Internet , 2014, Comput. Networks.

[10]  Kotagiri Ramamohanarao,et al.  Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.

[11]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[12]  Yashar Ganjali,et al.  On scalability of software-defined networking , 2013, IEEE Communications Magazine.

[13]  Guido Appenzeller,et al.  Maturing of OpenFlow and Software-defined Networking through deployments , 2014, Comput. Networks.

[14]  Marina Papatriantafilou,et al.  STONE: A streaming DDoS defense framework , 2015, Expert Syst. Appl..

[15]  Dave Larson Distributed denial of service attacks - holding back the flood , 2016, Netw. Secur..

[16]  Stefan Savage,et al.  Inferring Internet denial-of-service activity , 2001, TOCS.

[17]  Ruimin Hu,et al.  A novel SYN Cookie method for TCP layer DDoS attack , 2009, 2009 International Conference on Future BioMedical Information Engineering (FBIE).

[18]  Yasir Malik,et al.  Collaborative Peer to Peer Defense Mechanism for DDoS Attacks , 2011, ANT/MobiWIS.

[19]  Ki Hoon Kwon,et al.  DDoS attack detection method using cluster analysis , 2008, Expert Syst. Appl..

[20]  Rodrigo Braga,et al.  Lightweight DDoS flooding attack detection using NOX/OpenFlow , 2010, IEEE Local Computer Network Conference.

[21]  Ehab Al-Shaer,et al.  Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.

[22]  Wenjuan Li,et al.  A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures , 2016, J. Netw. Comput. Appl..

[23]  Georgios Kambourakis,et al.  An efficient and easily deployable method for dealing with DoS in SIP services , 2015, Comput. Commun..

[24]  Jonathan Lemon,et al.  Resisting SYN Flood DoS Attacks with a SYN Cache , 2002, BSDCon.

[25]  Mohamed Cheriet,et al.  OpenFlow-based in-network Layer-2 adaptive multipath aggregation in data centers , 2015, Comput. Commun..

[26]  Jun Bi,et al.  Source address validation solution with OpenFlow/NOX architecture , 2011, 2011 19th IEEE International Conference on Network Protocols.

[27]  Jin Li,et al.  DDoS attack detection based on neural network , 2010, 2010 2nd International Symposium on Aware Computing.

[28]  F. Richard Yu,et al.  Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[29]  Kim-Kwang Raymond Choo,et al.  Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework , 2016, J. Netw. Comput. Appl..

[30]  Arsalan Tavakoli,et al.  Exploring a Centralized/Distributed Hybrid Routing Protocol for Low Power Wireless Networks and Large-Scale Datacenters , 2009 .

[31]  Jian Zhu,et al.  SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks , 2016, J. Netw. Comput. Appl..

[32]  Paul Goransson,et al.  Software Defined Networks: A Comprehensive Approach , 2014 .

[33]  F. Richard Yu,et al.  Distributed denial of service attacks in software-defined networking with cloud computing , 2015, IEEE Communications Magazine.

[34]  Catherine A. Meadows,et al.  A formal framework and evaluation method for network denial of service , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.

[35]  Mabry Tyson,et al.  A security enforcement kernel for OpenFlow networks , 2012, HotSDN '12.

[36]  Zhiyang Li,et al.  Detecting DDoS attacks against data center with correlation analysis , 2015, Comput. Commun..