首页> 外文期刊>Concurrency, practice and experience >Detection and mitigation of UDP flooding attack in a multicontroller software defined network using secure flow management model
【24h】

Detection and mitigation of UDP flooding attack in a multicontroller software defined network using secure flow management model

机译:使用安全流管理模型检测和缓解多控制器软件定义网络中的UDP泛洪攻击

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Software-Defined Networking (SDN) simplifies the network management and provides a way tovirtualize, configure, and manage the network infrastructure centrally. The central managementhas been exhibited by reinforcing an SDN controller, which separates the network dataplane from the control functions and is responsible for managing the flows. DistributedDenial-of-Service (DDoS) attacks are the most threatening issue among many security attacks,and it makes the services unavailable in a network. The flow management done by thecontroller is disrupted when one or more malicious host flood User Datagram Protocol (UDP)packets in the network, focusing on exhausting the bandwidth of the controller. It results indegrading the performance of the controller, leading to control plane saturation. A Secure FlowManagement model (SFM), which dynamically identifies and mitigates the UDP flooding attackin a multicontroller SDN has been proposed. The proposed model is a practically applicabledefense mechanism against volumetric attack, and it tries to secure the control plane bandwidth.The SFM has been experimented as an extension of the RYU controller and has exploited theattack under different traffic scenarios. Further, an analysis has been made on response timeand the CPU utilization taken by the controller to recover from the DoS attack.
机译:软件定义网络(SDN)简化了网络管理,并提供了一种集中虚拟化,配置和管理网络基础结构的方法。通过增强SDN控制器来展示中央管理,该SDN控制器将网络数据平面与控制功能分开,并负责管理流。分布式拒绝服务(DDoS)攻击是许多安全攻击中最具威胁性的问题,它使网络中的服务不可用。当一个或多个恶意主机泛洪网络中的用户数据报协议(UDP)数据包时,将破坏控制器执行的流管理,从而集中精力耗尽控制器的带宽。这会降低控制器的性能,从而导致控制平面饱和。已经提出了一种安全流管理模型(SFM),该模型可以动态识别和缓解多控制器SDN中的UDP泛洪攻击。该模型是一种针对容量攻击的实用防御机制,它试图确保控制平面的带宽。SFM已经作为RYU控制器的扩展进行了实验,并在不同的流量情况下利用了攻击。此外,已经对响应时间和控制器从DoS攻击中恢复所需的CPU利用率进行了分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号