The Presentation of a New Defense Framework Against the Distributed Denial of Service Attacks Using the Software Defined Network

Document Type : Original Article

Authors

Cyberspace Research Institute, Shahid Beheshti University, Tehran, Iran

Abstract

The lack of fixed infrastructure and centralized management in most cloud computing networks causes serious security threats. In the past few years, different approaches have been taken based on the distributed software defined network (SDN) to counterbalance these facing challenges. One of these common approaches is the SDN-based Pro Defense framework which uses the threshold intrusion detection to improve security. Although the distributed software defined network is weak in the face of distributed denial of service attacks, it expands the scalability of the above-mentioned framework and resolves the point-breaking problems. On the other hand, utilizing the threshold criterion escalates the network vulnerability. In this research, the author suggests a framework called distributed SDN-based multilayer Pro Defense framework and inspires the input filter or the digital signature, and the hash function based on the Merkle tree is employed as the intrusion prevention agent. This article resolves the threshold intrusion detection criteria by utilizing the Snort intrusion detection system. The results of implementing the suggested framework indicates that it has acceptable traffic control, intrusion detection speed, and stable security.

Keywords


  1. Zhou, L.; Haas, Z. “Securing Ad hoc Networks”; IEEE Network. 1399, 13, 6, 24-30.##
  2. Allam, H.; Nasser, N.; Rajan, A.; Ahmad, J. “A Critical Overview of Latest Challenges and Solutions of Mobile Cloud Computing” ; IEEE Trans. Second Int. Fog and Mobile Edge Computing 2017, 225-229.##
  3. Yan, Q.; Yu, F. R.; Gong, Q.; Li, J. “Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges”; IEEE Commun. Surveys & Tutorials 2015, 18, 602-622.##
  4. Bellavista, P.; Dolci, A.; Giannelli, C. “MANET-Oriented SDN: Motivations, Challenges, and a Solution Prototype”; IEEE 19th Symp. A World of Wireless, Mobile and Multimedia Networks 2018, 14-22.##
  5. Oktian, Y. E.; Lee, S.; Lee, H.; Lam, J. “Distributed SDN Controller System: A Survey on Design Choice”; Comput  Networks 121, 2017, 100-111.##
  6. Ghosekar, P.; Katkar, G.; Ghorpade, P. “Mobile Ad hoc Networking: Imperatives and Challenges”; IJCA Special Issue on MANETs 2010, 3, 153-158.##
  7. Alam, T. “Middleware Implementation in Cloud MANET Mobility Model for Internet of Smart Devices”; J. Comput. Sci. Network Secur. 2017, 17, 86-94.##
  8. Poularakis, K.; Iosifidis, G.; Tassiulas, L. “SDN-Enabled Tactical Ad hoc Networks: Extending Programmable Control to the Edge”; IEEE Commun. Mag. 2018, 56, 132-138.##
  9. Huang, X.; Du, X.; Song, B. “An Effective DDoS Defense Scheme for SDN”; IEEE Int. Conf. Commun. 2017, 1-6.##
  10. Yan, Q.; Gong, Q.; Yu, F. R. “Effective Software-Defined Networking Controller Scheduling Method to Mitigate DDoS Attacks”; Electron. Lett. 2017, 53, 469-471.##
  11. Mahmoudi, N. P.; Yazdian, V. A. “An Anomaly Detection System for Operational Threats in SCADA System”; J. Adv. Defence Sci. & 2016, 10, 209-218.##
  12. Javaheri, D.; Hosseinzadeh, M. “A Solution for Early Detection and Negation of Code and DLL Injection Attacks of Malwares”; Adv. Defence Sci.& Technol. 2020, 1, 393-406.##
  13. Guesmi, H.; Saidane, L. A. “Using SDN Approach to Secure Cloud Servers Against Flooding Based DDoS Attacks”; IEEE 25th Conf. Systems Eng. 2017, 309-315.##
  14. Ali, B. H. “Study the Effectiveness of Sequential Probability Ratio Test in Detection DDoS Attacks Against SDN”; Al-Iraqia J. Sci. Eng. Res. Jan. 2021, 46-53.##
  15. Dehkordi, A. B.; Soltanaghaei, M.; Boroujeni, F. Z. “The DDoS Attacks Detection Through Machine Learning and Statistical Methods in SDN”; J. Supercomput. 2021, 77, 2383-2415.##
  16. Singh, J.; Behal, S. “Detection and Mitigation of DDoS Attacks in SDN: A Comprehensive Review Research Challenges and Future Directions” ; Comput. Sci. Surv. 2020, 37, 100279.##
  17. Gadze, J. D.; Bamfo-Asante, A. A.; Agyemang, J. O.; Nunoo-Mensah, H.; Opare, K. A. B. “An Investigation Into the Application of Deep  Learning in the Detection and Mitigation of DDOS Attack on SDN Controllers”; Technologies 2021, 9, 14.##
  18. Shohani, R. B.; Mostafavi, ; Hakami, V. “A Statistical Model for Early Detection of DDoS Attacks on Random Targets in SDN”; Wireless Personal Communications
    2021, 1-22.##
  19. Bawany, N. Z.; Shamsi, J. A.; Salah, K. “DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions”; Arabian J. Sci. Eng. 2017, 42, 425-441.##
  20. Deshmukh, R. V.; Devadkar, K. K. “Understanding DDoS Attack & its Effect in Cloud Environment”; Proc. Compu. Sci. 2015, 49, 202-210.##
  21. Bhushan, K.; Gupta, B. B. “Distributed Denial of Service (DDoS) Attack Mitigation in Software Defined Network (SDN) - Based Cloud Computing Environment”; J. Ambient Intell. Hum. Comput. 2019, 10, 1985-1997.##
  22. Li, C.; Wu, Y.; Yuan, X.; Sun, Z.; Wang, W.; Li, X.; Gong, L. “Detection and Deep Learning in Based on Defense of DDoS Attack OpenFlow‐Based SDN”; Int. Commun. Syst.
    2018, 31,  3497.##
  23. Swami, R.; Dave, M.; Ranga, V. “ Software - Defined Networking - Based DDoS Defense Mechanisms” ; ACM Comput. Surveys 2019, 52, 1-36.##
  24. Chapade, S. S.; Pandey, K. U.; Bhade, D. S. “ Securing Cloud Servers Against Flooding Based DDoS Attacks” ; IEEE. Int. Conf. Syst. Network Technol. 2013, 524-528.##
  25. Tripathi, S.; Gupta, Almomani, A.; Mishra, A.; Veluru, S. “Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attack”; J. Inf. Security 2013, 4, 150.##