You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

2 November 2023

AALLA: Attack-Aware Logical Link Assignment Cost-Minimization Model for Protecting Software-Defined Networks against DDoS Attacks

,
,
,
,
,
and
1
Faculty of Computing & Informatics (FCI), Multimedia University (MMU), Cyberjaya 63100, Malaysia
2
Department of Information Technology, SZABIST University, Karachi 75600, Pakistan
3
Faculty of Engineering (FOE), Multimedia University (MMU), Cyberjaya 63100, Malaysia
4
School of Physics, Engineering and Computer Science (SPECS), University of Hertfordshire, Hatfield AL10 9AB, UK
This article belongs to the Special Issue Industrial Internet of Things (IIoT) Platforms and Applications

Abstract

Software-Defined Networking (SDN), which is used in Industrial Internet of Things, uses a controller as its “network brain” located at the control plane. This uniquely distinguishes it from the traditional networking paradigms because it provides a global view of the entire network. In SDN, the controller can become a single point of failure, which may cause the whole network service to be compromised. Also, data packet transmission between controllers and switches could be impaired by natural disasters, causing hardware malfunctioning or Distributed Denial of Service (DDoS) attacks. Thus, SDN controllers are vulnerable to both hardware and software failures. To overcome this single point of failure in SDN, this paper proposes an attack-aware logical link assignment (AALLA) mathematical model with the ultimate aim of restoring the SDN network by using logical link assignment from switches to the cluster (backup) controllers. We formulate the AALLA model in integer linear programming (ILP), which restores the disrupted SDN network availability by assigning the logical links to the cluster (backup) controllers. More precisely, given a set of switches that are managed by the controller(s), this model simultaneously determines the optimal cost for controllers, links, and switches.

1. Introduction

Software-Defined Networking (SDN) has been attracting attention in data centre network operators, academia, and industry for its programmability and agility. SDN empowers smart industries, such as Industrial Internet of Things, with central network device configuration and administration by providing a global view of the network. The SDN framework is regarded as the hardware-less networking paradigm in which networking through programming is possible. Compared to traditional networking, in SDN technology the control and data planes are decoupled, which make it more agile in terms of networking management. A controller is responsible for the management of the entire network, whereas networking switches are responsible for operating based on the instructions deployed through controllers [1]. One of the factors for network performance and scalability is how the network is being designed [2]. The SDN architecture is flexible and can be programmed using any high-level programming language to serve the purpose of the client devices and end-users [3]. The SDN platform is not only capable of providing high performance, but also providing energy efficiency and network security [4]. However, it is necessary to counter Distributed Denial of Service (DDoS) attacks by employing controller clustering methods to control the efficiency and performance from the view of entire network security [3,4]. Due to the central location of the controller, many security concerns caused by a single point of failure have been reported [5]. Firstly, the SDN control plane is unable to handle all the flow requests due to resource consumption or malicious traffic resulting from DDoS. Secondly, the fake flow request from switches can generate several unnecessary flow rules, which makes it difficult for the data plane to store flow rules for a normal flow of traffic [6,7].
In this research study, the logical links in AALLA model are used to provide connectivity and restore the availability of resources when DDoS attacks happen. The AALLA model considers a link assignment technique and is capable of restoring the network service availability under a disruption of existing links. When a given switch is affected by a DDoS attack, the logical links will take up the switch using the backup links connecting another available port on the switch. This will restore or resume the disrupted service again to the requested users, ensuring service availability. The past literature has focused on the security of controller placement, the security of message transformation, bandwidth optimization, and network scalability [8,9,10,11,12,13,14,15,16,17,18,19]. However, the past literature has not focused on link assignment strategies considering bandwidth and cost optimization under single points of failure in SDN networks. AALLA considers metrics such as latency, throughput, cost optimization for links, switches, and controllers along with the high availability (HA) of network services in the SDN environment.
Security has been regarded as a detrimental factor in the development of SDN networks [20]. Among the security requirements of SDN networks, undisrupted availability is critical since the core function of SDN is to provide uninterrupted network services and resources. DDoS flooding attacks are the culprit in destroying availability in SDN networks [20,21]. DDoS attacks are created by two or more systems or botnets. A botnet is a compromised host system created when a computer is penetrated by software from a malware code [20]. It is essential to ensure SDN network availability for its end-users under DDoS flooding attacks. Current DDoS attacks have many forms, e.g., consumption of computational resources, disruption of configuration information, etc. [22]. To improve scalability and performance and avoid a single point of failure, the control plane is implemented as a distributed system with a cluster of controllers [23]. The hierarchy of controllers using controller clustering system is proposed as shown in Figure 1. More than one controller in SDN will serve as backup support controllers and also distribute the load of flow requests from switches.
Figure 1. Controller cluster using logical link assignment in SDN network.
The controller cluster is an SDN failover mechanism and proposes attack-aware logical link assignment from switches to the cluster (backup) controller under DDoS attacks. Our contributions are to formulate the logical link assignment using integer linear programming (ILP) with the intention of minimizing the cost of controllers, switches, and links. The derived model will provide a necessary tool to restore the SDN network to overcome a single point of failure.
This research paper makes the following contributions:
  • We introduce the AALLA model, which aims to address the single-point-of-failure susceptibility in SDN networks exploited by DDoS attacks. The model utilizes logical link assignment from switches to backup controllers to restore the network’s availability.
  • We formulate the AALLA model as an integer linear programming (ILP) problem. The model simultaneously determines the optimal cost for controllers, links, and switches while restoring the disrupted SDN network.
  • Our model specifically aims to minimize the cost of controllers, links, and switches in the SDN network.
By formulating the problem as an ILP, we provide a tool that can be used to optimize the allocation of resources to the requested end-users in order to overcome the single point of failure and ensure availability of services. The rest of this paper is organized as follows. Section 2 reviews the related work on the SDN and DDoS attacks. The proposed attack-aware logical link assignment (AALLA) model is presented in Section 3 followed by the simulation results in Section 4. Conclusions are given in Section 5.

4. Experimental Results and Discussion

In this section, we discuss the experimental results and simulation platform tools used for AALLA mathematical model formulation in detail.
A mathematical programming language (AMPL) was used to formulate the AALLA model along with the IBM ILOG CPLEX 12.7.0.0: optimal integer solution; this is a powerful solver for AMPL code execution. In our experiments, we used an Acer Aspire XC-780 workstation, Intel® Core™ i7-6700 x64-based 6th-generation CPU @ 3.40GHz, with a memory of 8 GB RAM and virtual memory of 128 GB on Windows 10 x64.
Table 1a,b present the two scenarios, known as problem (A) and problem (B), used for the AALLA model simulation. They consist of the following elements as depicted in Figure 1 and Figure 2.
Table 1. The input dataset used for AALLA model.
Figure 2. Logical link assignment between switch S3 and cluster controller BC2 under DDoS attack. Red nodes are used for nodes under attack and orange links are used to denote that a compromised switch has been restored using the next available logical link.
Three controllers for problems (A) and (B) are given as C1, C2, and C3 with different specifications and a cost in USD.
Two cluster (backup) controllers BC1 and BC2 for problem (A) and problem (B) are used and they will be activated upon DDoS attack occurred on the switches connected with C1, C2, and C3.
Three type of links, L1, L2, L3, are used with different prices in USD and bandwidth in bytes, respectively. Six input switches, as S1, S2, S3, S4, S5, S6, for problem (A) and the same for problem (B) are used with a price in USD.
Some of the other constants used in this experimental setup are as follows: Beta is a constant in the model file, which is set for the size of data packets in bytes. A function of B b y t e is used as a source of converting the GBs/MBs into Bytes per second. Space/range is a function that is used to calculate the distance between two points such as point A and point B. The maximum delay is set in the model using λ, which is allowed for the flow-setup latency in the network. Delta “δ” is used for the average time in milliseconds for processing a packet in switches and “t” is used for the speed of the medium of communication, such as wired or wireless network.
The simulation results are described and presented in Table 2. Here, we can observe that the total data packets are 2100 p, processed for both problems (a) and (b) with 1398 and 2986 CPLEX iterations, respectively. The DDoS attack happened on switch S3 in problem (a) in Figure 2 and switches S3 and S6 in problem (b), as illustrated in Figure 3, while a minimized cost of 45,509 USD is incurred for SDN planning.
Table 2. AMPL and CPLEX solutions for AALLA model in SDN.
Figure 3. Logical link assignment from switch S3 to BC2 and from switch S6 to BC1 cluster (backup) controller under DDoS attack. Red nodes are used for nodes under attack and orange links are used to denote that a compromised switch has been restored using the next available logical link.
As per the results obtained from AMPL simulation, we observed that multiple DDoS attacks in SDN networks may incur more cost in terms of restoring the networking devices to the cluster controller. The reasons are that the logical links will be chosen upon the basis of processing power; therefore, if an attack happens on a switch, then the model will choose the higher-processing-power cluster (backup) controller in order to restore the network services [68,69,70]. The results indicate that the model can be used to plan small- and medium-scale enterprises (SMEs) in SDN networks to reduce the impact of DDoS attacks and to failover a single point of failure in the SDN with optimal cost for deployment.
The experimental results provide insights into the dynamics of SDN environments, particularly in the context of mitigating DDoS attacks. One of the key findings of our study is that the occurrence of DDoS attacks within SDN networks can significantly escalate the cost associated with restoring networking devices to their respective cluster controllers. This observation highlights the critical need for proactive measures to defend against and recover from such attacks. The rationale behind the increased cost is rooted in the model’s logic, which prioritizes processing power when selecting logical links for network restoration. In the case of a DDoS attack targeting a switch, the model chooses the cluster controller with higher processing power to ensure the efficient restoration of network services. While this approach is indeed effective in terms of ensuring network resilience, it comes at an increased financial cost. This insight highlights the trade-off between network robustness and cost, a critical consideration for network administrators and decision-makers.
The findings of this research align with previous studies (e.g., [68,69,70]). The ability to model and simulate such scenarios using mathematical optimization techniques, as demonstrated in this study, provides a powerful tool for network design and operation. By using the AALLA model, small- and medium-sized enterprises (SMEs) can strategically plan their SDN networks to reduce the impact of DDoS attacks and implement cost-effective failover mechanisms.
In conclusion, our experimental results shed light on the complex interplay between DDoS attacks, network resilience, and cost considerations in SDN environments. Our model provides a tool that can be used at the planning stage of an SDN network to provide proactive defence strategies to mitigate the financial and operational consequences of DDoS attacks. The AALLA model offers a promising avenue for optimizing SDN network deployment and managing the risks associated with DDoS attacks, ultimately enhancing the overall reliability and security of modern network infrastructures.

5. Conclusions

In this paper, we have proposed a novel AALLA mathematical model for the attack-aware link assignment problem between the switches and cluster (backup) controllers in SDN networks. Given the set of switches in the SDN network that must be managed by the controller(s), the proposed model simultaneously determined the optimal bandwidth for the links, the assignment of the logical links to the cluster (backup) controllers under DDoS attack, as well as the interconnections between all the network elements to minimize the SDN deployment cost at the planning stage. Our simulation results have shown that this linear model performed well for the SDN network under DDoS attacks to avoid a single point of failure. We tested two input datasets with multiple attacks to analyse the results. The outcome of two problem sizes have shown that the DDoS-affected switch in scenario (a) is switch S3 and in scenario (b) the switches are S3 and S6, which were assigned to the cluster (backup) controller using logical links. This method provides the SDN network with high availability, reliability, and uninterrupted services to fulfil internet service providers (ISPs) and end-user requirements. Our plans for future work include the validation of the proposed AALLA model in real-world SDN environments. This could involve collaborating with industry partners or deploying the solutions in testbeds to assess their practicality, scalability, and performance, improving the detection and mitigation techniques for DDoS attacks in SDN networks. Also, we plan to investigate and develop more advanced controller clustering methods to enhance the resilience of SDN networks against DDoS attacks. This may include extending the current model and exploring optimal strategies for load balancing, fault tolerance, and scalability in controller clusters.

Author Contributions

Conceptualization, S.A.; Validation, M.R.H.; Formal analysis, M.R.H.; Investigation, S.A.; Data curation, M.R.H.; Writing – original draft, S.A. and M.R.H.; Writing – review & editing, S.A., A.M. and N.P.; Supervision, S.C.T., C.K.L. and Z.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Acknowledgments

This research work was fully supported by the research grant of TM R&D and Multimedia University (MMU), Cyberjaya, Malaysia. We are very thankful to the team at TM R&D and Multimedia University (MMU) for providing generous support to our research studies.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Rawat, D.B.; Reddy, S.R. Software defined networking architecture, security and energy efficiency: A survey. IEEE Commun. Surv. Tutor. 2017, 19, 325–346. [Google Scholar] [CrossRef]
  2. Shin, S.; Gu, G. Attacking software-defined networks: A first feasibility study. In Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, Hong Kong, China, 16 August 2013; pp. 165–166. [Google Scholar]
  3. Cox, J.H.; Chung, J.; Donovan, S.; Ivey, J.; Clark, R.J.; Riley, G.; Owen, H.L. Advancing Software-Defined Networks: A Survey. IEEE Access 2017, 5, 25487–25526. [Google Scholar] [CrossRef]
  4. Lange, S.; Gebert, S.; Zinner, T.; Tran-Gia, P.; Hock, D.; Jarschel, M.; Hoffmann, M. Heuristic approaches to the controller placement problem in large scale SDN networks. IEEE Trans. Netw. Serv. Manag. 2015, 12, 4–17. [Google Scholar] [CrossRef]
  5. Yeganeh, S.; Ganjali, Y. Kandoo: A framework for efficient and scalable offloading of control applications. In Proceedings of the ACM SIGCOMM Hot Topics in Software Defined Networking (HotSDN), Helsinki, Finland, 13 August 2012. [Google Scholar]
  6. Casado, M. Scalability and reliability of logically centralized controller. In Proceedings of the Stanford CIO Summit, Stanford, CA, USA, 15 June 2010. [Google Scholar]
  7. Shu, Z.; Wan, J.; Li, D.; Lin, J.; Vasilakos, A.V.; Imran, M. Security in software-defined networking: Threats and countermeasures. Mob. Netw. Appl. 2016, 21, 764–776. [Google Scholar] [CrossRef]
  8. Shohani, R.B.; Mostafavi, S.A. Introducing a new linear regression based method for early DDoS attack detection in SDN. In Proceedings of the 2020 6th International Conference on Web Research (ICWR), Tehran, Iran, 22–23 April 2020; pp. 126–132. [Google Scholar]
  9. Sufiev, H.; Haddad, Y. DCF: Dynamic cluster flow architecture for SDN control plane. In Proceedings of the 2017 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 8–10 January 2017; pp. 172–173. [Google Scholar]
  10. Bouzidi, E.H.; Outtagarts, A.; Langar, R.; Boutaba, R. Dynamic clustering of software defined network switches and controller placement using deep reinforcement learning. Comput. Netw. 2022, 207, 108852. [Google Scholar] [CrossRef]
  11. Macedo, R.; de Castro, R.; Santos, A.; Ghamri-Doudane, Y.; Nogueira, M. Self-Organized SDN Controller Cluster Conformations Against DDoS Attacks Effects. In Proceedings of the Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar]
  12. Tsai, P.W.; Lee, C.W.; Wang, T.W. Design and Development of a Trust Mechanism to Enhance Security Protection on SDN-based IoT Network. In Proceedings of the 2023 24st Asia-Pacific Network Operations and Management Symposium (APNOMS), Detroit, MI, USA, 21–23 September 2023; pp. 125–130. [Google Scholar]
  13. Jin, D.; Qu, Y.; Liu, X.; Hannon, C.; Yan, J.; Aved, A.J.; Morrone, P. Dynamic Data-Driven Approach for Cyber-Resilient and Secure Critical Energy Systems. In Handbook of Dynamic Data Driven Applications Systems; Springer International Publishing: Cham, Switzerland, 2023; Volume 2, pp. 807–831. [Google Scholar]
  14. Bhuiyan, Z.A.; Islam, S.; Islam, M.M.; Ullah, A.A.; Naz, F.; Rahman, M.S. On the (in) Security of the Control Plane of SDN Architecture: A Survey. IEEE Access 2023, 11, 91550–91582. [Google Scholar] [CrossRef]
  15. Al-Dunainawi, Y.; Al-Kaseem, B.R.; Al-Raweshidy, H.S. Optimized Artificial Intelligence Model for DDoS Detection in SDN Environment. IEEE Access 2023, 11, 106733–106748. [Google Scholar] [CrossRef]
  16. DeLany, R.; Smith, A.; Li, Y.; Du, L. SDN Dynamic Controller Configuration to Mitigate Compromised Controllers. In Proceedings of the 2023 IEEE Transportation Electrification Conference & Expo (ITEC), Detroit, MI, USA, 21–23 June 2023; pp. 1–5. [Google Scholar]
  17. Shaji, N.S.; Muthalagu, R. Survey on security aspects of distributed software-defined networking controllers in an enterprise SD-WLAN. Digit. Commun. Netw. 2023. [Google Scholar] [CrossRef]
  18. Lemeshko, O.; Yeremenko, O.; Mersni, A.; Gazda, J. Improvement of Confidential Messages Secure Routing over Paths with Intersection in Cyber Resilient Networks. In Proceedings of the 2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT), Sarajevo, Bosnia and Herzegovina, 16–18 June 2022; pp. 1–6. [Google Scholar]
  19. Lemeshko, O.; Yeremenko, O.; Yevdokymenko, M.; Shapovalova, A.; Baranovskyi, O. Complex investigation of the compromise probability behavior in traffic engineering oriented secure routing model in software-defined networks. In Future Intent-Based Networking: On the QoS Robust and Energy Efficient Heterogeneous Software Defined Networks; Springer International Publishing: Cham, Switzerland, 2021; pp. 145–160. [Google Scholar]
  20. Yan, Q.; Yu, F.R.; Gong, Q.; Li, J. Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Commun. Surv. Tutor. 2016, 18, 602–622. [Google Scholar] [CrossRef]
  21. Mallikarjunan, K.N.; Muthupriya, K.; Shalinie, S.M. A survey of distributed denial of service attack. In Proceedings of the 2016 10th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, India, 7–8 January 2016; pp. 1–6. [Google Scholar]
  22. Xu, Y.; Liu, Y. DDoS attack detection under SDN context. In Proceedings of the IEEE INFOCOM 2016—The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016; pp. 1–9. [Google Scholar]
  23. Wang, T.; Liu, F.; Guo, J.; Xu, H. Dynamic sdn controller assignment in data center networks: Stable matching with transfers. In Proceedings of the IEEE INFOCOM 2016—The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016; pp. 1–9. [Google Scholar]
  24. Dvir, A.; Haddad, Y.; Zilberman, A. The controller placement problem for wireless SDN. Wirel. Netw. 2019, 25, 4963–4978. [Google Scholar] [CrossRef]
  25. Müller, L.F.; Oliveira, R.R.; Luizelli, M.C.; Gaspary, L.P.; Barcellos, M.P. Survivor: An enhanced controller placement strategy for improving SDN survivability. In Proceedings of the Global Communications Conference (GLOBECOM), Austin, TX, USA, 8–12 December 2014; pp. 1909–1915. [Google Scholar]
  26. Muqaddas, A.S.; Bianco, A.; Giaccone, P.; Maier, G. Inter-controller traffic in ONOS clusters for SDN networks. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 22–27 May 2016; pp. 1–6. [Google Scholar]
  27. Luo, M.; Li, Q.; Bo, M.; Lin, K.; Wu, X.; Li, C.; Lu, S.; Chou, W. Design and implementation of a scalable sdn-of controller cluster. In Proceedings of the INFOCOMP 2015, Brussels, Belgium, 21–26 June 2015; p. 55. [Google Scholar]
  28. Sallahi, A.; St-Hilaire, M. Optimal model for the controller placement problem in software defined networks. IEEE Commun. Lett. 2015, 19, 30–33. [Google Scholar] [CrossRef]
  29. Zilberman, A.; Haddad, Y.; Erlich, S.; Peretz, Y.; Dvir, A. SDN Wireless Controller Placement Problem—The 4G LTE-U Case. IEEE Access 2021, 9, 16225–16238. [Google Scholar] [CrossRef]
  30. Blenk, A.; Basta, A.; Zerwas, J.; Reisslein, M.; Kellerer, W. Control plane latency with sdn network hypervisors: The cost of virtualization. IEEE Trans. Netw. Serv. Manag. 2016, 13, 366–380. [Google Scholar] [CrossRef]
  31. Karakus, M.; Durresi, A. A survey: Control plane scalability issues and approaches in Software-Defined Networking (SDN). Comput. Netw. 2017, 112, 279–293. [Google Scholar] [CrossRef]
  32. Wang, G.; Zhao, Y.; Huang, J.; Wang, W. The controller placement problem in software defined networking: A survey. IEEE Netw. 2017, 31, 21–27. [Google Scholar] [CrossRef]
  33. Samir, M.; Azab, M.; Samir, E. SD-CPC: SDN Controller Placement Camouflage based on Stochastic Game for Moving-target Defense. Comput. Commun. 2021, 168, 75–92. [Google Scholar] [CrossRef]
  34. Hu, Y.; Wendong, W.; Gong, X.; Que, X.; Shiduan, C. Reliability-aware controller placement for software-defined networks. In Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), Ghent, Belgium, 27–31 May 2013; pp. 672–675. [Google Scholar]
  35. Li, X.; Tang, F.; Fu, L.; Yu, J.; Chen, L.; Liu, J.; Zhu, Y.; Yang, L.T. Optimized controller provisioning in software-defined LEO satellite networks. IEEE Trans. Mob. Comput. 2022, 22, 4850–4864. [Google Scholar] [CrossRef]
  36. Bari, M.F.; Roy, A.R.; Chowdhury, S.R.; Zhang, Q.; Zhani, M.F.; Ahmed, R.; Boutaba, R. Dynamic controller provisioning in software defined networks. In Proceedings of the 2013 9th International Conference on Network and Service Management (CNSM), Zurich, Switzerland, 14–18 October 2013; pp. 18–25. [Google Scholar]
  37. Han, Z.; Xu, C.; Xiong, Z.; Zhao, G.; Yu, S. On-Demand Dynamic Controller Placement in Software Defined Satellite-Terrestrial Networking. IEEE Trans. Netw. Serv. Manag. 2021, 18, 2915–2928. [Google Scholar] [CrossRef]
  38. Das, T.; Gurusamy, M. Controller placement for resilient network state synchronization in multi-controller sdn. IEEE Commun. Lett. 2020, 24, 1299–1303. [Google Scholar] [CrossRef]
  39. Heller, B.; Sherwood, R.; McKeown, N. The controller placement problem. In Proceedings of the First Workshop on Hot Topics in Software Defined Networks, Helsinki, Finland, 13 August 2012; pp. 7–12. [Google Scholar]
  40. Wei, L.; Fung, C. FlowRanger: A request prioritizing algorithm for controller DoS attacks in software defined networks. In Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; pp. 5254–5259. [Google Scholar]
  41. Balarezo, J.F.; Wang, S.; Chavez, K.G.; Al-Hourani, A.; Kandeepan, S. A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks. Eng. Sci. Technol. Int. J. 2022, 31, 101065. [Google Scholar] [CrossRef]
  42. Scaranti, G.F.; Carvalho, L.F.; Barbon, S.; Proença, M.L. Artificial Immune Systems and Fuzzy Logic to Detect Flooding Attacks in Software-Defined Networks. IEEE Access 2020, 8, 100172–100184. [Google Scholar] [CrossRef]
  43. Ali, T.E.; Chong, Y.W.; Manickam, S. Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review. Appl. Sci. 2023, 13, 3183. [Google Scholar] [CrossRef]
  44. Aladaileh, M.A.; Anbar, M.; Hasbullah, I.H.; Chong, Y.W.; Sanjalawe, Y.K. Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller—A Review. IEEE Access 2020, 8, 143985–143995. [Google Scholar] [CrossRef]
  45. Kandoi, R.; Antikainen, M. Denial-of-service attacks in OpenFlow SDN networks. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, Canada, 11–15 May 2015; pp. 1322–1326. [Google Scholar]
  46. Yan, Q.; Yu, F.R. Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Commun. Mag. 2015, 53, 52–59. [Google Scholar] [CrossRef]
  47. Yonghong, F.; Jun, B.; Jianping, W.; Ze, C.; Ke, W.; Min, L. A dormant multi-controller model for software defined networking. China Commun. 2014, 11, 45–55. [Google Scholar] [CrossRef]
  48. Dao, N.N.; Park, J.; Park, M.; Cho, S. A feasible method to combat against DDoS attack in SDN network. In Proceedings of the 2015 International Conference on Information Networking (ICOIN), Siem Reap, Cambodia, 12–14 January 2015; pp. 309–311. [Google Scholar]
  49. Saxena, U.; Sodhi, J.S.; Singh, Y. An Analysis of DDoS Attacks in a Smart Home Networks. In Proceedings of the 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 29–31 January 2020; pp. 272–276. [Google Scholar]
  50. Erhan, D.; Anarım, E.; Kurt, G.K. DDoS attack detection using matching pursuit algorithm. In Proceedings of the 2016 24th Signal Processing and Communication Application Conference (SIU), Zonguldak, Turkey, 16–19 May 2016; pp. 1081–1084. [Google Scholar]
  51. Huang, K.; Yang, L.X.; Yang, X.; Xiang, Y.; Tang, Y.Y. A low-cost distributed denial-of-service attack architecture. IEEE Access 2020, 8, 42111–42119. [Google Scholar] [CrossRef]
  52. Lim, S.; Ha, J.; Kim, H.; Kim, Y.; Yang, S. A SDN-oriented DDoS blocking scheme for botnet-based attacks. In Proceedings of the 2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN), Shanghai, China, 8–11 July 2014; pp. 63–68. [Google Scholar]
  53. Wang, B.; Zheng, Y.; Lou, W.; Hou, Y.T. DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw. 2015, 81, 308–319. [Google Scholar] [CrossRef]
  54. Wang, H.; Xu, L.; Gu, G. Floodguard: A dos attack prevention extension in software-defined networks. In Proceedings of the 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Rio de Janeiro, Brazil, 22–25 June 2015; pp. 239–250. [Google Scholar]
  55. Haider, S.; Akhunzada, A.; Mustafa, I.; Patel, T.B.; Fernandez, A.; Choo, K.K.R.; Iqbal, J. A deep cnn ensemble framework for efficient ddos attack detection in software defined networks. IEEE Access 2020, 8, 53972–53983. [Google Scholar] [CrossRef]
  56. Pérez-Díaz, J.A.; Valdovinos, I.A.; Choo, K.K.R.; Zhu, D. A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning. IEEE Access 2020, 8, 155859–155872. [Google Scholar] [CrossRef]
  57. Abdelaziz, A.; Fong, A.T.; Gani, A.; Garba, U.; Khan, S.; Akhunzada, A.; Talebian, H.; Choo, K.K.R. Distributed controller clustering in software defined networks. PLoS ONE 2017, 12, e0174715. [Google Scholar] [CrossRef]
  58. Wang, S.; Balarezo, J.F.; Chavez, K.G.; Al-Hourani, A.; Kandeepan, S.; Asghar, M.R.; Russello, G. Detecting flooding DDoS attacks in software defined networks using supervised learning techniques. Eng. Sci. Technol. Int. J. 2022, 35, 101176. [Google Scholar] [CrossRef]
  59. Singh, M.P.; Bhandari, A. New-flow based DDoS attacks in SDN: Taxonomy, rationales, and research challenges. Comput. Commun. 2020, 154, 509–527. [Google Scholar] [CrossRef]
  60. Li, J.; Tu, T.; Li, Y.; Qin, S.; Shi, Y.; Wen, Q. DoSGuard: Mitigating denial-of-service attacks in software-defined networks. Sensors 2022, 22, 1061. [Google Scholar] [CrossRef] [PubMed]
  61. Gurusamy, U.; Hariharan, K.; Manikandan, M.S.K. Path optimization of box-covering based routing to minimize average packet delay in software defined network. Peer-to-Peer Netw. Appl. 2020, 13, 932–939. [Google Scholar] [CrossRef]
  62. Wang, X.; Yang, Y.; Liu, H.; Ren, J.; Xu, S.; Wang, S.; Yu, S. Efficient measurement of round-trip link delays in software-defined networks. J. Netw. Comput. Appl. 2020, 150, 102468. [Google Scholar] [CrossRef]
  63. Parashar, M.; Poonia, A.; Satish, K. A Survey of Attacks and their Mitigations in Software Defined Networks. In Proceedings of the 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India, 6–8 July 2019; pp. 1–8. [Google Scholar]
  64. Goransson, P.; Black, C.; Culver, T. Software Defined Networks: A Comprehensive Approach; Morgan Kaufmann: Burlington, MA, USA, 2016. [Google Scholar]
  65. Ros, F.J.; Ruiz, P.M. On reliable controller placements in software-defined networks. Comput. Commun. 2016, 77, 41–51. [Google Scholar] [CrossRef]
  66. Rasol, K.A.R.; Domingo-Pascual, J. Joint Latency and Reliability-Aware Controller Placement. In Proceedings of the 2021 International Conference on Information Networking (ICOIN), Jeju Island, Republic of Korea, 13–16 January 2021; pp. 197–202. [Google Scholar]
  67. Hock, D.; Hartmann, M.; Gebert, S.; Jarschel, M.; Zinner, T.; Tran-Gia, P. Pareto-optimal resilient controller placement in SDN-based core networks. In Proceedings of the 2013 25th International Teletraffic Congress (ITC), Shanghai, China, 10–12 September 2013; pp. 1–9. [Google Scholar]
  68. Yazici, V.; Sunay, M.O.; Ercan, A.O. Controlling a software-defined network via distributed controllers. arXiv 2014, arXiv:1401.7651. [Google Scholar]
  69. Jalili, A.; Keshtgari, M.; Akbari, R. A new framework for reliable control placement in software-defined networks based on multi-criteria clustering approach. Soft Comput. 2020, 24, 2897–2916. [Google Scholar] [CrossRef]
  70. Latah, M.; Toker, L. Load and stress testing for SDN’s northbound API. SN Appl. Sci. 2020, 2, 122. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.