Visible to the public DDOS Attack Detection Prevention in SDN using OpenFlow Statistics

TitleDDOS Attack Detection Prevention in SDN using OpenFlow Statistics
Publication TypeConference Paper
Year of Publication2019
AuthorsAhuja, Nisha, Singal, Gaurav
Conference Name2019 IEEE 9th International Conference on Advanced Computing (IACC)
Keywordscentralized architecture, composability, computer network security, DDoS, DDoS attack detection, DDoS Attack Prevention, distributed denial of service attack, forwarding logic, forwarding rule, Human Behavior, legacy old networks, Metrics, Mininet, network attack, OpenFlow statistics, packet rate, programmable network, pubcrawl, Resiliency, SDN, Software Defined Network, software defined networking, statistical analysis, telecommunication switching, telecommunication traffic, Traffic simulation, traffic statistics
AbstractSoftware defined Network is a network defined by software, which is one of the important feature which makes the legacy old networks to be flexible for dynamic configuration and so can cater to today's dynamic application requirement. It is a programmable network but it is prone to different type of attacks due to its centralized architecture. The author provided a solution to detect and prevent Distributed Denial of service attack in the paper. Mininet [5] which is a popular emulator for Software defined Network is used. We followed the approach in which collection of the traffic statistics from the various switches is done. After collection we calculated the packet rate and bandwidth which shoots up to high values when attack take place. The abrupt increase detects the attack which is then prevented by changing the forwarding logic of the host nodes to drop the packets instead of forwarding. After this, no more packets will be forwarded and then we also delete the forwarding rule in the flow table. Hence, we are finding out the change in packet rate and bandwidth to detect the attack and to prevent the attack we modify the forwarding logic of the switch flow table to drop the packets coming from malicious host instead of forwarding it.
DOI10.1109/IACC48062.2019.8971596
Citation Keyahuja_ddos_2019