Title | A Model-Driven Framework for the Prevention of DoS Attacks in Software Defined Networking (SDN) |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Farooq, Muhammad Usman, Rashid, Muhammad, Azam, Farooque, Rasheed, Yawar, Anwar, Muhammad Waseem, Shahid, Zohaib |
Conference Name | 2021 IEEE International Systems Conference (SysCon) |
Date Published | apr |
Keywords | Acceleo, denial of service, Drag, Java, Local Area Network Denial, MDE, Meta-Model, Model Driven Code Transformation, Model-To-Text, networking, OFP, Predictive Metrics, pubcrawl, Resiliency, Resistance, Router Systems Security, SDN, Sirius tool, software reliability, Switches, Tools, Topology |
Abstract | Security is a key component of the network. Software Defined Networking (SDN) is a refined form of traditional network management system. It is a new encouraging approach to design-build and manage networks. SDN decouples control plane (software-based router) and data plane (software-based switch), hence it is programmable. Consequently, it facilitates implementation of security based applications for the prevention of DOS attacks. Various solutions have been proposed by researches for handling of DOS attacks in SDN. However, these solutions are very limited in scope, complex, time consuming and change resistant. In this article, we have proposed a novel model driven framework i.e. MDAP (Model Based DOS Attacks Prevention) Framework. Particularly, a meta model is proposed. As tool support, a tree editor and a Sirius based graphical modeling tool with drag drop palette have been developed in Oboe designer community edition. The tool support allows modeling and visualization of simple and complex network topology scenarios. A Model to Text transformation engine has also been made part of framework that generates java code for the Floodlight SDN controller from the modeled scenario. The validity of proposed framework has been demonstrated via case study. The results prove that the proposed framework can effectively handle DOS attacks in SDN with simplicity as per the true essence of MDSE and can be reliably used for the automation of security based applications in order to deny DOS attacks in SDN. |
DOI | 10.1109/SysCon48628.2021.9447131 |
Citation Key | farooq_model-driven_2021 |