Using IP variability to efficiently detect elephant flows and defend DDoS attacks in SDN-based networks

碩士 === 國立中山大學 === 資訊工程學系研究所 === 106 === Distributed denial-of-service attack (DDoS attack) is a common threat in the Internet. It uses multiple zombie computers to send a large number of requests to the same victim host to prevent the victim from providing normal services. Traditional methods usuall...

Full description

Bibliographic Details
Main Authors: Yi-Chuan Wang, 王顗權
Other Authors: You-Chiun Wang
Format: Others
Language:zh-TW
Published: 2018
Online Access:http://ndltd.ncl.edu.tw/handle/eau452
id ndltd-TW-106NSYS5392066
record_format oai_dc
spelling ndltd-TW-106NSYS53920662019-05-16T01:16:55Z http://ndltd.ncl.edu.tw/handle/eau452 Using IP variability to efficiently detect elephant flows and defend DDoS attacks in SDN-based networks 利用IP變異性於SDN網路中有效偵測巨量資料流與阻擋DDoS攻擊 Yi-Chuan Wang 王顗權 碩士 國立中山大學 資訊工程學系研究所 106 Distributed denial-of-service attack (DDoS attack) is a common threat in the Internet. It uses multiple zombie computers to send a large number of requests to the same victim host to prevent the victim from providing normal services. Traditional methods usually block the DDoS attack through a firewall, but the performance is not good. On the other hand, a software-defined network (SDN) is also threatened by DDoS attacks, because the controller will be paralyzed by numerous spam packets. In the past SDN solutions, a lot of feature information is recorded to identify DDoS attacks. However, they may burden the controller with a heavy load and waste its computational resource. Besides, these methods could also cause false alarms on normal services, for example, elephant flows, as such flows also produce a large amount of data in a short period. Since DDoS attacks usually multiple random IP source addresses, this thesis proposes a DDoS defense mechanism based on IP variability. When an potential attack occurs, our mechanism will record necessary packet information on an efficient manner. Then, the controller will check if the IP variability of stored packet exceeds a threshold. If so, the controller will adaptively install flow rules in switches to discard DDoS packets. After the attack, these flow rules will be discarded accordingly, in this way, we can prevent DDoS packets from attacking the network. Through simulations, we show that our proposed mechanism can efficiently detect and defend DDoS attacks (including TCP SYN flood, UPP flood, and ICMP flood), and also identity elephant flows. You-Chiun Wang 王友群 2018 學位論文 ; thesis 61 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中山大學 === 資訊工程學系研究所 === 106 === Distributed denial-of-service attack (DDoS attack) is a common threat in the Internet. It uses multiple zombie computers to send a large number of requests to the same victim host to prevent the victim from providing normal services. Traditional methods usually block the DDoS attack through a firewall, but the performance is not good. On the other hand, a software-defined network (SDN) is also threatened by DDoS attacks, because the controller will be paralyzed by numerous spam packets. In the past SDN solutions, a lot of feature information is recorded to identify DDoS attacks. However, they may burden the controller with a heavy load and waste its computational resource. Besides, these methods could also cause false alarms on normal services, for example, elephant flows, as such flows also produce a large amount of data in a short period. Since DDoS attacks usually multiple random IP source addresses, this thesis proposes a DDoS defense mechanism based on IP variability. When an potential attack occurs, our mechanism will record necessary packet information on an efficient manner. Then, the controller will check if the IP variability of stored packet exceeds a threshold. If so, the controller will adaptively install flow rules in switches to discard DDoS packets. After the attack, these flow rules will be discarded accordingly, in this way, we can prevent DDoS packets from attacking the network. Through simulations, we show that our proposed mechanism can efficiently detect and defend DDoS attacks (including TCP SYN flood, UPP flood, and ICMP flood), and also identity elephant flows.
author2 You-Chiun Wang
author_facet You-Chiun Wang
Yi-Chuan Wang
王顗權
author Yi-Chuan Wang
王顗權
spellingShingle Yi-Chuan Wang
王顗權
Using IP variability to efficiently detect elephant flows and defend DDoS attacks in SDN-based networks
author_sort Yi-Chuan Wang
title Using IP variability to efficiently detect elephant flows and defend DDoS attacks in SDN-based networks
title_short Using IP variability to efficiently detect elephant flows and defend DDoS attacks in SDN-based networks
title_full Using IP variability to efficiently detect elephant flows and defend DDoS attacks in SDN-based networks
title_fullStr Using IP variability to efficiently detect elephant flows and defend DDoS attacks in SDN-based networks
title_full_unstemmed Using IP variability to efficiently detect elephant flows and defend DDoS attacks in SDN-based networks
title_sort using ip variability to efficiently detect elephant flows and defend ddos attacks in sdn-based networks
publishDate 2018
url http://ndltd.ncl.edu.tw/handle/eau452
work_keys_str_mv AT yichuanwang usingipvariabilitytoefficientlydetectelephantflowsanddefendddosattacksinsdnbasednetworks
AT wángyǐquán usingipvariabilitytoefficientlydetectelephantflowsanddefendddosattacksinsdnbasednetworks
AT yichuanwang lìyòngipbiànyìxìngyúsdnwǎnglùzhōngyǒuxiàozhēncèjùliàngzīliàoliúyǔzǔdǎngddosgōngjī
AT wángyǐquán lìyòngipbiànyìxìngyúsdnwǎnglùzhōngyǒuxiàozhēncèjùliàngzīliàoliúyǔzǔdǎngddosgōngjī
_version_ 1719174399917031424