Using IP variability to efficiently detect elephant flows and defend DDoS attacks in SDN-based networks
碩士 === 國立中山大學 === 資訊工程學系研究所 === 106 === Distributed denial-of-service attack (DDoS attack) is a common threat in the Internet. It uses multiple zombie computers to send a large number of requests to the same victim host to prevent the victim from providing normal services. Traditional methods usuall...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/eau452 |
id |
ndltd-TW-106NSYS5392066 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-106NSYS53920662019-05-16T01:16:55Z http://ndltd.ncl.edu.tw/handle/eau452 Using IP variability to efficiently detect elephant flows and defend DDoS attacks in SDN-based networks 利用IP變異性於SDN網路中有效偵測巨量資料流與阻擋DDoS攻擊 Yi-Chuan Wang 王顗權 碩士 國立中山大學 資訊工程學系研究所 106 Distributed denial-of-service attack (DDoS attack) is a common threat in the Internet. It uses multiple zombie computers to send a large number of requests to the same victim host to prevent the victim from providing normal services. Traditional methods usually block the DDoS attack through a firewall, but the performance is not good. On the other hand, a software-defined network (SDN) is also threatened by DDoS attacks, because the controller will be paralyzed by numerous spam packets. In the past SDN solutions, a lot of feature information is recorded to identify DDoS attacks. However, they may burden the controller with a heavy load and waste its computational resource. Besides, these methods could also cause false alarms on normal services, for example, elephant flows, as such flows also produce a large amount of data in a short period. Since DDoS attacks usually multiple random IP source addresses, this thesis proposes a DDoS defense mechanism based on IP variability. When an potential attack occurs, our mechanism will record necessary packet information on an efficient manner. Then, the controller will check if the IP variability of stored packet exceeds a threshold. If so, the controller will adaptively install flow rules in switches to discard DDoS packets. After the attack, these flow rules will be discarded accordingly, in this way, we can prevent DDoS packets from attacking the network. Through simulations, we show that our proposed mechanism can efficiently detect and defend DDoS attacks (including TCP SYN flood, UPP flood, and ICMP flood), and also identity elephant flows. You-Chiun Wang 王友群 2018 學位論文 ; thesis 61 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中山大學 === 資訊工程學系研究所 === 106 === Distributed denial-of-service attack (DDoS attack) is a common threat in the Internet. It uses multiple zombie computers to send a large number of requests to the same victim host to prevent the victim from providing normal services. Traditional methods usually block the DDoS attack through a firewall, but the performance is not good. On the other hand, a software-defined network (SDN) is also threatened by DDoS attacks, because the controller will be paralyzed by numerous spam packets. In the past SDN solutions, a lot of feature information is recorded to identify DDoS attacks. However, they may burden the controller with a heavy load and waste its computational resource. Besides, these methods could also cause false alarms on normal services, for example, elephant flows, as such flows also produce a large amount of data in a short period.
Since DDoS attacks usually multiple random IP source addresses, this thesis proposes a DDoS defense mechanism based on IP variability. When an potential attack occurs, our mechanism will record necessary packet information on an efficient manner. Then, the controller will check if the IP variability of stored packet exceeds a threshold. If so, the controller will adaptively install flow rules in switches to discard DDoS packets. After the attack, these flow rules will be discarded accordingly, in this way, we can prevent DDoS packets from attacking the network.
Through simulations, we show that our proposed mechanism can efficiently detect and defend DDoS attacks (including TCP SYN flood, UPP flood, and ICMP flood), and also identity elephant flows.
|
author2 |
You-Chiun Wang |
author_facet |
You-Chiun Wang Yi-Chuan Wang 王顗權 |
author |
Yi-Chuan Wang 王顗權 |
spellingShingle |
Yi-Chuan Wang 王顗權 Using IP variability to efficiently detect elephant flows and defend DDoS attacks in SDN-based networks |
author_sort |
Yi-Chuan Wang |
title |
Using IP variability to efficiently detect elephant flows and defend DDoS attacks in SDN-based networks |
title_short |
Using IP variability to efficiently detect elephant flows and defend DDoS attacks in SDN-based networks |
title_full |
Using IP variability to efficiently detect elephant flows and defend DDoS attacks in SDN-based networks |
title_fullStr |
Using IP variability to efficiently detect elephant flows and defend DDoS attacks in SDN-based networks |
title_full_unstemmed |
Using IP variability to efficiently detect elephant flows and defend DDoS attacks in SDN-based networks |
title_sort |
using ip variability to efficiently detect elephant flows and defend ddos attacks in sdn-based networks |
publishDate |
2018 |
url |
http://ndltd.ncl.edu.tw/handle/eau452 |
work_keys_str_mv |
AT yichuanwang usingipvariabilitytoefficientlydetectelephantflowsanddefendddosattacksinsdnbasednetworks AT wángyǐquán usingipvariabilitytoefficientlydetectelephantflowsanddefendddosattacksinsdnbasednetworks AT yichuanwang lìyòngipbiànyìxìngyúsdnwǎnglùzhōngyǒuxiàozhēncèjùliàngzīliàoliúyǔzǔdǎngddosgōngjī AT wángyǐquán lìyòngipbiànyìxìngyúsdnwǎnglùzhōngyǒuxiàozhēncèjùliàngzīliàoliúyǔzǔdǎngddosgōngjī |
_version_ |
1719174399917031424 |