当前位置: X-MOL 学术J. Netw. Syst. Manag. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
An SDN-Assisted Defense Mechduanism for the Shrew DDoS Attack in a Cloud Computing Environment
Journal of Network and Systems Management ( IF 3.6 ) Pub Date : 2021-01-20 , DOI: 10.1007/s10922-020-09580-7
Neha Agrawal , Shashikala Tapaswi

The integration of cloud computing with Software Defined Networking (SDN) addresses several challenges of a typical cloud infrastructure such as complex inter-networking, data collection, fast response, etc. Though SDN-based cloud opens new opportunities, the SDN controller may itself become vulnerable to several attacks. The unique features of SDN are used by the attackers to implement the severe Distributed Denial of Service (DDoS) attacks. Several approaches are available in literature to defend against the traditional DDoS flooding attacks in SDN-cloud. To elude the detection systems, attackers try to employ the cultivated attack strategies. Such sophisticated DDoS attack strategies are implemented by generating low-rate attack traffic. The most common type of Low-Rate DDoS (LR-DDoS) attack is the Shrew attack. The existing approaches are not capable to detect, mitigate, and traceback such attacks. Thus, this work discusses a new mechanism which not only detects and mitigates the shrew attack but traces back the location of the attack sources as well. The attack is detected using the information entropy variations, and the attack sources are traced-back using the deterministic packet marking scheme. The experiments are performed in a real SDN-cloud scenario, and the experimental results show that the approach requires 1 packet and 8.27 packets on an average to locate the bots and attackers respectively. The approach detects and traces back the attack sources in between 14.45 ms to 10.02 s and provides 97.6% accuracy.

中文翻译:

云计算环境下针对 Shrew DDoS 攻击的 SDN 辅助防御机制

云计算与软件定义网络 (SDN) 的集成解决了典型云基础设施的若干挑战,例如复杂的互联网络、数据收集、快速响应等。虽然基于 SDN 的云开辟了新的机遇,但 SDN 控制器本身可能会成为容易受到多次攻击。攻击者利用 SDN 的独特功能实施严重的分布式拒绝服务 (DDoS) 攻击。文献中提供了几种方法来防御 SDN 云中的传统 DDoS 泛洪攻击。为了躲避检测系统,攻击者试图采用精心设计的攻击策略。这种复杂的 DDoS 攻击策略是通过生成低速率攻击流量来实现的。最常见的低速率 DDoS (LR-DDoS) 攻击类型是 Shrew 攻击。现有方法无法检测、减轻和追溯此类攻击。因此,这项工作讨论了一种新机制,该机制不仅可以检测和减轻 shrew 攻击,还可以追溯攻击源的位置。使用信息熵变化检测攻击,并使用确定性数据包标记方案追溯攻击源。实验是在真实的SDN-cloud场景中进行的,实验结果表明,该方法平均需要1个数据包和8.27个数据包来定位bot和攻击者。该方法在 14.45 ms 到 10.02 s 之间检测和追溯攻击源,并提供 97.6% 的准确率。这项工作讨论了一种新机制,该机制不仅可以检测和减轻 shrew 攻击,还可以追溯攻击源的位置。使用信息熵变化检测攻击,并使用确定性数据包标记方案追溯攻击源。实验是在真实的SDN-cloud场景中进行的,实验结果表明,该方法平均需要1个数据包和8.27个数据包来定位bot和攻击者。该方法在 14.45 毫秒到 10.02 秒之间检测和追溯攻击源,并提供 97.6% 的准确率。这项工作讨论了一种新机制,该机制不仅可以检测和减轻 shrew 攻击,还可以追溯攻击源的位置。使用信息熵变化检测攻击,并使用确定性数据包标记方案追溯攻击源。实验是在真实的SDN-cloud场景中进行的,实验结果表明,该方法平均需要1个数据包和8.27个数据包来定位机器人和攻击者。该方法在 14.45 毫秒到 10.02 秒之间检测和追溯攻击源,并提供 97.6% 的准确率。实验是在真实的SDN-cloud场景中进行的,实验结果表明,该方法平均需要1个数据包和8.27个数据包来定位bot和攻击者。该方法在 14.45 毫秒到 10.02 秒之间检测和追溯攻击源,并提供 97.6% 的准确率。实验是在真实的SDN-cloud场景中进行的,实验结果表明,该方法平均需要1个数据包和8.27个数据包来定位bot和攻击者。该方法在 14.45 毫秒到 10.02 秒之间检测和追溯攻击源,并提供 97.6% 的准确率。
更新日期:2021-01-20
down
wechat
bug