Abstract
The Software Defined Networks (SDN) is widely used in many industrial and enterprise networking applications due to its flexibility and gaining popularity. It offers various benefits like network virtualization, policy enforcement, greater control, and reduced operational cost. One of the challenging tasks in SDN is to secure the network against the harmful attacks. For this purpose, various attack detection mechanisms are developed in traditional works, which intends to increase the security of SDN by employing different policy enforcement and soft computing techniques. In this paper, a comprehensive survey is presented on various attacks that affect the performance of SDN and its corresponding countermeasure techniques. Typically, the performance of a network can be degraded due to the cause of attacks present on the layers. Also, it leads to reduced Quality of Service (QoS), increased network congestion, and packet drops. So, the attacks present on the layers must be detected or prevented for increasing the performance of SDN. This investigation illustrates various attacks with its causes and the most suitable techniques used for detecting those attacks for improving security. Moreover, the advantages and disadvantages of each attack detection mechanism are presented with its working procedure.
Similar content being viewed by others
References
Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18, 602–622.
Braga, R., Mota, E., & Passito, A. (2010). Lightweight DDoS flooding attack detection using NOX/OpenFlow. In 2010 IEEE 35th conference on Local Computer Networks (LCN) (pp. 408–415).
Dong, X., Lin, H., Tan, R., Iyer, R. K., & Kalbarczyk, Z. (2015). Software-defined networking for smart grid resilience: Opportunities and challenges. In Proceedings of the 1st ACM workshop on cyber-physical system security (pp. 61–68).
Ali, S. T., Sivaraman, V., Radford, A., & Jha, S. (2015). A survey of securing networks using software defined networking. IEEE Transactions on Reliability, 64, 1086–1097.
Braun, W., & Menth, M. (2014). Software-defined networking using OpenFlow: Protocols, applications and architectural design choices. Future Internet, 6, 302–336.
Farhady, H., Lee, H., & Nakao, A. (2015). Software-defined networking: A survey. Computer Networks, 81, 79–95.
Ahmad, I., Namal, S., Ylianttila, M., & Gurtov, A. (2015). Security in software defined networks: A survey. IEEE Communications Surveys & Tutorials, 17, 2317–2346.
Mousavi, S. M., & St-Hilaire, M. (2015). Early detection of DDoS attacks against SDN controllers. In 2015 international conference on computing, networking and communications (ICNC), 2015 (pp. 77–81).
Dabbagh, M., Hamdaoui, B., Guizani, M., & Rayes, A. (2015). Software-defined networking security: Pros and cons. IEEE Communications Magazine, 53, 73–79.
Li, Y., & Chen, M. (2015). Software-defined network function virtualization: A survey. IEEE Access, 3, 2542–2553.
Blenk, A., Basta, A., Reisslein, M., & Kellerer, W. (2016). Survey on network virtualization hypervisors for software defined networking. IEEE Communications Surveys & Tutorials, 18, 655–685.
Antikainen, M., Aura, T., & Särelä, M. (2014). Spook in your network: Attacking an sdn with a compromised openflow switch. In Nordic conference on secure IT systems, 2014 (pp. 229–244).
Thyagaturu, A. S., Mercian, A., McGarry, M. P., Reisslein, M., & Kellerer, W. (2016). Software defined optical networks (SDONs): A comprehensive survey. IEEE Communications Surveys & Tutorials, 18, 2738–2786.
Van Trung, P., Huong, T. T.,Van Tuyen, D., Duc, D. M., Thanh, N. H., & Marshall, A. (2015). A multi-criteria-based DDoS-attack prevention solution using software defined networking. In 2015 international conference on advanced technologies for communications (ATC), 2015 (pp. 308–313).
De Gante, A., Aslan, M., & Matrawy, A. (2014). Smart wireless sensor network management based on software-defined networking. In 2014 27th biennial symposium on communications (QBSC), 2014 (pp. 71–75).
Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of cloud computing and software-defined networking. Computer Networks, 81, 308–319.
Mehdi, S. A., Khalid, J., & Khayam, S.A. (2011). Revisiting traffic anomaly detection using software defined networking. In International workshop on recent advances in intrusion detection, 2011 (pp. 161–180).
Bokhari, M. U., & Shallal, Q. M. (2016). A review on symmetric key encryption techniques in cryptography. International Journal of Computer Applications, 147, 43–48.
Sharma, R., & Athavale, V. A. (2019). Survey of intrusion detection techniques and architectures in wireless sensor networks. International Journal of High Performance Computing and Networking, 10, 3925–3937.
Nait-Abdesselam, F., Bensaou, B., & Taleb, T. (2008). Detecting and avoiding wormhole attacks in wireless ad hoc networks. IEEE Communications Magazine, 46, 127–133.
Sen, J., Koilakonda, S., & Ukil, A. (2011). A mechanism for detection of cooperative black hole attack in mobile ad hoc networks. In 2011 second international conference on intelligent systems, modelling and simulation (ISMS), 2011 (pp. 338–343).
Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). DoS attacks in mobile ad hoc networks: A survey. In 2012 second international conference on advanced computing & communication technologies (ACCT), 2012 (pp. 535–541).
Yan, Z., Zhang, P., & Vasilakos, A. V. (2016). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks, 9, 3059–3069.
Gao, H., Hu, J., Huang, T., Wang, J., & Chen, Y. (2011). Security issues in online social networks. IEEE Internet Computing, 15, 56–63.
Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., & Thapa, B. (2013). Performance of IEEE 802.11 under jamming. Mobile Networks and Applications, 18, 678–696.
Stallings, W. (2013). Software-defined networks and openflow. The Internet Protocol Journal, 16, 2–14.
Singh, V. P., Ukey, A. S. A., & Jain, S. (2013). Signal strength based hello flood attack detection and prevention in wireless sensor networks. International Journal of Computer Applications, 62, 1–6.
Sheela, D., Kumar, C. N., & Mahadevan, G. (2011). A non cryptographic method of sink hole attack detection in wireless sensor networks. In 2011 international conference on recent trends in information technology (ICRTIT), 2011 (pp. 527–532).
Nithya, S., & Gomathy, C. (2018). An investigation on security attacks in wireless sensor network. International Journal of Pure and Applied Mathematics, 119, 927–935.
Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016). Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Transactions on Computers, 65, 2986–2998.
La, Q. D., Quek, T. Q., Lee, J., Jin, S., & Zhu, H. (2016). Deceptive attack and defense game in honeypot-enabled networks for the internet of things. IEEE Internet of Things Journal, 3, 1025–1035.
Al-Rubaie, M., & Chang, J. M. (2016). Reconstruction attacks against mobile-based continuous authentication systems in the cloud. IEEE Transactions on Information Forensics and Security, 11, 2648–2663.
Sahay, R., Blanc, G., Zhang, Z., & Debar, H. (2015) Towards autonomic DDoS mitigation using software defined networking. In SENT 2015: NDSS workshop on security of emerging networking technologies, 2015.
Vizváry, M., & Vykopal, J. (2014). Future of ddos attacks mitigation in software defined networks. In IFIP international conference on autonomous infrastructure, management and security, 2014 (pp. 123–127).
Shin, S., & Gu, G. (2013). Attacking software-defined networks: A first feasibility study. In Proceedings of the second ACM SIGCOMM workshop on hot topics in software defined networking, 2013 (pp. 165–166).
Wang, H., Xu, I., & Gu, G. (2015). Floodguard: A dos attack prevention extension in software-defined networks. In 2015 45th annual IEEE/IFIP international conference on dependable systems and networks (DSN), 2015 (pp. 239–250).
Dotcenko, S., Vladyko, A., & Letenko, I. (2014). A fuzzy logic-based information security management for software-defined networks. In 2014 16th international conference on advanced communication technology (ICACT), 2014 (pp. 167–171).
Jafarian, J. H., Al-Shaer, E., & Duan, Q. (2012). Openflow random host mutation: Transparent moving target defense using software defined networking. In Proceedings of the first workshop on hot topics in software defined networks, 2012 (pp. 127–132).
Xu, T., Gao, D., Dong, P., Zhang, H., Foh, C. H., & Chao, H.-C. (2017). Defending against new-flow attack in sdn-based internet of things. IEEE Access, 5, 3431–3443.
Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015). Internet of Things (IoT) security: Current status, challenges and prospective measures. In 2015 10th international conference for internet technology and secured transactions (ICITST), 2015 (pp. 336–341).
Tang, T. A., Mhamdi, L., McLernon, D., Zaidi, S. A. R., & Ghogho, M. (2016). Deep learning approach for network intrusion detection in software defined networking. In 2016 international conference on wireless networks and mobile communications (WINCOM), 2016 (pp. 258–263).
Vilalta, R., Ciungu, R., Mayoral, A, Casellas, R., Martinez, R., Pubill, D., et al. (2016). Improving security in Internet of Things with software defined networking. In Global communications conference (GLOBECOM), 2016 IEEE, 2016 (pp. 1–6).
Xue, N., Huang, X., & Zhang, J. (2016). S2Net: A security framework for software defined intelligent building networks. In Trustcom/BigDataSE/ISPA, 2016 IEEE, 2016 (pp. 654–661).
Öğütçü, G., Testik, Ö. M., & Chouseinoglou, O. (2016). Analysis of personal information security behavior and awareness. Computers & Security, 56, 83–93.
Vučinić, M., Tourancheau, B., Rousseau, F., Duda, A., Damon, L., & Guizzetti, R. (2015). OSCAR: Object security architecture for the Internet of Things. Ad Hoc Networks, 32, 3–16.
Raza, S., Duquennoy, S., Höglund, J., Roedig, U., & Voigt, T. (2014). Secure communication for the Internet of Things: A comparison of link-layer security and IPsec for 6LoWPAN. Security and Communication Networks, 7, 2654–2668.
Mattos, D. M. F., & Duarte, O. C. M. B. (2016). AuthFlow: Authentication and access control mechanism for software defined networking. Annals of Telecommunications, 71, 607–615.
Corchado, E., & Herrero, Á. (2011). Neural visualization of network traffic data for intrusion detection. Applied Soft Computing, 11, 2042–2056.
Koc, L., Mazzuchi, T. A., Sarkani, S., Mazzuchi, A., & Sarkani, S. (2012). A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier. Expert Systems with Applications, 39, 13492–13500.
Jyothsna, V., Prasad, V. R., & Prasad, K. M. (2011). A review of anomaly based intrusion detection systems. International Journal of Computer Applications, 28, 26–35.
Hoque, M. S., Mukit, M., Bikas, M., & Naser, A. (2012). An implementation of intrusion detection system using genetic algorithm. arXiv preprint arXiv:1204.1336.
Nayak, P., & Devulapalli, A. (2016). A fuzzy logic-based clustering algorithm for WSN to extend the network lifetime. IEEE Sensors Journal, 16, 137–144.
Tran, M. C., & Nakamura, Y. (2016). Behaviour similarity based to cluster automated HTTP communication. In 2016 IEEE sixth international conference on communications and electronics (ICCE), 2016 (pp. 19–24).
Nasser, O., AlThuhli, S., Mohammed, M., AlMamari, R., & Hajamohideen, F. (2015). An investigation of backdoors implication to avoid regional security impediment. In 2015 global conference on communication technologies (GCCT), 2015 (pp. 409–412).
Kumara, M. A., & Jaidhar, C. (2015). Virtual machine introspection based spurious process detection in virtualized cloud computing environment. In 2015 international conference on futuristic trends on computational analysis and knowledge management (ABLAZE), 2015 (pp. 309–315).
Zhu, Z., & Cao, G. (2013). Toward privacy preserving and collusion resistance in a location proof updating system. IEEE Transactions on Mobile Computing, 12, 51–64.
Nadji, Y., Perdisci, R., & Antonakakis, M. (2017). Still beheading hydras: Botnet takedowns then and now. IEEE Transactions on Dependable and Secure Computing, 14, 535–549.
Haddadi, F., & Zincir-Heywood, A. N. (2016). Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification. IEEE Systems Journal, 10, 1390–1401.
Wang, J., & Paschalidis, I. C. (2017). Botnet detection based on anomaly and community detection. IEEE Transactions on Control of Network Systems, 4, 392–404.
Matta, V., Di Mauro, M., & Longo, M. (2017). DDoS attacks with randomized traffic innovation: Botnet identification challenges and strategies. IEEE Transactions on Information Forensics and Security, 12, 1844–1859.
Rashidi, B., Fung, C., & Bertino, E. (2017). A collaborative ddos defence framework using network function virtualization. IEEE Transactions on Information Forensics and Security, 12, 2483–2497.
De Assis, M. V., Hamamoto, A. H., Abrao, T., & Proença, M. L. (2017). A game theoretical based system using holt-winters and genetic algorithm with fuzzy logic for DoS/DDoS mitigation on SDN networks. IEEE Access, 5, 9485–9496.
Gonzalez, R., Jiang, L. Ahmed, M., Marciel, M., Cuevas, R., Metwalley, H., et al. (2017). The cookie recipe: Untangling the use of cookies in the wild. In Network traffic measurement and analysis conference (TMA), 2017 (pp. 1–9).
Sood, A. K., Zeadally, S., & Bansal, R. (2017). Exploiting trust: stealthy attacks through socioware and insider threats. IEEE Systems Journal, 11, 415–426.
Fu, J., Liang, Y., Tan, C., & Xiong, X. (2010). Detecting software keyloggers with dendritic cell algorithm. In 2010 international conference on communications and mobile computing (CMC), 2010 (pp. 111–115).
Shar, L. K., Briand, L. C., & Tan, H. B. K. (2015). Web application vulnerability prediction using hybrid program analysis and machine learning. IEEE Transactions on Dependable and Secure Computing, 12, 688–707.
Tang, T., Mhamdi, L., Zaidi, S., El-moussa, F., McLernon, D., & Ghogho, M. (2019). A deep learning approach combining auto-encoder with one-class SVM for DDoS attack detection in SDNs. In Proceedings of the international conference on communications and networking.
Van Trung, P., Huong, T. T., Van Tuyen, D., Duc, D. M., Thanh, N. H., & Marshall, A. (2015). A multi-criteria-based DDoS-attack prevention solution using software defined networking. In International conference on advanced technologies for communications (ATC), 2015 (pp. 308–313).
Yang, H., & Wang, F. (2019). Wireless network intrusion detection based on improved convolutional neural network. IEEE Access, 7, 64366–64374.
Dhawan, M., Poddar, R., Mahajan, K., & Mann, V. (2015). SPHINX: Detecting security attacks in software-defined networks. In NDSS, 2015.
Shu, Z., Wan, J., Li, D., Lin, J., Vasilakos, A. V., & Imran, M. (2016). Security in software-defined networking: Threats and countermeasures. Mobile Networks and Applications, 21, 764–776.
Al-Ayyoub, M., Jararweh, Y., Benkhelifa, E., Vouk, M., & Rindos, A. (2015). Sdsecurity: A software defined security experimental framework. In 2015 IEEE international conference on communication workshop (ICCW), 2015 (pp. 1871–1876).
Akhunzada, A., Gani, A., Anuar, N. B., Abdelaziz, A., Khan, M. K., Hayat, A., et al. (2016). Secure and dependable software defined networks. Journal of Network and Computer Applications, 61, 199–221.
Liyanage, M., Ahmed, I., Ylianttila, M., Santos, J. L., Kantola, R., Perez, O. L., et al. (2015). Security for future software defined mobile networks. In 2015 9th international conference on next generation mobile applications, services and technologies, 2015 (pp. 256–264).
Zaalouk, A., Khondoker, R., Marx, R., & Bayarou, K. (2014). Orchsec: An orchestrator-based architecture for enhancing network-security using network monitoring and sdn control functions. In Network operations and management symposium (NOMS), 2014 IEEE (pp. 1–9).
Lara, A., & Ramamurthy, B. (2016). Opensec: Policy-based security using software-defined networking. IEEE Transactions on Network and Service Management, 13, 30–42.
Yuan, B., Zou, D., Yu, S., Jin, H., Qiang, W., & Shen, J. (2016). Defending against flow table overloading attack in software-defined networks. IEEE Transactions on Services Computing, 12, 231–246.
Ambrosin, M., Conti, M., De Gaspari, F., & Poovendran, R. (2015). Lineswitch: Efficiently Managing switch flow in software-defined networking while effectively tackling dos attacks. In Proceedings of the 10th ACM symposium on information, computer and communications security, 2015 (pp. 639–644).
Kandoi, R., & Antikainen, M. (2015). Denial-of-service attacks in OpenFlow SDN networks. In 2015 IFIP/IEEE international symposium on integrated network management (IM) (pp. 1322–1326).
Yan, Q., & Yu, F. R. (2015). Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Communications Magazine, 53, 52–59.
Ashraf, J., & Latif, S. (2014). Handling intrusion and DDoS attacks in Software Defined Networks using machine learning techniques. In 2014 National software engineering conference (pp. 55-60).
Funding
No funding was received for this study.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical Approval
All procedures performed in the studies involving human participants were in accordance with the ethical standards of the institutional and/or national research committee and with the 1964 Helsinki Declaration and its later amendments or comparable ethical standards.
Informed Consent
Informed consent was obtained from all individual participants included in the study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Singh, S., Jayakumar, S.K.V. A Study on Various Attacks and Detection Methodologies in Software Defined Networks. Wireless Pers Commun 114, 675–697 (2020). https://doi.org/10.1007/s11277-020-07387-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07387-y