Skip to main content

Research on DDoS Abnormal Traffic Detection Under SDN Network

  • Conference paper
  • First Online:
Book cover Parallel Architectures, Algorithms and Programming (PAAP 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1163))

  • 1397 Accesses

Abstract

The seperation of control layer from data layer through SDN (software defined network) enables network administrators to plan the network programmatically without changing network devices, realizing flexible configuration of network devices and fast forwarding of data flows. However, due to its construction, SDN is vulnerable to be attacked by Distributed Denial of Service (DDoS) attack. So it is important to detect DDoS attack in SDN network. This paper presents a DDoS detection scheme based on the machine learning method of SVM (support vector machine) support vector machine in SDN environment. By extracting the flow table information features in SDN network, the data is detected and the data model of DDoS traffic can be trained, and the purpose of DDoS abnormal traffic identification is finally realized.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xiao, M.: Comparative analysis of commercial SDN schemes for cloud computing data centers. J. Mianyang Norm. Univ. 38(02), 83–87+139 (2019)

    Google Scholar 

  2. Jiang, M.: Application analysis of SDN in data center. Commun. World 26(01), 91–92 (2019)

    Google Scholar 

  3. Lu, W., Liu, T., Liu, X., Ye, Q.: Research on intelligent SDN wave separation network deployment. Post Telecommun. Des. Technol. (01), 26–30 (2019)

    Google Scholar 

  4. Zhang, Q.: Automatic deployment framework of security service chain based on SDN/NFV. Appl. Comput. Syst. 27(03), 198–204 (2008)

    Article  Google Scholar 

  5. Liu, T.: Research on node security control technology of SDN network. Beijing University of Posts and Telecommunications (2017)

    Google Scholar 

  6. Yang, Y., Yang, J., Sun, Y.: Research on implementation mechanism and defense of distributed denial of service attack. Comput. Eng. Des. 25(5), 657–660 (2004)

    Google Scholar 

  7. Liu, S.: Link flooding attack detection and defense based on SDN and NFV. Wuhan University (2017)

    Google Scholar 

  8. Zheng, Z., Wang, M.: Application of k-means clustering algorithm based on big data in network security detection. J. Hubei Second Normal Univ. 33(02), 36–40 (2016)

    Google Scholar 

  9. Tang, G.: Research on secure control and forwarding technology of SDN network based on password identification. University of Information Engineering of Strategic Support Force (2018)

    Google Scholar 

  10. Cheng, J., Gong, J., Yang, W., Zang, X.: Research on network intrusion tracking and response system based on SDN technology. J. Commun. 39(S1), 244–250 (2008)

    Google Scholar 

  11. Yu, P., Qi, Y., Li, Q.: DDoS attack detection method based on random forest classification model. Comput. Appl. Res. 34(10), 3068–3072 (2017)

    Google Scholar 

  12. Jadidi, J.Z, Muthukkumarasamy, V., Sithirasenan, E., et al.: Flow-based anomaly detection using neural network optimized with GSA algorithm. In: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops, Philadelphia, PA, pp. 76–81 (2013)

    Google Scholar 

  13. Van Trung, P., Huong, T.T., Van Tuyen, D., et al.: A multi-criteria-based DDoS-atack prevention solution using software defined networking. In: 2015 International Conference on Advanced Technologies for Communications (ATC), Ho Chi Minh City, pp. 308–313 (2015)

    Google Scholar 

  14. Tang, T.A., Mhamd, L., McLernon, D., et al.: Deep learning approach for network intrusion detection in software defined networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), Marakesh, Moroco, pp. 258–263 (2016)

    Google Scholar 

  15. Yu, K.: Large-scale deep learning at Baidu. In: 22nd ACM International Conference on Information & Knowledge Management, pp. 2211–2212 (2013)

    Google Scholar 

  16. Robinson, R.R.R., Thomas, C.: Ranking of machine learning algorithms based on the performance in classifying DDos attacks. In: 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS), Trivandrum, pp. 185–190 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jialiang Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ma, Z., Huang, J. (2020). Research on DDoS Abnormal Traffic Detection Under SDN Network. In: Shen, H., Sang, Y. (eds) Parallel Architectures, Algorithms and Programming. PAAP 2019. Communications in Computer and Information Science, vol 1163. Springer, Singapore. https://doi.org/10.1007/978-981-15-2767-8_33

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-2767-8_33

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-2766-1

  • Online ISBN: 978-981-15-2767-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics