ABSTRACT
Network Function Virtualization (NFV) provides numerous advantages over the conventional network through the implementation of different network functions over Virtual Machine (VM). For greater flexibility, it reduces capital and operating expenditure. Nonetheless, due to various forms of cyber attacks such as Distributed Denial of Service (DDoS) attack, these advantages come at the price of the inherent weakness of the network. The increased number of layers in NFV makes it more feasible for an attacker to carry out a DDoS attack. This research suggests a new paradigm to mitigate the impact of DDoS attacks on NFV. Typically, when it detects the DDoS attack on the application layer, DDoSify performs server migration and IP spoofing. DDoSify's effectiveness was tested by calculating processing time during load migration and IP spoofing.
- "Network Function Virtualization & its Impact on Future Telecom Network" http://tec.gov.in/pdf/Studypaper/Network_Function_Virtualization%20.pdf, (Accessed on 01st November 2019).Google Scholar
- Shankar, Lal, Taleb Tarik, and Dutta Ashutosh. "NFV: Security Threats And Best Practices." IEEE Communications Magazine 55.8 (2017): 2.Google Scholar
- ETSI, "Network Functions Virtualization" https://www.etsi.org/images/files/ETSITechnologyLeaflets/NetworkFunctionsVirtualization.pdf (Accessed on 3rd November 2019).Google Scholar
- B. Zhou, Luying, and Huaqun Guo. "Applying NFV/SDN in mitigating DDoS attacks." TENCON 2017-2017 IEEE Region 10 Conference. IEEE, 2017.Google Scholar
- Liu, Guyue, and Timothy Wood. "NetDefense: scalable flexible and efficient ddos prevention with sdn and nfv."Google Scholar
- Krishnan, Ram, Dilip Krishnaswamy, and Dave Mcdysan. "Behavioral security threat detection strategies for data center switches and routers." 2014 IEEE 34th international conference on distributed computing systems workshops (ICDCSW). IEEE, 2014.Google Scholar
- Jakaria, A. H. M., et al. "Vfence: A defense against distributed denial of service attacks using network function virtualization." 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC). Vol. 2. IEEE, 2016.Google Scholar
- Rashidi, Bahman, and Carol Fung. "CoFence: A collaborative DDoS defence using network function virtualization." 2016 12th International Conference on Network and Service Management (CNSM). IEEE, 2016.Google Scholar
- Beitollahi, H., & Deconinck, G. (2012). Tackling application-layer DDoS attacks. Procedia Computer Science, 10, 432--441.Google Scholar
- Aupetit, Michael, et al. "Visualization of actionable knowledge to mitigate DRDoS attacks." 2016 IEEE Symposium on Visualization for Cyber Security (VizSec). IEEE, 2016Google Scholar
Index Terms
- DDoSify: Server Workload Migration During DDOS Attack In NFV
Recommendations
Denial of ARP spoofing in SDN and NFV enabled cloud-fog-edge platforms
AbstractIn order to support a variety of Internet of Things (IoT) and smart city applications, it is necessary to provide computing and networking resources at cloud, fog and edge levels. Fortunately, evolution of Network Function Virtualization (NFV) and ...
Smart and Lightweight DDoS Detection Using NFV
ICCDA '17: Proceedings of the International Conference on Compute and Data AnalysisThe Distributed Denial of Service (DDoS) attack is a major threat to the network infrastructure. Network providers suffer from various types of DDoS attacks; the attack uses different advanced techniques such as botnets and tools to launch the attacks. ...
Improved Network Traffic by Attacking Denial of Service to Protect Resource Using Z-Test Based 4-Tier Geomark Traceback (Z4TGT)
AbstractNetwork security plays a vital role in protecting the resources available in the network against various threats. There are vulnerabilities in every system connected to the network. Due to these, unauthorized users try to access and utilize the ...
Comments