skip to main content
10.1145/3384544.3384602acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicscaConference Proceedingsconference-collections
research-article

DDoSify: Server Workload Migration During DDOS Attack In NFV

Authors Info & Claims
Published:17 April 2020Publication History

ABSTRACT

Network Function Virtualization (NFV) provides numerous advantages over the conventional network through the implementation of different network functions over Virtual Machine (VM). For greater flexibility, it reduces capital and operating expenditure. Nonetheless, due to various forms of cyber attacks such as Distributed Denial of Service (DDoS) attack, these advantages come at the price of the inherent weakness of the network. The increased number of layers in NFV makes it more feasible for an attacker to carry out a DDoS attack. This research suggests a new paradigm to mitigate the impact of DDoS attacks on NFV. Typically, when it detects the DDoS attack on the application layer, DDoSify performs server migration and IP spoofing. DDoSify's effectiveness was tested by calculating processing time during load migration and IP spoofing.

References

  1. "Network Function Virtualization & its Impact on Future Telecom Network" http://tec.gov.in/pdf/Studypaper/Network_Function_Virtualization%20.pdf, (Accessed on 01st November 2019).Google ScholarGoogle Scholar
  2. Shankar, Lal, Taleb Tarik, and Dutta Ashutosh. "NFV: Security Threats And Best Practices." IEEE Communications Magazine 55.8 (2017): 2.Google ScholarGoogle Scholar
  3. ETSI, "Network Functions Virtualization" https://www.etsi.org/images/files/ETSITechnologyLeaflets/NetworkFunctionsVirtualization.pdf (Accessed on 3rd November 2019).Google ScholarGoogle Scholar
  4. B. Zhou, Luying, and Huaqun Guo. "Applying NFV/SDN in mitigating DDoS attacks." TENCON 2017-2017 IEEE Region 10 Conference. IEEE, 2017.Google ScholarGoogle Scholar
  5. Liu, Guyue, and Timothy Wood. "NetDefense: scalable flexible and efficient ddos prevention with sdn and nfv."Google ScholarGoogle Scholar
  6. Krishnan, Ram, Dilip Krishnaswamy, and Dave Mcdysan. "Behavioral security threat detection strategies for data center switches and routers." 2014 IEEE 34th international conference on distributed computing systems workshops (ICDCSW). IEEE, 2014.Google ScholarGoogle Scholar
  7. Jakaria, A. H. M., et al. "Vfence: A defense against distributed denial of service attacks using network function virtualization." 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC). Vol. 2. IEEE, 2016.Google ScholarGoogle Scholar
  8. Rashidi, Bahman, and Carol Fung. "CoFence: A collaborative DDoS defence using network function virtualization." 2016 12th International Conference on Network and Service Management (CNSM). IEEE, 2016.Google ScholarGoogle Scholar
  9. Beitollahi, H., & Deconinck, G. (2012). Tackling application-layer DDoS attacks. Procedia Computer Science, 10, 432--441.Google ScholarGoogle Scholar
  10. Aupetit, Michael, et al. "Visualization of actionable knowledge to mitigate DRDoS attacks." 2016 IEEE Symposium on Visualization for Cyber Security (VizSec). IEEE, 2016Google ScholarGoogle Scholar

Index Terms

  1. DDoSify: Server Workload Migration During DDOS Attack In NFV

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICSCA '20: Proceedings of the 2020 9th International Conference on Software and Computer Applications
      February 2020
      382 pages
      ISBN:9781450376655
      DOI:10.1145/3384544

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 April 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader