Reference Hub3
New Detection Mechanism for Distributed Denial of Service Attacks in Software Defined Networks

New Detection Mechanism for Distributed Denial of Service Attacks in Software Defined Networks

Khalid Mohamed Hosny, Ameer El-Sayed Gouda, Ehab Rushdy Mohamed
Copyright: © 2020 |Volume: 12 |Issue: 2 |Pages: 30
ISSN: 1941-6253|EISSN: 1941-6261|EISBN13: 9781799805687|DOI: 10.4018/IJSKD.2020040101
Cite Article Cite Article

MLA

Hosny, Khalid Mohamed, et al. "New Detection Mechanism for Distributed Denial of Service Attacks in Software Defined Networks." IJSKD vol.12, no.2 2020: pp.1-30. http://doi.org/10.4018/IJSKD.2020040101

APA

Hosny, K. M., Gouda, A. E., & Mohamed, E. R. (2020). New Detection Mechanism for Distributed Denial of Service Attacks in Software Defined Networks. International Journal of Sociotechnology and Knowledge Development (IJSKD), 12(2), 1-30. http://doi.org/10.4018/IJSKD.2020040101

Chicago

Hosny, Khalid Mohamed, Ameer El-Sayed Gouda, and Ehab Rushdy Mohamed. "New Detection Mechanism for Distributed Denial of Service Attacks in Software Defined Networks," International Journal of Sociotechnology and Knowledge Development (IJSKD) 12, no.2: 1-30. http://doi.org/10.4018/IJSKD.2020040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Software defined networks (SDN) are a recently developed form for controlling network management by providing centralized control unit called the Controller. This master Controller is a great power point but at the same time it is unfortunately a failure point and a serious loophole if it is targeted and dropped by attacks. One of the most serious types of attacks is the inability to access the Controller, which is known as the distributed denial of service (DDoS) attack. This research shows how DDoS attack can deplete the resources of the Controller and proposes a lightweight mechanism, which works at the Controller and detects a DDoS attack in the early stages. The proposed mechanism can not only detect the attack, but also identify attack paths and initiate a mitigation process to provide some degree of protection to network devices immediately after the attack is detected. The proposed mechanism depends on a hybrid technique that merges between the average flow initiation rate, and the flow specification of the coming traffic to the network.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.