{"title":"Enhancing SDN resilience against DDoS attacks through dynamic virtual controller deployment and attack level detection algorithm","authors":"Florance G., R J Anandhi","doi":"10.1007/s41870-024-02064-w","DOIUrl":null,"url":null,"abstract":"<p>The rapid evolution of network traffic created various problems in detecting Distributed Denial of Service (DDOS) attacks. The manifestation of Software Defined Networking (SDN) provides some individuality in that the SDN Controller uses a technique to examine the acquired data from the Flow Table (FT). As traffic increases, the controller's processing capability decreases, resulting in insufficient space availability for the FT and flow buffer. Understanding the struggles that exist in the controller and FT, this study provided a distinctive procedure that will increase performance, reduce controller load, manage FT space, and flow buffers that are activated by the Virtual Controller (VC). It dynamically completes the bundle of packets received at the router/switch, analyze the FT using the Attack Level Detection (ALD) method, assesses the bandwidth utilization of a particular user, and maps to the ingress port. The ALD algorithm detects mismatched packets and congested packets originating from faked IP and network addresses. This effort is related with the regular scenario and the attack level scenario, which use a mininet simulator with two controllers, the POX controller and the Open Daylight controller, to simulate major performance variations. This study efficiently lowers the overload of the VC and FT, hence preventing the DDoS assault employing VC.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"43 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/s41870-024-02064-w","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The rapid evolution of network traffic created various problems in detecting Distributed Denial of Service (DDOS) attacks. The manifestation of Software Defined Networking (SDN) provides some individuality in that the SDN Controller uses a technique to examine the acquired data from the Flow Table (FT). As traffic increases, the controller's processing capability decreases, resulting in insufficient space availability for the FT and flow buffer. Understanding the struggles that exist in the controller and FT, this study provided a distinctive procedure that will increase performance, reduce controller load, manage FT space, and flow buffers that are activated by the Virtual Controller (VC). It dynamically completes the bundle of packets received at the router/switch, analyze the FT using the Attack Level Detection (ALD) method, assesses the bandwidth utilization of a particular user, and maps to the ingress port. The ALD algorithm detects mismatched packets and congested packets originating from faked IP and network addresses. This effort is related with the regular scenario and the attack level scenario, which use a mininet simulator with two controllers, the POX controller and the Open Daylight controller, to simulate major performance variations. This study efficiently lowers the overload of the VC and FT, hence preventing the DDoS assault employing VC.