TY - GEN
T1 - Identifying DoS attacks on software defined networks
T2 - 2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016
AU - Aleroud, Ahmad
AU - Alsmadi, Izzat
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/6/30
Y1 - 2016/6/30
N2 - The recent emerge of Software Defined Networking (SDN) promotes both supporters and opponents to further explore this network architecture. One of the main attributes that characterize SDN is the significant role of software to manage and control the architecture. There are four major concerns for such software dominant role, security, performance, reliability, and fault tolerance. Among them security is considered a major concern. SDNs security concerns include attacks on the control plane layer such as DoS attacks. This paper presents an inference-relation context based technique for the detection of DoS attacks on SDNs. The proposed technique utilizes contextual similarity with existing attack patterns to identify DoS in an OpenFlow infrastructure. A validation of the proposed technique has been performed using a several benchmark datasets yielding promising results.
AB - The recent emerge of Software Defined Networking (SDN) promotes both supporters and opponents to further explore this network architecture. One of the main attributes that characterize SDN is the significant role of software to manage and control the architecture. There are four major concerns for such software dominant role, security, performance, reliability, and fault tolerance. Among them security is considered a major concern. SDNs security concerns include attacks on the control plane layer such as DoS attacks. This paper presents an inference-relation context based technique for the detection of DoS attacks on SDNs. The proposed technique utilizes contextual similarity with existing attack patterns to identify DoS in an OpenFlow infrastructure. A validation of the proposed technique has been performed using a several benchmark datasets yielding promising results.
KW - Software defined networking
KW - attack models
KW - flooding attacks
KW - graph models
KW - network security
KW - security controls
UR - http://www.scopus.com/inward/record.url?scp=84979782551&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84979782551&partnerID=8YFLogxK
U2 - 10.1109/NOMS.2016.7502914
DO - 10.1109/NOMS.2016.7502914
M3 - Conference contribution
AN - SCOPUS:84979782551
T3 - Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium
SP - 853
EP - 857
BT - Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium
A2 - Badonnel, Sema Oktug
A2 - Ulema, Mehmet
A2 - Cavdar, Cicek
A2 - Granville, Lisandro Zambenedetti
A2 - dos Santos, Carlos Raniery P.
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 25 April 2016 through 29 April 2016
ER -