24/7 writing help on your phone
Save to my list
Remove from my list
SDN networks are a new innovation in the network world. The control layer and the data layer are separated and an interface (OpenFlow) is provided to make the network easier to control.
Mininet is a tool that is used to simulate a SDN network. A DDOS (distributed denial of service) attack is a planned attack carried out by a large number of devices that have been hacked. This is called a botnet. The Bot is the main server which instructs all other devices to carry out the attack.
The other devices combine to form the botnet (Robot Network). It is often very difficult to detect such an attack. The project aims to detect a DDoS attack using 3 algorithms. We compare the accuracy of supervised learning algorithm (Random Forest), semi supervised (SVM )and unsupervised learning algorithm(K-means).
Index Terms DDoS Attack, GET Flooding Attack, Web Security, MapReduce, Anomaly, a hidden Markov model (HMM), hostbased intrusion detection, postmortem intrusion detection, sequitur, Packet capture, traffic analysis
A DDOS attack is a vicious attempt to avoid ordinary traffic by overwhelming the target or its surrounding infrastructure by attempting to achieve a specific server, service or network with large amounts of traffic.
A DDoS attack is difficult to detect because of the high bandwidth pathways that the networks require.
SDN are networking architecture that targets to make a net-work quick and flexible. SDN’s main objective is to improve a network by using a software application to intelligently control or program.
In order to compete with evolving company trends, several service providers and companies are inclined towards SDN technology. SDN enables the continuous man-agement of complex networks.
THE WORKING OF SDN: SDN techniques tend to unify network control by dividing the control logic from the funds of off-device computers. An SDN controller, northbound APIs and southbound APIs are included in all SDN networking alternatives.
It is also known as the networks’ “brain”. Its aim is to provide the general network with a centralized element.
These APIs are majorly used for communication purpose with applications and business logic and also support in deploying services.
Software Defined Network uses southbound APIs to provide router and switch data.
There are many benefits in placing DDoS defenses close to the sources of the attack. The attack flows can be halted before they reach the Internet core and mix with other flows. Being near to the source can make traceback and inquiry of the attack simpler. The small degree of flow aggregation enables greater precision to use more complicated detection strategies. It is also probable that routers nearer to the sources will relay less traffic than key routers and can devote more of their energy to DDoS defense.
The D-WARD system is mounted on the source router which acts as a portal between the network deploying (source network) and the remainder of the Internet.
Keeping traffic statistics on a backbone router for each location is obviously infeasible. Here we consider a traffic profile that can be gathered with little overhead and most intruders should be detected. Only high-traffic destinations need to be considered at any stage of moment, as those are precisely the ones that are likely to be under assault. Thus, each router uses a sample-and-hold algorithm to monitor destinations whose traffic occupies more than a fraction of the outgoing link’s capability C. We call these destinations common and not unpopular in this list.Traffic profiles are essentially a collection of traffic fin-gerprints (Fi) to famous locations at each router. The key to characterizing traffic streams is an efficient selection of such fingerprints. However, excessive memory and/or computation may be required to compute arbitrary fingerprints. We rec-ognized several fingerprints that can be calculated effectively using stream sampling algorithms.
This utilizes Source IP Address Monitoring SIM, which includes two components: off-line instruction, and teaching and detection[ 3]. The first part is off-line training, where a learning engine adds valid IP addresses to an IP Address Database (IAD) and keeps the IAD updated by adding fresh valid IP addresses and deleting expired IP addresses[ 3]. This is performed off-line to ensure that there are no bandwidth attacks in the traffic data used for instruction[ 3]. It is possible to use a straightforward rule to decide whether or not a fresh IP address is valid[ 3]. For instance, an abnormal IP flow is regarded to be a TCP connection with less than 3 packets .
A single autonomous system (AS) corresponds to each net-work domain. The AS domain is fitted with a CAT server for aggregating data on traffic changes identified on the routers. All CAT servers exchange data on flooding alerts to make choices on worldwide detection across various domains[ 4]. A fresh safe infrastructure protocol (SIP) is created to create confidence between them to resolve the disputes in security policies in distinct supplier domains. Scalable performance findings are recorded in the DETER testbed for the imple-mentation of the DCP detection scheme over 16 domains. The simulated Internet environment shows that 4 domains are adequate to deliver 98% precision detection of TCP SYN and UDP flooding assaults with less than 1% fake alarms. The DCP scheme is demonstrated to be scalable to 84 domains by using ISP-controlled AS domains, which appeals for real-life internet deployment.
In this system for DoS detection, we track incoming traffic to evaluate different decision-making characteristics and use the highest probability criterion for detection make individual choices for every input characteristics . In a fusion stage, the gathered data is then merged to produce a general traffic choice. It utilizes a technique of comparing the likelihood ratio and implementation of two distinct RNN architectures (feed forward and recurrent).
This highlights all these problems and suggests a distributed weight-fair router throttling algorithm that counteracts denial-of-service attacks directed to an internet server. In the context of throttling upstream routers, the protection mechanism is comparable to that of [Yau et al. ]. However, leaky buckets of various types are mounted and the buckets are placed in a subset of routers on all routers instead of a standardized leaky bucket. Fairness is accomplished by providing the routers linked to a greater amount of legitimate customers more bandwidth and vice versa.
The suggested structure consists of some heterogeneous defense mechanisms that work together to safeguard against assaults. Use of statistical methods to protect against DDoS attacks and mitigate their effect [Ohsita et al. 2004, Li et al. 2005, Jin and Yeung 2004, Chuah et al. 2004 ] is becoming increasingly interesting. Packet statistics from on-line history data are monitored to classify normal and attack traffic.
An approach for predicting the service rate on a server to avoid overloading the server. With such a forecast, we can take precautionary steps to avoid a server crackdown that can be triggered by DDoS assaults or other factors such as system malfunctions.
This is a new model for detecting DDoS attacks based on CRF (conditional random fields). It includes signature-based and anomaly-based techniques of detection to form a hybrid system. This is possible because CRFs have the ability to synthesize many features into a union detection vector without needing independence.
The traffic tracking status is described by a term, IP Flow Entropy (IPE). The model can be used by combining IPE, One-Way Connection Density (OWCD) and other features into one metric to recognize various DDoS attacks with high sensitivity and low false alarm rate.
Checking incoming traffic against outgoing traffic is a technique to detect TCP hosted DDoS attacks at the earliest. This would differ massively (than usual) in the event of an assault. Even transit routers can detect the DDoS attack through this technique. A sudden rise in traffic and behavioral resemblance are excellent indicators for other DDoS assaults.
The sampling method is invoked if the preliminary detection of the attack is positive. For each IP address, the sampling method instantly assigns a distinct rate counter. Number of samples are collected by the rate counter where a sample is the collection of all incoming packets per second.
In the current information communication setting, network and system safety are of paramount significance. Hackers and intruders can generate many effective efforts by unauthorized intrusion to cause the crash of networks and web services. New threats and related solutions are emerging along with secured system evolution to avoid these threats. An Intrusion Detection analyses and predicts user behaviours and then classifies these behaviours as either an assault or a normal behaviour. To detect network intrusions, we use Rough Set Theory (RST) and Support Vector Machine (SVM). First, packets are captured from the network, then RST is used for information pre-processing and size reduction. The characteristics chosen by RST will be sent for learning and testing to the SVM model. The technique is efficient in reducing information spatial density. The studies compare the outcomes with Principal Component Analysis (PCA) and demonstrate that the scheme of RST and SVM could decrease the false positive rate and boost precision.
This research recommends a technique of integration between GET flooding between DDOS attacks and MapReduce processing for quick attack detection in a cloud computing environment . This research proposes a technique of integration between GET flooding between DDOS attacks and MapReduce processing to quickly detect attacks in a cloud computing setting. This technique needs the accessibility of a target scheme based on GET flooding for precise and reliable detection. This technique is discovered to be better than Snort detection in studies because processing time is short even with increased congestion.
This article describes separate attack patterns for DDoS attacks on nodes in wireless sensor networks for three most frequently used network topologies. A decentralized pattern recognition system based on Graph Neuron (GN) is suggested for attack detection. The system analyses the network’s inner traffic flow for patterns of DDoS attack.
When an intrusion happens, the security staff must assess the compromised IT resources to determine how it was accessed. This evaluation generally demonstrates that the attacker has run an exploit that takes benefit of a scheme weakness. Pinpointing, in a specified log file, is very useful for computer security to execute one such exploit, if any. This is both because it speeds up the process of gathering evidence of intrusion and because it helps to take action to prevent any more intrusion. This issue that we are calling post-mortem intrusion detection, It is quite complicated due to the difficulty of precisely identifying where the intrusion happened. A strategy is suggested for the identification of post-mortem intrusion. A classifier differentiates abnormal behaviour from normal behaviour. This classifier is based on a technique that combines with k-means and concealed Markov model.
Computer software is regarded as a packet sniffer capable of intercepting and recording traffic through a digital network or part of a network. By setting the NIC card in promiscuous mode, the sniffer captures and eventually decodes these packets. The decoded data can be used to identify an attack in any manner necessary. Depending on the network structure, you can select all or just traffic parts from a single device within the network. However, there are several methods to stop traffic narrowing from switching in order to gain access to traffic from other network devices. Packet sniffer is used to detect intrusion and its work. It also seeks to identify such a software’s presence on the network and attempts to manage it effectively. Due to a self-developed packet sniffer, the focus was also set to analyze the bottleneck situation that arises in the network. A minute observation had been made before the development of this indigenous software on the working behavior of already existing sniffer software such as Wireshark (formerly known as ethereal), TCP dump, and snort, which serve as the basis for the development of our sniffer software. A library known as LIBPCAP was used to catch the packets. Developing such software provides the developer an opportunity to create extra characteristics that might be needed.
The existing system compares four different machine learning algorithms ,viz, J48, Random Forest (RF), Support Vector Machine (SVM), and K-Nearest Neighbors (K-NN) . to obtain a modal that provides the best detection rate.
The current system performs Signature Detection by classifying the incoming requests as normal or anomaly and then depending upon the values that are obtained the users sending the anomaly requests are warned.
The major disadvantage of the present system is that Naive Bayes takes a lot of time for training and processing the data. As training dataset increase it takes more time to train the data. Na?ve Bayes uses a large dataset and thus the classifier consumes a lot of time to get trained.
The following section describes the proposed system to detect the DDoS attacks in SDN. We are using machine learning algorithms, namely, supervised learning algorithm (Random Forest), semi supervised (SVM)and unsupervised learning algorithm(K-means). We will use POX Controller to implement the detection system. Initially we will create the required topology using Mininet. Mininet is a software that creates virtual hosts, links, switches and controllers. It runs on a Linux software and also supports OpenFlow. Once we have created the topologies, we will simulate a DDoS attack using Scapy(creates custom packets), Cbench( stresses an openflow controller), Hping(generates TCP/UDP/ICMP attacks).
The next step is to create a feature vector using features like speed of source IP, speed of source port, standard deviation of flow packets, deviation of flow bytes, speed of flow entries.
👋 Hi! I’m your smart assistant Amy!
Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.get help with your assignment