An Effective SDN Controller Scheduling Method to Defence DDoS Attacks
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:An Effective SDN Controller Scheduling Method to Defence DDoS Attacks
  • 作者:LI ; Saifei ; CUI ; Yunhe ; NI ; Yongfeng ; YAN ; Lianshan
  • 英文作者:LI Saifei;CUI Yunhe;NI Yongfeng;YAN Lianshan;The School of Information Science and Technology Southwest Jiaotong University;
  • 英文关键词:Software defined networking(SDN);;Distributed Denial of Service(DDoS);;Security
  • 中文刊名:EDZX
  • 英文刊名:电子学报(英文)
  • 机构:The School of Information Science and Technology Southwest Jiaotong University;
  • 出版日期:2019-03-15
  • 出版单位:Chinese Journal of Electronics
  • 年:2019
  • 期:v.28
  • 基金:supported by the National Natural Science Foundation of China(No.61401374);; National Science Foundation for Distinguished Young Scholars of China(No.61325023);; Sichuan Science&Technology Planning Project(No.2017JY0030)
  • 语种:英文;
  • 页:EDZX201902027
  • 页数:4
  • CN:02
  • ISSN:10-1284/TN
  • 分类号:185-188
摘要
Distributed Denial of Service(DDoS)attack is a difficult issue which needs to be addressed in Software defined networking(SDN). In order to help the controller to weather out the DDoS attack, an efficient controller scheduling method is proposed. The proposed controller scheduling method uses the normalized waiting time, length and extent of the switch being attacked to choose the request that needs to be processed by the controller. The evaluation results validate that compared with the polling based controller scheduling method, the proposed one can significantly reduce the connection failure ratio and delay.
        Distributed Denial of Service(DDoS)attack is a difficult issue which needs to be addressed in Software defined networking(SDN). In order to help the controller to weather out the DDoS attack, an efficient controller scheduling method is proposed. The proposed controller scheduling method uses the normalized waiting time, length and extent of the switch being attacked to choose the request that needs to be processed by the controller. The evaluation results validate that compared with the polling based controller scheduling method, the proposed one can significantly reduce the connection failure ratio and delay.
引文
[1]M.Casado,M.Freedman,J.Pettit,et al.,“Ethane:Taking control of the enterprise”,ACM SIGCOMM Computer Communication Review,Vol.37,No.4,pp.1-12,2007.
    [2]Y.Cui,L.Yan,S.Li,et al.,SD-Anti-DDoS:“Fast and efficient DDoS defence in software-defined networks”,Journal of Network and Computer Applications,Vol.68,pp.65-79,2016.
    [3]X.G.Zhang and W.Ding,“TCP flow identifying algorithm based on finite state automaton”,Acta Electronica Sinica,Vol.45,No.6,pp.1396-1402,2017.
    [4]S.Lim,S.Yang,Y.Kim,et al.,“Controller scheduling for continued SDN operation under DDoS attacks”,Electronics Letters,Vol.51,No.16,pp.1259-1261,2015.
    [5]Q.Yan,Q.Gong,and F.R.Yu,“Effective software-defined networking controller scheduling method to mitigate DDoSattacks”,Electronics Letters,Vol.53,No.7,pp.469-471,2017.
    [6]A.Hussein,I.H.Elhajj,A.Chehab,et al.,“SDN security plane:An architecture for resilient security services”,IEEEInternational Conference on Cloud Engineering Workshop(IC2EW),pp.54-59,2016.
    [7]R.Macedo,R.D.Castro,A.Santos,et al.,“Selforganized SDN controller cluster conformations against DDoSattacks effects”.IEEE Global Communications Conference(GLOBECOM),pp.1-6,2016.
    [8]S.W.Hsu,T.Y.Chen,C.Y.Chang,et al.,“Design a hashbased control mechanism in vSwitch for software-defined networking environment”,IEEE International Conference on Cluster Computing,pp.498-499,2015.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700