IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 4, April 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Detection Of UDP Attacks In Software Defined Networks Using Fuzzy Logic

[Full Text]

 

AUTHOR(S)

Ogunleye G.O., Fasan Oluwabukola

 

KEYWORDS

SDN, DDoS, Fuzzy Logic, Attacks

 

ABSTRACT

Software Defined Network (SDN) is a new network technology in which the control plane and data plane are separated to make the network more flexible and dynamic. Security is one of the biggest challenges in SDN. Due to the controller which serves as the single point of failure, the network can be easily disrupted by Distributed Denial of Service (DDoS) attack. The existing detection techniques have concentrated more on other DDoS attacks but focus less on UDP attack. In the proposed work, we examine UDP based DDoS protocol, prototyped Software-Defined network using mininet and POX controller. We further experiment how UDP attack can be performed in SDN, design a fuzzy model using Jfuzzylite library and detect the UDP attack in a software-defined network using fuzzy logic model. The packets are classified into normal and attack packets. Confusion matrix is used to calculate the accuracy of the model.

 

REFERENCES

[1] Al-Musawi, B. (2012). Mitigating Dos/DDoS Attacks Using IPtables. International Journal of Engineering and Technology, 12(3), 101-111.
[2] Anand, A., & Patel, B. (2012).An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different protocols.International Journal of Advanced Research in Computer Science and Software Engineering, 2(8), 94-98.
[3] Bawany, N., Shamsi1, J., Salah, k., (2017). DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions.Computer Engineering and computer
Science
[4] Behrooz, F., Mariun, N., Marhaban, H., Radzi, M., &Ramli, A., (2018). Review of Control
Techniques for HVAC Systems—Nonlinearity Approaches Based on Fuzzy
Cognitive Maps.Energies 2018, 11, 495.
[5] Dayal, N., Maity, P., Srivastava, S., &Khondoker, R., (2017). Research Trends in Security
andDDoS in SDN.Security and Communication Networks,6386- 6411.
[6] Debojit, B., Basumatary, H., Goswami, T., &Bahattachryya, D., (2016). UDP flooding attack
detection using information metric measure. Proceedings of International
Conference on ICT for Sustainable Development, 143-153.
[7] Mitrocotsa, A., and Douligeris, C., (2003). DDoS Attack and Defence Mechanism: AClassification.Signal processing and information technology in 3rd IEEE, International Symposium, 190-193.
[8] Muñoz, M., Miranda, E., & Sánchez, PJ., (2017). A Fuzzy System for Estimating Premium Cost of Option Exchange Using Mamdani Inference: Derivatives Market ofMexico. International Journal of Computational Intelligence Systems, 10, 153–164.
[9] Kahraman, C., Oztaysi, B., &Onar, S.,(2016). A Comprehensive Literature Review of 50 Years of Fuzzy Set Theory.International Journal of Computational Intelligence Systems, 9(1), 3-24.
[10] Kreutz, D., Ramos, M. V., Verissimo, P., Rothenberg, C., Azodolmolky, S. and Steve Uhlig, S. (2015). Software-Defined Networking: A Comprehensive Survey.Proceedings of the IEEE, 103(1):14–76.
[11] Ozturk, V.,(2013). Selection of appropriate software development life cycle using fuzzy logic. Journal of Intelligent & Fuzzy Systems 25 (2013) 797–810
[12] Sager. (2014) Why Do People Perform DDoSAttack [Blogpost].Retrievedfromhttps://brainstuffshow.com/blogs/why-do-people-perform-ddos-attackes.html
[13] Sezer, S., Scott-Hayward, S., KaurChouhan, P., Fraser, B., Lake, D., Finnegan, J., Viljoen, N., Miller, M., &Rao, N., (2013, july). Are We Ready for SDN? Implementation Challenges for Software-Defined Networks.IEEE Communications Magazine, 36-43.
[14] Sharma, N., Mahajan, A., &Mansotra V., (2016). Machine Learning Techniques Used inDetection of DOS Attacks: A Literature Review.International Journal of AdvancedResearch in Computer Science and Software Engineering, 3(10),100-105.
[15] Shiaeles, N., Katos, V., Karakos, A., & Papadopoulos, B., (2012). Real-time DDoSDetection Using Fuzzy Estimators.Computers and networks,782-790.
[16] Siahaan, A., (2016). Fuzzification of College Adviser Proficiency Based on SpecificKnowledge.International Journal of Advanced Research in Computer Scienceand Software Engineering. 6(7), 164-168.
[17] Specht, M., & Lee, R., (2004).Distributed Denial of Service: Taxonomies of Attacks, Toolsand Countermeasures. Proceedings of the 17th International Conference on parallel and Distributed Computing Systems, 2004 International Workshop on Security inParallel and Distributed Systems, 543-550.
[18] Swami, R., Dave, M., &Ranga, V. (2019) Software-defined networking-based ddosdefensemechanisms. ACM Computing Surveys (CSUR), 52(2), 28.