DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN

DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN

Rochak Swami, Mayank Dave, Virender Ranga
Copyright: © 2021 |Pages: 17
DOI: 10.4018/978-1-7998-5348-0.ch013
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Distributed denial of service (DDoS) attack is one of the most disastrous attacks that compromises the resources and services of the server. DDoS attack makes the services unavailable for its legitimate users by flooding the network with illegitimate traffic. Most commonly, it targets the bandwidth and resources of the server. This chapter discusses various types of DDoS attacks with their behavior. It describes the state-of-the-art of DDoS attacks. An emerging technology named “Software-defined networking” (SDN) has been developed for new generation networks. It has become a trending way of networking. Due to the centralized networking technology, SDN suffers from DDoS attacks. SDN controller manages the functionality of the complete network. Therefore, it is the most vulnerable target of the attackers to be attacked. This work illustrates how DDoS attacks affect the whole working of SDN. The objective of this chapter is also to provide a better understanding of DDoS attacks and how machine learning approaches may be used for detecting DDoS attacks.
Chapter Preview
Top

Distributed Denial Of Service Attacks

DDoS is considered as one of the most serious attacks nowadays. A DDoS is a cyber-attack that attempts to block the online services by overwhelming requests for a time period (Gupta et al., 2009). The target system is forced to slow down, crash or shut down by the flooding of a large number of requests. DDoS attacker keeps the system busy for a certain period of time by forcing the system to serve illegitimate requests consequently denying the services to legitimate customers. One of the most important security principles of the CIA (Confidentiality, Integrity, and Availability) model is availability, which is compromised by DDoS attacks. According to a report (Goodin, 2018), a US based service provider was targeted by a 1.7Tbps attack on 5 March 2018. The attacker spoofed its victim’s address and sent a number of packets with ping at a memcached server. The server responded by firing back as much as 50,000 times the data it received. This flooding of traffic was enough to exhaust the server and to deny the services for its legitimate users.

Complete Chapter List

Search this Book:
Reset