Please use this identifier to cite or link to this item: http://repository.aaup.edu/jspui/handle/123456789/3213
Title: ONOS Flood Defender: A Real-Time Flood Attacks Detection and Mitigation System in SDN Networks
Other Titles: None
Authors: M N Hamarsheh, Mohammad$AAUP$Palestinian
Younis, Husein $AAUP$Palestinian
Keywords: Computer Networks
Network security
Computer Science
Issue Date: Feb-2025
Publisher: Concurrency And Computation: Practice And Experience
Citation: Younis, H. and Hamarsheh, M.M.N. (2025), ONOS Flood Defender: A Real-Time Flood Attacks Detection and Mitigation System in SDN Networks. Concurrency Computat Pract Exper, 37: e8388. https://doi.org/10.1002/cpe.8388
Series/Report no.: 37;https://doi.org/10.1002/cpe.8388
Abstract: Cybercriminals are constantly developing new and sophisticated methods for exploiting network vulnerabilities. Software‐defined networking (SDN) faces security challenges more than other traditional networks because the controller is a bottleneck device. This necessitates the implementation of robust security systems, including intrusion detection to mitigate the effect of attacks. Distributed denial of service (DDoS) attacks targeting the centralized controller of an SDN network can disrupt the entire network. If the controller becomes unavailable due to an attack, flow rules (FRs) cannot be deployed at the network switches, affecting data forwarding and network management. This study focuses on the detection and mitigation of synchronized (SYN) and normal transmission control protocol (TCP) DDoS flood attacks. It introduces two enhanced statistical detection and mitigation algorithms that work seamlessly with the open network operating system (ONOS) SDN controller, and sFlow‐RT engine in real‐time. Through a comprehensive set of experiments, our empirical findings demonstrate that the proposed algorithms efficiently detect and mitigate attacks with minimal average detection time, and negligible impact on resource consumption. By utilizing tuned threshold values based on network traffic volume, TCP flood attack detection (TFAD) algorithm and the synchronized TCP flood attack detection (STFAD) Algorithm achieved a minimal average detection time, of 4.032 and 3.430 s, respectively. These algorithms also have high detection accuracy in distinguishing normal traffic when appropriate threshold values are applied. Overall, this research significantly contributes to fortifying SDN networks with robust security measures, enhancing their resilience against evolving cyber threats.
Description: -
URI: http://repository.aaup.edu/jspui/handle/123456789/3213
ISSN: 1532-0626
Appears in Collections:Faculty & Staff Scientific Research publications

Files in This Item:
File Description SizeFormat 
Paper online.png297.81 kBimage/pngThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Admin Tools