Please use this identifier to cite or link to this item:
http://repository.aaup.edu/jspui/handle/123456789/3213
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | M N Hamarsheh, Mohammad$AAUP$Palestinian | - |
dc.contributor.author | Younis, Husein $AAUP$Palestinian | - |
dc.date.accessioned | 2025-03-24T11:31:04Z | - |
dc.date.available | 2025-03-24T11:31:04Z | - |
dc.date.issued | 2025-02 | - |
dc.identifier.citation | Younis, H. and Hamarsheh, M.M.N. (2025), ONOS Flood Defender: A Real-Time Flood Attacks Detection and Mitigation System in SDN Networks. Concurrency Computat Pract Exper, 37: e8388. https://doi.org/10.1002/cpe.8388 | en_US |
dc.identifier.issn | 1532-0626 | - |
dc.identifier.uri | http://repository.aaup.edu/jspui/handle/123456789/3213 | - |
dc.description | - | en_US |
dc.description.abstract | Cybercriminals are constantly developing new and sophisticated methods for exploiting network vulnerabilities. Software‐defined networking (SDN) faces security challenges more than other traditional networks because the controller is a bottleneck device. This necessitates the implementation of robust security systems, including intrusion detection to mitigate the effect of attacks. Distributed denial of service (DDoS) attacks targeting the centralized controller of an SDN network can disrupt the entire network. If the controller becomes unavailable due to an attack, flow rules (FRs) cannot be deployed at the network switches, affecting data forwarding and network management. This study focuses on the detection and mitigation of synchronized (SYN) and normal transmission control protocol (TCP) DDoS flood attacks. It introduces two enhanced statistical detection and mitigation algorithms that work seamlessly with the open network operating system (ONOS) SDN controller, and sFlow‐RT engine in real‐time. Through a comprehensive set of experiments, our empirical findings demonstrate that the proposed algorithms efficiently detect and mitigate attacks with minimal average detection time, and negligible impact on resource consumption. By utilizing tuned threshold values based on network traffic volume, TCP flood attack detection (TFAD) algorithm and the synchronized TCP flood attack detection (STFAD) Algorithm achieved a minimal average detection time, of 4.032 and 3.430 s, respectively. These algorithms also have high detection accuracy in distinguishing normal traffic when appropriate threshold values are applied. Overall, this research significantly contributes to fortifying SDN networks with robust security measures, enhancing their resilience against evolving cyber threats. | en_US |
dc.description.sponsorship | - | en_US |
dc.language.iso | en | en_US |
dc.publisher | Concurrency And Computation: Practice And Experience | en_US |
dc.relation.ispartofseries | 37;https://doi.org/10.1002/cpe.8388 | - |
dc.subject | Computer Networks | en_US |
dc.subject | Network security | en_US |
dc.subject | Computer Science | en_US |
dc.title | ONOS Flood Defender: A Real-Time Flood Attacks Detection and Mitigation System in SDN Networks | en_US |
dc.title.alternative | None | en_US |
dc.type | Article | en_US |
Appears in Collections: | Faculty & Staff Scientific Research publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Paper online.png | 297.81 kB | image/png | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Admin Tools