A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks
Abstract
:1. Introduction
- To identify various types of threats and effects of LDDoS attacks on different layers of SDN architecture;
- To provide a summary and comparison of LDDoS detection mechanisms for SDN based on machine learning and deep learning approaches;
- To discuss the open research problems and future directions for researchers working in the domain of SDN security based on LDDoS attack detection.
2. Methodology
2.1. Search Strategy
- IEEE Xplore https://ieeexplore.ieee.org/Xplore/home.jsp; accessed on 23 April 2022;
- Scopus Database https://www.scopus.com/search/form.uri?display=basic#basic; accessed on 23 April 2022;
- Science Direct https://www.sciencedirect.com/; accessed on 25 April 2022;
- Springer https://www.springer.com/gp; accessed on 25 April 2022;
- Google Scholar https://scholar.google.com/; accessed on 25 April 2022;
- Wiley Online Library https://onlinelibrary.wiley.com/; accessed on 26 April 2022;
- MDPI https://www.mdpi.com/; accessed on 27 April 2022;
- PubMed https://pubmed.ncbi.nlm.nih.gov/; accessed on 29 April 2022.
2.2. Extraction of Information from the Articles
- Title of the research paper;
- Contribution to the research;
- Category of detection mechanisms;
- Type of attack detection;
- The method used;
- Accuracy and other measures;
- Dataset;
- Experimental setup.
2.3. Methodology Used
- Conducting a search for the relevant resources on the Internet;
- Summarize research findings and identify key trends.
- Selecting the most relevant papers;
- Developing a classification of SDN vulnerabilities for LDDoS attacks;
- Summarize and analyze LDDoS detection mechanisms for SDN;
- Identify current limitations and future research directions.
3. Related Work
4. Background
4.1. Machine Learning
4.2. Software Defined Network
4.3. Distributed Denial of Service (DDoS) Attacks
- DDoS attacks at the application layer: SDN apps transmit particular packets to all or most of the switches that support the SDN in an attempt to mislead the application and cause it to fail.
- DDoS attacks on the controller layer: SDN controller adversaries send a huge number of new packets to all or most of the switches that cause overloading the controller’s computing or bandwidth capacities.
- DDoS attacks on the data layer: Network devices with SDN capabilities transmit a high number of new packets to the target OpenFlow switch, and attackers attempt to confuse the SDN-enabled switch’s stream table storage resource.
- -
- Attacking hosts are used for achieving source-based discovery.
- -
- Victim hosts implement destination-based detection.
- -
- Network-based discovery is implemented in switches and routers that serve as network intermediary nodes.
4.4. Low-Rate Distributed Denial of Service (LDDoS) Attacks
- LDDoS is launched to specific target victims. Before attacks are launched, the attacker obtains the application service information of the victim or the vulnerability existing in network protocols.
- An attacker transmits attack data packets in a low-density and periodic mode so that the network resources of the attacker are exhausted, and the network and service performance is reduced.
- LDDoS attack behavior is extremely covert.
5. Vulnerabilities of SDN to LDDoS Attacks
5.1. LDDoS Attack against Application Layer
5.1.1. Malicious Applications
5.1.2. Offensive Tools
5.1.3. Northbound Interface Saturation
5.2. LDDoS Attack against Control Layer
5.2.1. Saturation of Controller Resources
5.2.2. Control Channel Overload
5.2.3. East Westbound Channel Overload
5.3. LDDoS Attack against Infrastructure Layer
5.3.1. Data Channel Capacity
5.3.2. Packet Buffer Overflow
5.3.3. Flow Entries Timeout Length
5.3.4. Flow Table Load
6. Machine Learning Based LDDoS Detection Mechanisms
6.1. Classification-Based LDDoS Detection
6.1.1. Implementation and Traffic Analysis of Classification-Based Methods for LDDoS Attack Detection
6.1.2. Limitations of Classification-Based Methods for Detecting LDDoS Attacks
6.2. Deep Learning-Based LDDoS Detection
6.2.1. Implementation and Traffic Analysis of Deep Learning Methods Based on LDDoS Attack Tetection
6.2.2. Limitation of Deep Learning Based LDDoS Attack Detection
7. Current Challenges and Future Research Directions
7.1. Specific Datasets
7.2. Real Evaluation Instead of Simulation
7.3. Unauthenticated Application
7.4. LDDoS Attacks in the Industrial Domain
7.5. Controller Overhead
7.6. Large-Scale Network with More than One Controller
7.7. OpenFlow Switch Overload
7.8. High Cost of Implementation
7.9. Feature Selection
7.10. Exploiting SDN Capabilities for LDDoS Detection
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
AOS | Application Operator and Schedule; |
AUC | Area Under the Curve; |
BPNN | Backpropagation Neural Network; |
CNN | Convolutional Neural Network; |
CIC | Canadian Institute of Cybersecurity; |
SDN | Software Defined Networking; |
DoS | Denial of Services; |
DDoS | Distributed Denial of Services; |
LDDoS | Low-rate Distributed Denial of Services; |
IoT | Internet of Things; |
ML | Machine Learning; |
DL | Deep Learning; |
SL | Supervised Learning; |
LR | Logistic Regression; |
SVM | Support Vector Machine; |
KNN | K-Nearest Neighbor; |
UL | Unsupervised Learning; |
LSTM | Long Short-Term Memory; |
HTTP | Hypertext Transfer Protocol; |
DNS | Distributed Denial of Service; |
RNN | Recurrent Neural Network; |
PCA | Principal Component Analysis; |
ONF | Open Networking Foundation; |
OFA | OpenFlow Agent; |
TCAM | Three Content Addressable Memory; |
OFMF | Open Flow Mod Failed; |
IDS | Intrusion Detection System; |
MDP | Markov Decision Process; |
GRU | Gated Recurrent Unit; |
CPU | Central Processing Unit; |
ICMP | Internet Control Message Protocol; |
UDP | User Datagram Protocol; |
DNS | Domain Name System; |
RNN | Recurrent Neural Network; |
WSN | Wireless Sensor Networks. |
References
- Li, J.; Xue, K.; Liu, J.; Zhang, Y.; Fang, Y. An ICN/SDN-based network architecture and efficient content retrieval for future satellite-terrestrial integrated networks. IEEE Netw. 2019, 34, 188–195. [Google Scholar] [CrossRef]
- Abbasi, M.R.; Guleria, A.; Devi, M.S. Traffic engineering in software defined networks: A survey. J. Telecommun. Inf. Technol. 2016, 4, 3–14. [Google Scholar]
- Jammal, M.; Singh, T.; Shami, A.; Asal, R.; Li, Y. Software defined networking: State of the art and research challenges. Comput. Netw. 2014, 72, 74–98. [Google Scholar] [CrossRef] [Green Version]
- Kreutz, D.; Ramos, F.M.; Verissimo, P.E.; Rothenberg, C.E.; Azodolmolky, S.; Uhlig, S. Software-defined networking: A comprehensive survey. Proc. IEEE 2014, 103, 14–76. [Google Scholar] [CrossRef] [Green Version]
- Camacho, F.; Cárdenas, C.; Muñoz, D. Emerging technologies and research challenges for intelligent transportation systems: 5G, HetNets, and SDN. Int. J. Interact. Des. Manuf. (IJIDeM) 2018, 12, 327–335. [Google Scholar] [CrossRef]
- Jia, W.K. PFQDN: SDN-and DNS-Assisted Transparent Communications among Behind-NAT Networks. IEEE Syst. J. 2022, 1, 1–11. [Google Scholar] [CrossRef]
- Dangi, R.; Jadhav, A.; Choudhary, G.; Dragoni, N.; Mishra, M.K.; Lalwani, P. ML-Based 5G Network Slicing Security: A Comprehensive Survey. Future Internet 2022, 14, 116. [Google Scholar] [CrossRef]
- Waseem, Q.; Alshamrani, S.S.; Nisar, K.; Wan Din, W.I.S.; Alghamdi, A.S. Future Technology: Software-Defined Network (SDN) Forensic. Symmetry 2021, 13, 767. [Google Scholar] [CrossRef]
- Alashhab, A.A.; Zahid, M.S.M.; Barka, A.A.; Albaboh, A.M. Experimenting and evaluating the impact of DoS attacks on different SDN controllers. In Proceedings of the 2021 IEEE 1st International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering MI-STA, Tripoli, Libya, 25–27 May 2021; pp. 722–727. [Google Scholar]
- Kalkan, K.; Gur, G.; Alagoz, F. Defense mechanisms against DDoS attacks in SDN environment. IEEE Commun. Mag. 2017, 55, 175–179. [Google Scholar] [CrossRef]
- Lei, G.; Ji, L.; Ji, R.; Cao, Y.; Shao, X.; Huang, X. Extracting low-rate DDoS attack characteristics: The case of multipath TCP-based communication networks. Wirel. Commun. Mobile Comput. 2021, 2021, 2264187. [Google Scholar] [CrossRef]
- Shalunov, S.; Teitelbaum, B. TCP use and performance on Internet2. In Proceedings of the ACM SIGCOMM Internet Measurement Workshop, San Francisco, CA, USA, 1–2 November 2001. [Google Scholar]
- Cambiaso, E.; Papaleo, G.; Chiola, G.; Aiello, M. Mobile Executions of Slow DoS Attacks; Oxford Academic: Oxford, UK, 2016. [Google Scholar]
- Cambiaso, E.; Papaleo, G.; Chiola, G.; Aiello, M. Designing and modeling the slow next DoS attack. In Proceedings of the Computational Intelligence in Security for Information Systems Conference, Burgos, Spain, 15–17 June 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 249–259. [Google Scholar]
- Cui, Y.; Qian, Q.; Guo, C.; Shen, G.; Tian, Y.; Xing, H.; Yan, L. Towards DDoS detection mechanisms in software-defined networking. J. Netw. Comput. Appl. 2021, 190, 103156. [Google Scholar] [CrossRef]
- Xingshu, C.; Qiang, H.; Yitong, W.; Long, G.; Yi, Z. Research on low-rate DDoS attack of SDN network in cloud environment. J. Commun. 2019, 40, 210. [Google Scholar]
- Pérez-Díaz, J.A.; Valdovinos, I.A.; Choo, K.K.R.; Zhu, D. A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning. IEEE Access 2020, 8, 155859–155872. [Google Scholar] [CrossRef]
- Reiswig, J. Mendeley. J. Med. Libr. Assoc. JMLA 2010, 98, 193. [Google Scholar] [CrossRef]
- Balarezo, J.F.; Wang, S.; Chavez, K.G.; Al-Hourani, A.; Kandeepan, S. A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks. Eng. Sci. Technol. Int. J. 2021, 31, 101065. [Google Scholar] [CrossRef]
- Dong, S.; Abbas, K.; Jain, R. A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments. IEEE Access 2019, 7, 80813–80828. [Google Scholar] [CrossRef]
- Aladaileh, M.A.; Anbar, M.; Hasbullah, I.H.; Chong, Y.W.; Sanjalawe, Y.K. Detection techniques of distributed denial of service attacks on software-defined networking controlle—A review. IEEE Access 2020, 8, 143985–143995. [Google Scholar] [CrossRef]
- Xu, X.; Yu, H.; Yang, K. DDoS attack in software defined networks: A survey. ZTE Commun. 2017, 15, 3. [Google Scholar]
- ur Rasool, R.; Wang, H.; Ashraf, U.; Ahmed, K.; Anwar, Z.; Rafique, W. A survey of link flooding attacks in software defined network ecosystems. J. Netw. Comput. Appl. 2020, 172, 102803. [Google Scholar] [CrossRef]
- Wang, P.; Yang, L.T.; Nie, X.; Ren, Z.; Li, J.; Kuang, L. Data-driven software defined network attack detection: State-of-the-art and perspectives. Inform. Sci. 2020, 513, 65–83. [Google Scholar] [CrossRef]
- Singh, J.; Behal, S. Detection and mitigation of DDoS attacks in SDN: A comprehensive review, research challenges and future directions. Comput. Sci. Rev. 2020, 37, 100279. [Google Scholar] [CrossRef]
- Mitchell, T. Does machine learning really work? AI Mag. 1997, 18, 11. [Google Scholar]
- Swana, E.; Doorsamy, W. An Unsupervised Learning Approach to Condition Assessment on a Wound-Rotor Induction Generator. Energies 2021, 14, 602. [Google Scholar] [CrossRef]
- Sarker, I.H. Machine learning: Algorithms, real-world applications and research directions. SN Comput. Sci. 2021, 2, 1–21. [Google Scholar]
- Sarker, I.H. Deep learning: A comprehensive overview on techniques, taxonomy, applications and research directions. SN Comput. Sci. 2021, 2, 420. [Google Scholar]
- Riedmiller, M. Advanced supervised learning in multi-layer perceptrons—From backpropagation to adaptive learning algorithms. Comput. Stand. Interfaces 1994, 16, 265–278. [Google Scholar] [CrossRef]
- Thacker, N.A.; Abraham, I.; Courtney, P. Supervised learning extensions to the clam network. Neural Netw. 1997, 10, 315–326. [Google Scholar] [CrossRef]
- Biau, G.; Scornet, E. A random forest guided tour. Test 2016, 25, 197–227. [Google Scholar] [CrossRef] [Green Version]
- Schölkopf, B.; Smola, A.J.; Bach, F. Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond; MIT Press: Cambridge, MA, USA, 2002. [Google Scholar]
- Dietterich, T.G.; Kong, E.B. Machine Learning Bias, Statistical Bias, and Statistical Variance of Decision Tree Algorithms; Report; Citeseer: Pennsylvania, PA, USA, 1995. [Google Scholar]
- Dreiseitl, S.; Ohno-Machado, L. Logistic regression and artificial neural network classification models: A methodology review. J. Biomed. Inform. 2002, 35, 352–359. [Google Scholar] [CrossRef] [Green Version]
- Archer, N.P.; Wang, S. Application of the back propagation neural network algorithm with monotonicity constraints for two-group classification problems. Decis. Sci. 1993, 24, 60–75. [Google Scholar] [CrossRef]
- Peterson, L.E. K-nearest neighbor. Scholarpedia 2009, 4, 1883. [Google Scholar] [CrossRef]
- Ari, B.; Güvenir, H.A. Clustered linear regression. Knowl.-Based Syst. 2002, 15, 169–175. [Google Scholar] [CrossRef]
- Hastie, T.; Tibshirani, R.; Friedman, J. Unsupervised learning. In The Elements of Statistical Learning; Springer: Berlin/Heidelberg, Germany, 2009; pp. 485–585. [Google Scholar]
- El Naqa, I.; Murphy, M.J. What is machine learning? In Machine Learning in Radiation Oncology; Springer: Berlin/Heidelberg, Germany, 2015; pp. 3–11. [Google Scholar]
- Ralambondrainy, H. A conceptual version of the k-means algorithm. Pattern Recognit. Lett. 1995, 16, 1147–1157. [Google Scholar] [CrossRef]
- Birant, D.; Kut, A. ST-DBSCAN: An algorithm for clustering spatial–temporal data. Data Knowl. Eng. 2007, 60, 208–221. [Google Scholar] [CrossRef]
- Wang, K.; Zhang, J.; Li, D.; Zhang, X.; Guo, T. Adaptive affinity propagation clustering. arXiv 2008, arXiv:0805.1096. [Google Scholar]
- Comaniciu, D.; Meer, P. Mean shift analysis and applications. In Proceedings of the 7th IEEE International Conference on Computer Vision, Kerkyra, Greece, 20–27 September 1999; Volume 2, pp. 1197–1203. [Google Scholar]
- Chapelle, O.; Scholkopf, B.; Zien, A. Semi-supervised learning (Chapelle, o. et al., eds.; 2006) [book reviews]. IEEE Trans. Neural Netw. 2009, 20, 542. [Google Scholar] [CrossRef]
- Di, H.; Ke, X.; Peng, Z.; Dongdong, Z. Surface defect classification of steels with a new semi-supervised learning method. Opt. Lasers Eng. 2019, 117, 40–48. [Google Scholar] [CrossRef]
- Shinan, K.; Alsubhi, K.; Alzahrani, A.; Ashraf, M.U. Machine learning-based botnet detection in software-defined network: A systematic review. Symmetry 2021, 13, 866. [Google Scholar] [CrossRef]
- Fazakis, N.; Kanas, V.G.; Aridas, C.K.; Karlos, S.; Kotsiantis, S. Combination of active learning and semi-supervised learning under a self-training scheme. Entropy 2019, 21, 988. [Google Scholar] [CrossRef] [Green Version]
- Subramanya, A.; Talukdar, P.P. Graph-based semi-supervised learning. Synth. Lect. Artif. Intell. Mach. Learn. 2014, 8, 1–125. [Google Scholar]
- Chapelle, O.; Zien, A. Semi-supervised classification by low density separation. In Proceedings of the International Workshop on Artificial Intelligence and Statistics (PMLR), Bridgetown, Barbados, 6–8 January 2005; pp. 57–64. [Google Scholar]
- Chen, H.; Engkvist, O.; Wang, Y.; Olivecrona, M.; Blaschke, T. The rise of deep learning in drug discovery. Drug Discov. Today 2018, 23, 1241–1250. [Google Scholar] [CrossRef] [PubMed]
- Albawi, S.; Mohammed, T.A.; Al-Zawi, S. Understanding of a convolutional neural network. In Proceedings of the 2017 International Conference on Engineering and Technology (ICET), Antalya, Turkey, 21–23 August 2017; pp. 1–6. [Google Scholar]
- Lorencin, I.; Anđelić, N.; Mrzljak, V.; Car, Z. Genetic algorithm approach to design of multi-layer perceptron for combined cycle power plant electrical power output estimation. Energies 2019, 12, 4352. [Google Scholar] [CrossRef] [Green Version]
- Schuster, M.; Paliwal, K.K. Bidirectional recurrent neural networks. IEEE Trans. Sign. Process. 1997, 45, 2673–2681. [Google Scholar] [CrossRef] [Green Version]
- Wang, W.; Huang, Y.; Wang, Y.; Wang, L. Generalized autoencoder: A neural network framework for dimensionality reduction. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, Columbus, OH, USA, 23–28 June 2014; pp. 490–497. [Google Scholar]
- Krizhevsky, A.; Hinton, G. Convolutional deep belief networks on cifar-10. Computers 2010, 40, 1–9. [Google Scholar]
- Kohonen, T. The self-organizing map. Proc. IEEE 1990, 78, 1464–1480. [Google Scholar] [CrossRef]
- Liao, Z.; Chen, C.; Ju, Y.; He, C.; Jiang, J.; Pei, Q. Multi-Controller Deployment in SDN-Enabled 6G Space–Air–Ground Integrated Network. Remote Sens. 2022, 14, 1076. [Google Scholar] [CrossRef]
- Kirkpatrick, K. Software-defined networking. Commun. ACM 2013, 56, 16–19. [Google Scholar] [CrossRef]
- Abdou, A.; Van Oorschot, P.C.; Wan, T. Comparative analysis of control plane security of SDN and conventional networks. IEEE Commun. Surv. Tutor. 2018, 20, 3542–3559. [Google Scholar] [CrossRef]
- O.N. Fundation. Open Networking; O.N. Foundation: Luzern, Switzerland, 2022. [Google Scholar]
- McKeown, N.; Anderson, T.; Balakrishnan, H.; Parulkar, G.; Peterson, L.; Rexford, J.; Shenker, S.; Turner, J. OpenFlow: Enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 2008, 38, 69–74. [Google Scholar] [CrossRef]
- Kaur, K.; Kaur, S.; Gupta, V. Flow statistics based load balancing in OpenFlow. In Proceedings of the 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Jaipur, India, 21–24 September 2016; pp. 378–381. [Google Scholar]
- Cheema, A.; Tariq, M.; Hafiz, A.; Khan, M.M.; Ahmad, F.; Anwar, M. Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review. Secur. Commun. Netw. 2022, 2022, 8379532. [Google Scholar] [CrossRef]
- Huraj, L.; Horak, T.; Strelec, P.; Tanuska, P. Mitigation against DDoS Attacks on an IoT-Based Production Line Using Machine Learning. Appl. Sci. 2021, 11, 1847. [Google Scholar] [CrossRef]
- Wang, S.; Gomez, K.; Sithamparanathan, K.; Asghar, M.R.; Russello, G.; Zanna, P. Mitigating DDoS Attacks in SDN-Based IoT Networks Leveraging Secure Control and Data Plane Algorithm. Appl. Sci. 2021, 11, 929. [Google Scholar] [CrossRef]
- Horak, T.; Cervenanska, Z.; Huraj, L.; Vazan, P.; Janosik, J.; Tanuska, P. The vulnerability of securing IoT production lines and their network components in the Industry 4.0 concept. IFAC-Pap. Online 2020, 53, 11237–11242. [Google Scholar] [CrossRef]
- Šimon, M.; Huraj, L.; Horák, T. DDoS reflection attack based on IoT: A case study. In Proceedings of the Computer Science Online Conference, Las Vegas, NV, USA, 12–14 December 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 44–52. [Google Scholar]
- Bawany, N.Z.; Shamsi, J.A.; Salah, K. DDoS attack detection and mitigation using SDN: Methods, practices, and solutions. Arab. J. Sci. Eng. 2017, 42, 425–441. [Google Scholar] [CrossRef]
- Wang, B.; Su, J. FlexMonitor: A flexible monitoring framework in SDN. Symmetry 2018, 10, 713. [Google Scholar] [CrossRef] [Green Version]
- Yang, Y.S.; Lee, S.H.; Chen, W.C.; Yang, C.S.; Huang, Y.M.; Hou, T.W. Securing SCADA Energy Management System under DDos attacks using token verification approach. Appl. Sci. 2022, 12, 530. [Google Scholar] [CrossRef]
- Zargar, S.T.; Joshi, J.; Tipper, D. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 2013, 15, 2046–2069. [Google Scholar] [CrossRef] [Green Version]
- Xiang, Y.; Li, K.; Zhou, W. Low-rate DDoS attacks detection and traceback by using new information metrics. IEEE Trans. Inform. Forens. Secur. 2011, 6, 426–437. [Google Scholar] [CrossRef]
- Zhijun, W.; Wenjing, L.; Liang, L.; Meng, Y. Low-rate DoS attacks, detection, defense, and challenges: A survey. IEEE Access 2020, 8, 43920–43943. [Google Scholar] [CrossRef]
- Bhuyan, M.H.; Bhattacharyya, D.; Kalita, J.K. An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recogn. Lett. 2015, 51, 1–7. [Google Scholar] [CrossRef]
- Phan, T.V.; Gias, T.R.; Islam, S.T.; Huong, T.T.; Thanh, N.H.; Bauschert, T. Q-MIND: Defeating stealthy DoS attacks in SDN with a machine-learning based defense framework. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
- Khamkar, R.; Thakre, K.; Kotkar, A.; Jadhav, P.; Hanchate, R. Low rate DDoS Attack Identification and Defense using SDN based on Machine Learning Method. Int. Res. J. Eng. Technol. (IRJET) 2021, 8, 423. [Google Scholar]
- Cheng, H.; Liu, J.; Xu, T.; Ren, B.; Mao, J.; Zhang, W. Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks. Int. J. Sens. Netw. 2020, 34, 56–69. [Google Scholar] [CrossRef]
- Yin, W.; Cui, Y.; Qian, Q.; Shen, G.; Guo, C.; Li, S. DIAMOND: A Structured Coevolution Feature Optimization Method for LDDoS Detection in SDN-IoT. Wirel. Commun. Mob. Comput. 2021, 2021, 9530274. [Google Scholar] [CrossRef]
- Sudar, K.M.; Deepalakshmi, P. Flow-Based Detection and Mitigation of Low-Rate DDOS Attack in SDN Environment Using Machine Learning Techniques. In IoT and Analytics for Sensor Networks; Springer: Berlin/Heidelberg, Germany, 2022; pp. 193–205. [Google Scholar]
- Zhijun, W.; Qing, X.; Jingjie, W.; Meng, Y.; Liang, L. Low-rate DDoS attack detection based on factorization machine in software defined network. IEEE Access 2020, 8, 17404–17418. [Google Scholar] [CrossRef]
- Nugraha, B.; Murthy, R.N. Deep learning-based slow DDoS attack detection in SDN-based networks. In Proceedings of the 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Madrid, Spain, 10–12 November 2020; pp. 51–56. [Google Scholar]
- Tang, D.; Yan, Y.; Zhang, S.; Chen, J.; Qin, Z. Performance and features: Mitigating the low-rate TCP-targeted DoS attack via SDN. IEEE J. Select.Areas Commun. 2021, 40, 428–444. [Google Scholar] [CrossRef]
- Sun, W.; Guan, S.; Wang, P.; Wu, Q. A hybrid deep learning model based low-rate DoS attack detection method for software defined network. Trans. Emerg. Telecommun. Technol. 2022, 33, e4443. [Google Scholar] [CrossRef]
- Apostolovic, T.; Stankovic, N.; Milenkovic, K.; Stanisavljevic, Z. DDoSSim-System for Visual Representation of the Selected Distributed Denial of Service Attacks. In Proceedings of the 2018 Zooming Innovation in Consumer Technologies Conference (ZINC), Novi Sad, Serbia, 30–31 May 2018; pp. 118–122. [Google Scholar]
- jseidl.GoldenEye. Available online: https://www.kali.org/tools/goldeneye/ (accessed on 17 February 2022).
- HULK. Mr4FX. Available online: https://allabouttesting.org/hulk-ddos-tool-complete-installation-usage-with-examples/ (accessed on 17 February 2022).
- Cloudflare. Slowloris DDoS Attack; Cloudflare: San Francisco, CA, USA, 2021. [Google Scholar]
- Cloudflare. 2020. Available online: https://www.cloudflare.com/learning/ddos/ddos-low-and-slow-attack/ (accessed on 17 February 2022).
- Bhushan, K.; Gupta, B.B. Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J. Ambient Intell. Human. Comput. 2019, 10, 1985–1997. [Google Scholar] [CrossRef]
- Ubale, T.; Jain, A.K. Survey on DDoS attack techniques and solutions in software-defined network. In Handbook of Computer Networks and Cyber Security; Springer: Berlin/Heidelberg, Germany, 2020; pp. 389–419. [Google Scholar]
- Singh, M.P.; Bhandari, A. New-flow based DDoS attacks in SDN: Taxonomy, rationales, and research challenges. Comput. Commun. 2020, 154, 509–527. [Google Scholar] [CrossRef]
- Pashkov, V.; Shalimov, A.; Smeliansky, R. Controller failover for SDN enterprise networks. In Proceedings of the 2014 International Science and Technology Conference (Modern Networking Technologies)(MoNeTeC), Moscow, Russia, 28–29 October 2014; pp. 1–6. [Google Scholar]
- Muthamil Sudar, K.; Deepalakshmi, P. A two level security mechanism to detect a DDoS flooding attack in software-defined networks using entropy-based and C4. 5 technique. J. High Speed Netw. 2020, 26, 55–76. [Google Scholar] [CrossRef]
- Daha, M.Y.; Zahid, M.S.M.; Husain, K.; Ousta, F. Performance Evaluation of Software Defined Networks with Single and Multiple Link Failure Scenario under Floodlight Controller. In Proceedings of the 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), Greater Noida, India, 19–20 February 2021; pp. 959–965. [Google Scholar]
- Daha, M.Y.; Zahid, M.S.M.; Isyaku, B.; Alashhab, A.A. CDRA: A Community Detection based Routing Algorithm for Link Failure Recovery in Software Defined Networks. (IJACSA) Int. J. Adv. Comput. Sci. Appl. 2021, 12, 11. [Google Scholar] [CrossRef]
- Chen, K.Y.; Junuthula, A.R.; Siddhrau, I.K.; Xu, Y.; Chao, H.J. SDNShield: Towards more comprehensive defense against DDoS attacks on SDN control plane. In Proceedings of the 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, USA, 17–19 October 2016; pp. 28–36. [Google Scholar]
- Benamrane, F.; Benaini, R. An East-West interface for distributed SDN control plane: Implementation and evaluation. Comput. Electr. Eng. 2017, 57, 162–175. [Google Scholar] [CrossRef]
- BN, Y. Preemptive modelling towards classifying vulnerability of DDoS attack in SDN environment. Int. Electr. Comput. Eng. 2020, 10, 8708. [Google Scholar]
- He, C.H.; Chang, B.Y.; Chakraborty, S.; Chen, C.; Wang, L.C. A zero flow entry expiration timeout p4 switch. In Proceedings of the Symposium on SDN Research, Los Angeles, CA, USA, 28–29 March 2018; pp. 1–2. [Google Scholar]
- Kandoi, R.; Antikainen, M. Denial-of-service attacks in OpenFlow SDN networks. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, Canada, 11–15 May 2015; pp. 1322–1326. [Google Scholar]
- Isyaku, B.; Mohd Zahid, M.S.; Bte Kamat, M.; Abu Bakar, K.; Ghaleb, F.A. Software Defined Networking Flow Table Management of OpenFlow Switches Performance and Security Challenges: A Survey. Future Internet 2020, 12, 147. [Google Scholar] [CrossRef]
- You, X.; Feng, Y.; Sakurai, K. Packet in message based DDoS attack detection in SDN network using OpenFlow. In Proceedings of the 2017 Fifth International Symposium on Computing and Networking (CANDAR), Aomori, Japan, 19–22 November 2017; pp. 522–528. [Google Scholar]
- Pascoal, T.A.; Dantas, Y.G.; Fonseca, I.E.; Nigam, V. Slow TCAM exhaustion DDoS attack. In Proceedings of the IFIP International Conference on ICT Systems Security and Privacy Protection, Rome, Italy, 29–31 May 2017; Springer: Berlin/Heidelberg, Germany, 2017; pp. 17–31. [Google Scholar]
- Dehkordi, A.B.; Soltanaghaei, M.; Boroujeni, F.Z. The DDoS attacks detection through machine learning and statistical methods in SDN. J. Supercomput. 2021, 77, 2383–2415. [Google Scholar] [CrossRef]
- Bowers, A.J.; Zhou, X. Receiver operating characteristic (ROC) area under the curve (AUC): A diagnostic measure for evaluating the accuracy of predictors of education outcomes. J. Educ. Stud. Placed Risk (JESPAR) 2019, 24, 20–46. [Google Scholar] [CrossRef]
- Andrew, A.M. Reinforcement Learning: An Introduction by Richard S. Sutton and Andrew G. Barto, Adaptive Computation and Machine Learning Series; MIT Press (Bradford Book), Cambridge, Mass., 1998, pp. 58–322, ISBN 0-262-19398-1. Robotica 1999, 17, 229–235. [Google Scholar] [CrossRef] [Green Version]
- De Oliveira, R.L.S.; Schweitzer, C.M.; Shinoda, A.A.; Prete, L.R. Using mininet for emulation and prototyping software-defined networks. In Proceedings of the 2014 IEEE Colombian conference on communications and computing (COLCOM), Bogota, Colombia, 2–4 June 2014; pp. 1–6. [Google Scholar]
- Wette, P.; Dräxler, M.; Schwabe, A.; Wallaschek, F.; Zahraee, M.H.; Karl, H. Maxinet: Distributed emulation of software-defined networks. In Proceedings of the 2014 IFIP Networking Conference, Trondheim, Norway, 2–4 June 2014; pp. 1–9. [Google Scholar]
- Open Network. Available online: https://opennetworking.org/onos/ (accessed on 23 March 2022).
- Shekyan. Available online: https://www.kali.org/tools/slowhttptest/ (accessed on 23 March 2022).
- Cup. Available online: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (accessed on 23 March 2022).
- Deepalakshmi, P. DServ-LB: Dynamic server load balancing algorithm. Int. J. Commun. Syst. 2018, 1, 3840. [Google Scholar]
- Scapy. Available online: https://scapy.net/ (accessed on 23 March 2022).
- Lin, Y.z.; Nie, Z.h.; Ma, H.w. Structural damage detection with automatic feature-extraction through deep learning. Comput.-Aided Civil Infrastruct. Eng. 2017, 32, 1025–1046. [Google Scholar] [CrossRef]
- Taud, H.; Mas, J. Multilayer perceptron (MLP). In Geomatic Approaches for Modeling Land Change Scenarios; Springer: Berlin/Heidelberg, Germany, 2018; pp. 451–455. [Google Scholar]
- Mahadevan, S.; Shah, S.L. Fault detection and diagnosis in process data using one-class support vector machines. J. Process Control 2009, 19, 1627–1639. [Google Scholar] [CrossRef]
- Andersson, O.O. Available online: https://github.com/Ogglas/Orignal-Slowloris-HTTP-DoS (accessed on 15 January 2022).
- Roopak, M.; Tian, G.Y.; Chambers, J. Deep learning models for cyber security in IoT networks. In Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 7–9 January 2019; pp. 452–457. [Google Scholar]
- Khooi, X.Z.; Csikor, L.; Kang, M.S.; Divakaran, D.M. In-Network Defense against AR-DDoS Attacks. In Proceedings of the SIGCOMM’20 Poster and Demo Sessions, Online, 10–14 August 2020. [Google Scholar]
- Kuzmanovic, A.; Knightly, E.W. Low-rate TCP-targeted denial of service attacks: The shrew vs. the mice and elephants. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Karlsruhe, Germany, 25–29 August 2003; pp. 75–86. [Google Scholar]
Prominent Security Issues | Cui et al. [15] | Balarezo et al. [19] | Dong et al. [20] | Aladaileh et al. [21] | Xu et al. [22] | Rasool et al. [23] | Wang et al. [24] | Singh and Behal [25] | Our Survey |
---|---|---|---|---|---|---|---|---|---|
Vulnerabilities of all SDN Layers | ✓ | ✓ | ✓ | Control Layer | Control Layer | ✓ | Data Layer | Control & Data Layer | ✓ |
DDoS Attacks | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
LDDoS Attacks | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✓ |
Detection or Mitigation Schemes using Machine Learning | ✓ | ✓ | ✗ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Taxonomy of Security Attacks | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ | ✓ | ✓ |
Categorize Detection Solutions | ✓ | ✗ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Limitation of Existing Work | ✓ | ✓ | ✗ | ✓ | ✗ | ✓ | ✗ | ✓ | ✓ |
Discussion on Possible Future works | ✓ | ✗ | ✓ | ✓ | ✗ | ✓ | ✗ | ✓ | ✓ |
Reference | Year | SDN Layer Location | Machine Learning-Based | Classifier/Method | Detection Results |
---|---|---|---|---|---|
Zhijun et al. [81] | 2019 | Data Layer | Classification Based Detection | FM | 95.8% |
Phan et al. [76] | 2019 | Application layer, Northbound | SVM, RF, Q-Learning | 98% | |
JESÚS et al. [17] | 2020 | Application Layer, Control Layer | J48, RT, RF, MLP | 95% | |
Cheng et al. [78] | 2020 | Data Layer, Control Layer | SVM, NB, RF | 97% | |
R. Khamkar et al. [77] | 2021 | Control Layer | SVM | 99% | |
Wencheng et al. [79] | 2021 | Control Layer | SVM, NB, LR, DT, C4, RF, AB | 92% | |
Tang et al. [83] | 2021 | Control Layer | GBDT, GBDT-LR | 96% | |
Sudar et al. [80] | 2022 | Control Layer, Data Layer | SVM, DT, NB | 93% | |
Nugraha et al. [82] | 2020 | Data Layer | Deep learning-based Detection | CNN-LSTM | 99% |
Sun et al. [84] | 2022 | Control Layer, Data Layer | CNN-GRU | 99.5% |
Reference | Experiments | Dataset | Controller | Scale |
---|---|---|---|---|
Zhijun et al. [81] | Simulation using Mininet | NSL-KDD, DARPA98, CAIDA | RYU | Medium (4 switches, 9 hostes) |
Phan et al. [76] | Simulation using MaxiNet | CAIDA | ONOS | Small (1 switche, 8 hosts) |
JESÚS et al. [17] | Simulation using Mininet | CIC | ONOS | Small (3 switches, 5 hosts) |
Cheng et al. [78] | IoT hybrid Network | Custom | Floodlight | Medium (4 switches, 9 hostes) |
R Khamkar et al. [77] | Simulation using Mininet | KDD99 | Ryu | Small ( 2 switches, 6 hostes, and 1 webserver) |
Wencheng et al. [79] | Simulation using Mininet-WiFi | Custom | Ryu | Medium (4 switche, 80 hosts) |
Tang et al. [83] | Simulation using Mininet | Custom | Ryu | Small (2 switches, 6 hosts) |
Sudar et al. [80] | Simulation using Mininet | CIC | POX | Medium (4 switches, 9 hostes) |
Nugraha et al. [82] | Simulation using Mininet | Custom | ONOS | Small (2 switches, 10 hosts) |
Sun et al. [84] | Simulation using Mininet | CIC | Ryu | Medium (6 switches, 21 hostes) |
Ref. | Model Type | Objectives | Accuracy | Shortcoming/Disadvantages | ||
---|---|---|---|---|---|---|
To Increase the Detection Rate by Extracting Features | To Make More Rapidly Classification by Fully Utilizing the GPU | To Improve Detection Rate by Collecting Flow Statistics from Wwitches | ||||
[81] | A multi-feature method based on the FM algorithm | ✓ | 95.8% | Not provide a mechanism based on synchronization between SDN controllers and data layer devices. | ||
[76] | Learning-based approach using the QMIND framework | ✓ | 98% | A complex training process and high cost of implementation. | ||
[17] | Modular architecture based on SDN. | ✓ | 95% | Increase the controller overhead and decrease response efficiency. | ||
[78] | Learning-based detection using stateful and stateless features | ✓ | ✓ | 97% | Excess load on the controller, which reduces the efficiency of its work. | |
[77] | Traffic summation framework based on SDN | ✓ | ✓ | 99% | Not identifying the feature obtained from the flow table to detect LDDoS attacks. | |
[79] | A structured coevolution feature optimization method | ✓ | ✓ | 92% | Overloads OpenFlow switches and reduces responsiveness to the regular traffic. | |
[83] | Performance and Features framework | ✓ | 96% | A legitimate user experiences more delays when the network is attacked. | ||
[80] | Flow-based detection framework using ML classifiers | ✓ | ✓ | 93% | High false-positive rate for legal traffic flows such as ICMP packets. | |
[82] | CNN-LSTM Model for SDN-based networks | ✓ | 99% | Requires a long time to train and is limited to traffic types. | ||
[84] | CNN-GRU Model for SDN-based networks | ✓ | 99.5% | Resource intensive from a training perspective and not designed to detect online attacks in the contextof live SDNs. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alashhab, A.A.; Zahid, M.S.M.; Azim, M.A.; Daha, M.Y.; Isyaku, B.; Ali, S. A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks. Symmetry 2022, 14, 1563. https://doi.org/10.3390/sym14081563
Alashhab AA, Zahid MSM, Azim MA, Daha MY, Isyaku B, Ali S. A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks. Symmetry. 2022; 14(8):1563. https://doi.org/10.3390/sym14081563
Chicago/Turabian StyleAlashhab, Abdussalam Ahmed, Mohd Soperi Mohd Zahid, Mohamed A. Azim, Muhammad Yunis Daha, Babangida Isyaku, and Shimhaz Ali. 2022. "A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks" Symmetry 14, no. 8: 1563. https://doi.org/10.3390/sym14081563
APA StyleAlashhab, A. A., Zahid, M. S. M., Azim, M. A., Daha, M. Y., Isyaku, B., & Ali, S. (2022). A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks. Symmetry, 14(8), 1563. https://doi.org/10.3390/sym14081563