You are on page 1of 4

DDOS ATTACK DETECTION AND

MITIGATION USING SDN


#1
ADKE GURUDUTT #2
SOUNDATTIKAR KAMAKSHI K.S. CHARUMATHI

STUDENT (IT), PCE PANVEL STUDENT (IT), PCE PANVEL FACULTY, PCE PANVEL

Adkegs15ith@student.mes.ac.in soundattikarkas17dse@student.mes.ac.in kscharumathi@mes.ac.in

threats ifacing ithe iInternet. iIt iis ia ikey iresearch itopic iin
ithe isecurity ifield ito idetect iDDoS iattacks iaccurately iand
Abstract: iquickly. iSDN iis ian iemerging inetwork iinnovation I
architecture ithat iseparates ithe inetwork idata iplane iand ithe
Software Defined Networking (SDN) is a new approach for
icontrol iplane iwhich ihas ithe icharacteristics iof inetwork
the design and management of computer networks. The main
iprogrammable, icentralized imanagement icontrol, iand
concept behind SDN is the separation of the network’s control
iinterface iopening.
and forwarding planes with the control plane moved to the
centralized controller. In SDN networks with the centralized Network iattackers iattack inetwork ibandwidth, isystem
controller structure DDoS attacks can easily exhaust the iresources, iand iapplication iresources, ito iachieve ithe
computing and communication resources, thus, breaks down ieffect iof idenial iof iservice iattacks. iDDoS iattacks ishow
the network within a short time. Since SDN networks are used ithe iincreasing iscale iof iattack; ithe iattack imode iis imore
mainly in large data centres with many switches, it is critical iintelligent. iThe idifficulties iof iDDoS iattack idetection iare
to also find the targeted parts of the network through the ias ifollows: ithe iattack itraffic icharacteristics inot ibeing
detection process. This will reduce the time required to carry ieasy ito iidentify; ithe ilack iof icollaboration ibetween ithe
out a mitigation measure. Controllers are usually designed icoherent inetwork inodes; i ithe ichange iof ithe iattack itool
with backups and also are very powerful devices with huge ibeing istrengthened, iwith ithe ithreshold iof iits iuse
amounts of memory but the resources in the switches are idecreasing; ithe iwidely iused iaddress ifraud imaking iit
much more limited. This makes the switches to be more idifficult ito itrace ithe isource iof ithe iattack; i ithe iduration
susceptible against these types of attacks and hence it is very itime iof iattack ibeing ishort iand iresponse itime ibeing
important to have quick provisional methods in place to ilimited.
prevent the switches from breaking down as soon as the first
signs of an attack are detected. It is also very important to Distributed idenial-of-service i(DDoS) iattacks ihave ibeen ia
design the detection method as lightweight as possible to ireal ithreat ifor inetwork, idigital, iand icyber iinfrastructure
prevent putting any extra load on the controller. i.These iattacks iare icapable ito icause imassive idisruption
iin iany iinformation icommunication itechnology i(ICT)
Keywords: iinfrastructure iThere icould ibe inumerous ireasons ifor
ilaunching iDDoS iattacks. iThese iinclude ifinancial igains i,
Software defined networking - SDN, DDoS attacks,
ipolitical igains i,mand idisruption i.DDoS iattacks ican
OpenFlow, DDoS mitigation
iparalyze inetworks iand iservices iby ioverwhelming iservers,
Introduction: inetwork ilinks, iand inetwork idevices i(routers, iswitches,
ietc.) iwith iillegitimate itraffic. iThey ican ieither icause
With ithe icontinuous idevelopment iof inetwork itechnology, idegradation iof iservice ior ia icomplete idenial iof iservice
ithe iceaseless iexpansion iof inetwork ibusiness ineeds, iand iresulting iin ihuge ilosses. iIncreasing ireliance ion iInternet
irapid igrowth iof ithe iInternet ieconomy iin ithe iInternet iand idata icenters ihas iaggravated ithis iproblem. iThe
iage, ithe iservices iof inetwork iwith iimportant ibusiness igrowing idependence iof icritical iinfrastructure iof ia
iand iindustry iinformation ihave ibeen ispread ito ithe icountry iin iICT ihave igiven irise ito ithe ineed iof iefficient
iproduction iand ilife iof icurrent isociety. iThe iemergence iof isolutions ifor iprotection iagainst iDDoS iattacks iFor
iDDoS iattacks ican ilead ito iabnormalities iin ithe irelated iinstance, idata icenters irunning icritical iservices, isuch ias
inetwork iservices, icausing ihuge ieconomic ilosses iand ismart igrid, ineed ito ibe iprotected iin iorder ito icontinue ito
ieven icausing iother icatastrophic iconsequences. iDDoS iprovide ihighly ireliable iservices.
iattacks iare ione iof ithe iserious inetwork isecurity
With irecent iadvancements iin isoftware-defined inetworking
i(SDN) iand iits irapid iand iwide-scale iacceptance iin ithe
inetwork icommunity, imany iresearchers ihave ibeen
I iactively iinvolved iin ideveloping iSDN-based inetwork
1
isecurity isolutions. iSDN-based isolutions ihave iattracted
imore iattention isince itheir iadoption iin ilarge-scale iwide
iarea inetworks i.The itechnology ienables idevelopers ito
idirectly iprogram, icontrol, iand imanage inetwork iresources
icentrally ithrough ithe iSDN icontroller. i

SDN ioffers inovel iways ito isolve ilong istanding


inetworking iproblems, isuch ias irouting ipolicy-based
inetwork iconfigurations, iand isecurity ias idiscussed iin
iSect. i3 iWhile isecurity iof iSDN-based inetworks ihas ibeen
ia ipoint iof idebate iand imuch iliterature iis iavailable
idiscussing ithe isecurity iof iSDN iinfrastructure iitself iThis
ipaper, ihowever, itakes ithe ipositive iviewpoint ion iSDN-
based isecurity iand ipresents ia isurvey iof iSDN-based Fig:1.2  Proposed system architecture 
iDDoS iattack idetection iand imitigation imechanisms.

Method: data to the tools and export flow data while running.

Fig 1.3: Floodlight dashboard

Fig 1.1: SDN architecture [1]

The aim of SDN is to provide an open interface that enables


the development of software that can control the connectivity
between the set of network resources and flow of network
traffic with them, along with the possible look-over
modification of traffic that also performed in network. This
functions may use into random network services.

The first layer is application layer within northbound


interface, this application is controlled by the Data-controller
comprises network elements, which defines their uses toward
the control plane via interfaces southbound from the Fig 1.4: Sflow-rt dashboard
controller. The SDN applications exist in the application plane
and communicate their network requirements toward the
controller plane via northbound interfaces, often called NBIs.
In the middle, the SDN controller translates the applications
requirements and sends low-level control over the network
elements, while providing equivalent information up to the
SDN applications [1].

Application Sflow-RT is used in application layer for


continuously deliver metrics to time series databases, send
communication between the devises get start with the IP
allocation and end to end user (Host to end user).

Fig 1.7:  Mininet Topology

Fig 1.8: Topology Setup

This traffic is monitored by the controller in application layer


where pooling take place.
Fig 1.5: DFD

Once the VM starts with the sflow-rt the connectivity between


the different networks take place with the mininet.

Fig 1.9: Mapping Switches

SDN based pooling resource is used to provide transparent


multi path communication between the devises. For analysing
the abnormal traffic input from the sflow-rt is used which is
then transferred towards the mitigating unit.

DDos mitigation is used for the resisting the impact of DDos


attacks on the network with respect to the internet by
protecting the target and relay network. Pymit.py file is used
to push switches into network. Once the attack is performed
over the network, ClearFlow command is used to update the
Fig 1.6: Floodlight Start network situation. This updated network is monitored by the
application sflow-rt in which traffic is monitored.
Normalflow.py script is used to push the devices in the
network with that system topology get created. With that
Fig 2.3:  Proof of concept

Fig 1.10: Sflow-rt


Future Scope:
Result:
The mitigation process in the current implementation is script
based which are analyzed by the application layer.The future
scope of this implementation is to automate the process of
scripting the mitigation process automatically as per the
intensity of the attack.It can be done through setting the packet
threshold for specific frequency of the traffic being parsed
through the network.

Conclusion:

This paper reports our on-going work on developing detection


and mitigation method for Ddos attack using SDN. We also
Fig 2.1: Flow-graph describe basic work of SDN with respect to the controller.
This method is used to detect the malicious data into in
network and map that data using traffic analysis.
It’s a virtual network created in mininet, it used to run real
Reference:
kernel, switch and application code on the VM in few second.
[1]https://www.opennetworking.org/wpcontent/uploads/
2013/02/TR_SDN_ARCH_1.0_06062014.pdf

[2] Early Detection and Mitigation of DDoS Attacks In


Software Defined Networks by Maryam Kia

[3] DDoS Attack Detection and Mitigation Using SDN:


Methods, Practices, and Solutions Narmeen Zakaria Bawany1 ·
Jawwad A. Shamsi1 · Khaled Salah2

[4] Experimental Demonstration of DDoS Mitigation over a


Quantum Key Distribution (QKD) Network Using Software
Defined Networking (SDN)
Fig 2.2: Flow from different hosts to victim
[5] DDoS Attack Detection under SDN Context Yang Xu and
Yong Liu
sFLOW-RT is a web interface used for mapping traffic within [6] SDN Based Collaborative Scheme for Mitigation of DDoS
the network. It provides a basic charting capabilities.
Attacks Sufian Hameed * ID and Hassan Ahmed Khan

You might also like