Back to Search Start Over

Mitigating DDoS Attacks using OpenFlow-based Software Defined Networking

Authors :
Jonker, Mattijs
Sperotto, Anna
Latré, Steven
Charalambides, Marinos
François, Jérôme
Schmitt, Corinna
Stiller, Burkhard
Source :
Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, 129-133, STARTPAGE=129;ENDPAGE=133;TITLE=Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Intelligent Mechanisms for Network Configuration and Security ISBN: 9783319200330, AIMS
Publication Year :
2015

Abstract

Over the last years, Distributed Denial-of-Service (DDoS) attacks have become an increasing threat on the Internet, with recent attacks reaching traffic volumes of up to 500 Gbps. To make matters worse, web-based facilities that offer “DDoS-as-a-service” (i.e., Booters) allow for the layman to launch attacks in the order of tens of Gbps in exchange for only a few euros. A recent development in networking is the principle of Software Defined Networking (SDN), and related technologies such as OpenFlow. In SDN, the control plane and data plane of the network are decoupled. This has several advantages, such as centralized control over forwarding decisions, dynamic updating of forwarding rules, and easier and more flexible network configuration. Given these advantages, we expect SDN to be well-suited for DDoS attack mitigation. Typical mitigation solutions, however, are not built using SDN. In this paper we propose to design and to develop an OpenFlow-based mitigation architecture for DDoS attacks. The research involves looking at the applicability of OpenFlow, as well as studying existing solutions built on other technologies. The research is as yet in its beginning phase and will contribute towards a Ph.D. thesis after four years.

Details

ISBN :
978-3-319-20033-0
ISSN :
03029743
ISBNs :
9783319200330
Database :
OpenAIRE
Journal :
Proceedings of the 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015
Accession number :
edsair.doi.dedup.....58d85c479c29f96c567af3c9f218c007