Protection of software defined networks from link flood attack

Software Defined Networking (SDN) provides a novel network management approach by separating the data plane from the control plane. This makes design of networks simple and programmable. SDN ability to have the complete network visibility allows the network to have better network security through be...

Full description

Saved in:
Bibliographic Details
Main Author: Tay, Andy Thiam Chek
Other Authors: Ma Maode
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2020
Subjects:
Online Access:https://hdl.handle.net/10356/141437
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:Software Defined Networking (SDN) provides a novel network management approach by separating the data plane from the control plane. This makes design of networks simple and programmable. SDN ability to have the complete network visibility allows the network to have better network security through better analysis of traffic patterns. The centralized controller has become a new vulnerability in the SDN. The network is vulnerable to the Link Flood Attack (LFA), one of the new, stealthy attacks. In this project, we want to study the latest type of DDoS attack, the Link Flood Attacks and explore various methods to mitigate the LFAs to protect the SDN using Entropy. LFA is an attack which uses multiple bots generating spoof IP packets and launch them to the decoy server of a target area at low rate legitimate traffic by consuming all the bandwidth in order to break the target area’s critical link. Every network system has an entropy value which decreases if randomness is detected in the network. To preventing the LFA, I will be developing attacking algorithm to generate UDP packets to generate traffic to the decoy server. The mitigation algorithm will be implemented using the POX controller with Mininet to detect the attack. The algorithm was named as LFA Radar and was then evaluated for its accuracy