Skip to main content

Detection of DDoS Attack Using SDN in IoT: A Survey

  • Conference paper
  • First Online:
Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2019)

Abstract

IOT: Internet of Things is a developing technique, it is the system of vehicles, home apparatuses, physical gadgets, and different things installed with hardware, programming, sensors, actuators, and system availability which empower these items to associate and trade data. IOT is made out of vast number of various end frameworks associated with web. Physical gadgets installed with RFID, sensor, etc. which enables item to communicate with one another. Security is a serious issue because all the heterogeneous end systems are communicated with each other through internet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chuah, J.W.: The Internet of Things: an overview and new perspectives in systems design. In: International Symposium on Integrated Circuits (2014). 978-1-4799-4833-8/14

    Google Scholar 

  2. Agrawal, S., Das, M.L.: Internet of Things – A Paradigm Shift of Future Internet Applications, Institute of Technology, Nirma University, Ahmedabad 382 481, 08-10 (2011)

    Google Scholar 

  3. Xu, X.: Study on security problems and key technologies of the Internet of Things. In: International Conference on Computation and Information Sciences (2013)

    Google Scholar 

  4. Kanuparthi, A., Karri, R., Addepalli, S.: Hardware and embedded security in the context of Internet of Things. In: CyCAR 2013: Proceedings of the 2013 ACM Workshop on Security, Privacy & Dependability for Cyber Vehicles, pp. 61–64 (2013)

    Google Scholar 

  5. Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges, countermeasures, and future directions, impact of next-generation mobile technologies on IoT: cloud convergence

    Google Scholar 

  6. Yu, W., Köse, S.: A lightweight masked AES implementation for securing IoT against CPA attacks. IEEE Trans. Circ. Syst. I Regul. Pap. 64(11), 2934–2944 (2017)

    Article  MathSciNet  Google Scholar 

  7. Xu, T., Gao, D., Dong, P., Zhang, H., Foh, C.H., Chao, H.-C.: Defending against new-flow attack in SDN-based Internet of Things, special section on security and privacy in applications and services for future Internet of Things, vol. 5 (2017)

    Article  Google Scholar 

  8. Sicari, S., Rizzardi, A., Miorandi, D., Coen-Porisini, A.: Dynamic policies in Internet of Things: enforcement and synchronization. IEEE Internet of Things J. 4(6), 2228–2238 (2017)

    Google Scholar 

  9. Ngu, A.H.H., Gutierrez, M., Metsis, V., Nepal, S., Sheng, Q.Z.: IoT middleware: a survey on issues and enabling technologies. IEEE Internet of Things J. 4(1), 1 (2017)

    Article  Google Scholar 

  10. Fermantle, P., Scott, P.: A security survey of middleware for the Internet of Things. PeerJ PrePrints 3, e1521 (2015)

    Google Scholar 

  11. Razzaque, M.A., Milojevic-Jevric, M., Palade, A., Clarke, S.: Middleware for Internet of Things: a survey. IEEE Internet of Things J. 3(1), 1 (2016)

    Article  Google Scholar 

  12. Moldovan, G., Tragosy, E.Z., Fragkiadakisy, A., Pöhlsz, H.C., Calvox, D.: An IoT middleware for enhanced security and privacy: the RERUM approach (2016). ISSN: 2157-4960

    Google Scholar 

  13. Shin, S., Gu, G.: Attacking software-defined networks: a first feasibility study. In: Proceedings of the 2nd ACM SIGCOMM Workshop Hot Topics Software Defined Networks, New York, NY, USA, pp. 165–166 (2013)

    Google Scholar 

  14. Pena, J.G.V., Yu, W.E.: Development of a distributed firewall using software defined networking technology. In: Proceedings of the 4th IEEE International Conference on Information Science and Technology (ICIST), Shenzhen, China, pp. 449–452 (2014)

    Google Scholar 

  15. Seufert, S., O’Brain, D.: Machine learning for automatic defence against Distributed Denial of Service attacks. In: IEEE International Conference on Communications (2007)

    Google Scholar 

  16. Yuan, X., Li, C., Li, X.: DeepDefense: identifying DDoS attack via deep learning. In: IEEE International Conference on Smart Computing (SMARTCOMP) (2017). 29-31 Electronic ISBN 978-1-5090-6517-2, Print on Demand (PoD) ISBN 978-1-5090-6518-9

    Google Scholar 

  17. Hoyos Ll, M.S., Isaza E, G.A., Vélez, J.I., Castillo O, L.: Distributed Denial of Service (DDoS) attacks detection using machine learning prototype

    Google Scholar 

  18. Jararweh, Y., Al-Ayyoub, M., Darabseh, A., Benkhelifa, E., Vouk, M., Rindos, A.: SDIoT: a software defined based Internet of Things framework. Springer, Heidelberg (2015). Print ISSN 1868-5137, Online ISSN 1868-5145

    Article  Google Scholar 

  19. CCTV-based botnet used for DDoS attacks (2016). https://www.ddosattacks.net/a-massive-botnet-of-cctv-cameras-involved-in-ferocious-ddos-attacks

  20. DDoS Attack on Bank of Greece Website (2016). https://www.hackread.com/anonymous-ddos-attack-bank-greece-website-down

  21. HSBC Internet Banking Services Down After DDoS Attack (2016). http://www.telegraph.co.uk/finance/newsbysector/banksandfinance/12129411/HSBC-online-banking-service-crashes-again.html

  22. Irish Government Websites temporarily offline due to DDoS-attack (2016). http://www.bbc.com/news/world-europe-35379817

  23. Thai Government Websites hit by denial-of-service attack (2016). http://www.bbc.com/news/world-asia-34409343

  24. https://www.tripwire.com/state-of-security/featured/5-notable-ddos-attacks-2017/

  25. http://ddosattacks.net/russian-defense-ministrys-website-suffers-ddos-attacks-during-poll-for-new-weapons-names/

  26. Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against Distributed Denial of Service (DDoS). IEEE Commun. Surv. Tutor. 15(4), 2046–2069 (2013)

    Article  Google Scholar 

  27. Kaufman, C., Perlman, R., Sommerfeld, B.: DoS protection for UDP-based protocols. In: Proceedings of the 10th ACM Conference on Computer and Communication Security—CCS 2003, p. 2 (2003)

    Google Scholar 

  28. Peng, T., Leckie, C., Ramamohanarao, K.: Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput. Surv. 39(1), 3es (2007)

    Article  Google Scholar 

  29. Czyz, J., Kallitsis, M., Papadopoulos, C., Bailey, M.: Taming the 800 Pound Gorilla: the rise and decline of NTP DDoS attacks. In: IMC, pp. 435–448 (2014)

    Google Scholar 

  30. ArunRaj Kumar, P., Selvakumar, S.: Distributed Denial of Service attack detection using an ensemble of neural classifier. Comput. Commun. 34(11), 1328–1341 (2011)

    Article  Google Scholar 

  31. Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX/OpenFlow. In: LCN 2010 Proceedings of the 2010 IEEE 35th Conference on Local Computer Networks, Washington, pp. 408–415. IEEE (2010)

    Google Scholar 

  32. Dotcenko, S., Vladyko, A., Letenko, I.: A fuzzy logic-based information security management for software-defined networks. In: 16th International Conference on Advanced Communication Technology (ICACT), pp. 167–171. IEEE (2014)

    Google Scholar 

  33. Xu, X., Sun, Y., Huang, Z.: Defending DDoS attacks using hidden Markov models and cooperative reinforcement learning. In: Proceedings of the 2007 Pacific Asia Conference on Intelligence and Security Informatics, PAISI 2007, pp. 196–207 (2007). ISBN 978-3-540-71548-1

    Google Scholar 

  34. Bera, S., Misra, S., Vasilakos, A.V.: Software-defined networking for Internet of Things: a survey. IEEE Internet of Things J. 4(6), 1994–2008 (2017). Electronic ISSN: 2327-4662

    Article  Google Scholar 

  35. Dillon, C., Berkelaar, M.: OpenFlow (D)DoS Mitigation, February 2014. http://www.delaat.net/rp/2013-2014/p42/report.pdf

  36. Yen, T.-F., Reiter, M.K.: Traffic aggregation for malware detection. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 207–227. Springer, Heidelberg (2008)

    Google Scholar 

  37. Shin, S., Porras, P., Yegneswaran, V., Fong, M., Gu, G., Tyson, M., Texas, A., Station, C., Park, M.: Fresco: modular composable security services for software-defined networks. In: Network and Distributed System Security Symposium, pp. 1–16 (2013)

    Google Scholar 

  38. Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: clustering analysis of network traffic for protocol- and structure-independent Botnet detection. In: USENIX Security Symposium, vol. 5(2), pp. 139–154 (2008)

    Google Scholar 

  39. Jin, R., Wang, B.: Malware detection for mobile devices using software-defined networking. In: Proceedings of the 2013 Second GENI Research and Educational Experiment Workshop, GREE 2013, Washington, pp. 81–88. IEEE (2013)

    Google Scholar 

  40. Lim, S., Ha, J., Kim, H., Kim, Y., Yang, S.: A SDN-oriented DDoS blocking scheme for Botnet-based attacks. In: Sixth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 63–68. IEEE (2014)

    Google Scholar 

  41. Mehdi, S.K., Khalid, J., Khayam, S.A.: Revisiting traffic anomaly detection using software defined networking. In: Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection, pp. 161–180 (2011)

    Google Scholar 

  42. Schechter, S.E., Jung, J., Berger, A.W.: Fast detection of scanning worm infections. In: International Workshop on Recent Advances in Intrusion Detection. Springer, Heidelberg (2004)

    Google Scholar 

  43. Giotis, K., Argyropoulos, C., Androulidakis, G., Kalogeras, D., Maglaris, V.: Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput. Netw. 62, 122–136 (2014)

    Article  Google Scholar 

  44. Chin, T., Mountrouidou, X., Li, X., Xiong, K.: Selective packet inspection to detect DoS flooding using software defined networking (SDN). In: 2015 IEEE 35th International Conference on distributed Computing Systems Workshops (ICDCSW), pp. 95–99. IEEE (2015)

    Google Scholar 

  45. Singh, K.J., De, T.: DDOS attack detection and mitigation technique based on Http count and verification using CAPTCHA. In: 2015 International Conference on Computational Intelligence and Networks (2015)

    Google Scholar 

  46. Yin, D., Zhang, L., Yang, K.: A DDoS attack detection and mitigation with software-defined Internet of Things framework. In: IEEE Access, Special Section on Security and Trusted Computing for Industrial Internet of Things, pp. 24694–24705, 30 April 2018

    Article  Google Scholar 

  47. Zhang, J., Zhang, X., Imran, M.A., Evans, B., Zhang, Y., Wang, W.: Energy efficient hybrid satellite terrestrial 5G networks with software defined features. J. Commun. Netw. 19(2), 147–161 (2017)

    Article  Google Scholar 

  48. Huo, R., et al.: Software defined networking, caching, and computing or green wireless networks. IEEE Commun. Mag. 54(11), 185–193 (2016)

    Article  Google Scholar 

  49. Guest Editorial: IEEE Systems Journals Special Issue on “Intelligent Internet of Things”. IEEE Syst. J. 10(3) (2016)

    Google Scholar 

  50. Chung, C.-J., Khatkar, P., Xing, T., Lee, J., Huang, D.: NICE: network intrusion detection and countermeasure. IEEE Trans. Dependable Secure Comput. 10(4), 198–211 (2013)

    Article  Google Scholar 

  51. Xing, T., Huang, D., Xu, L., Chung, C.J., Khatkar, P.: SnortFlow: a OpenFlow-based intrusion prevention system in cloud environment. In: Proceedings of the 2013 2nd GENI Research and Educational Experiment Workshop, GREE 2013, pp. 89–92 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. J. Beslin Pajila .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Beslin Pajila, P.J., Golden Julie, E. (2020). Detection of DDoS Attack Using SDN in IoT: A Survey. In: Balaji, S., Rocha, Á., Chung, YN. (eds) Intelligent Communication Technologies and Virtual Mobile Networks. ICICV 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 33. Springer, Cham. https://doi.org/10.1007/978-3-030-28364-3_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-28364-3_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-28363-6

  • Online ISBN: 978-3-030-28364-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics