Keywords: SDN, Ddos Attacks, Mitm Attacks, Slow-Rate Dos, Network Security, Statistical Analysis, Entropy, Ip Analysis
Keywords: SDN, Ddos Attacks, Mitm Attacks, Slow-Rate Dos, Network Security, Statistical Analysis, Entropy, Ip Analysis
ii
Table of Contents
Abstract........................................................................................................................ ii
Table of Contents........................................................................................................iii
1. Introduction.............................................................................................................1
1.1. Research objectives............................................................................................1
1.2. Research methodology.......................................................................................1
1.3. Contribution of the research...............................................................................1
2. Details of research report........................................................................................2
2.1. Related work.......................................................................................................2
2.2. SDN Overview...................................................................................................3
2.2.1. SDN............................................................................................................. 3
2.2.2. OpenFlow Protocol.....................................................................................4
2.2.3. Pox Controller.............................................................................................5
2.3. Attacks in SDN Environments............................................................................6
2.3.1. Distributed Denial of Services (DDoS).......................................................6
2.3.2. Man-in-the-Middle (MitM).........................................................................6
2.3.3. Slow-rate DoS attacks.................................................................................7
2.4. System model.....................................................................................................9
2.4.1. System model..............................................................................................9
2.4.2. Entropy......................................................................................................10
2.4.3. SVM..........................................................................................................12
2.5. Model Evaluation.............................................................................................14
2.5.1. Simulation Environment............................................................................14
2.5.2. Practical Environment...............................................................................18
2.5.3. Evaluation.................................................................................................18
3. Conclusion..............................................................................................................22
4. References...............................................................................................................23
5. Appendix................................................................................................................24
iii
List of Figures and Tables
Figure 1. SDN Architecture
3
Figure 2. Slow-rate DOS attack model
3
Figure 3. System detection model
3
Figure 4. SVM Hyperplane and Hyperspace
3
Figure 5. Simulation model
3
Figure 6. SVM feature extraction
3
Figure 7. Practical topology
3
Table 1. Evaluated metrics of the proposed method for the DDoS attack
3
Table 2. Evaluated metrics of the proposed method for the MitM attack
3
Table 3. Evaluated metrics of the proposed method for the Slow-rate DoS attack
3
iv
1. Introduction
1.1. Research objectives
The research objectives for a multi-attack detection in SDN network are:
1. To propose a multi-attack detection approach for SDN networks that can
detect different attacks such as DDoS, MitM and Slow-rate DOS.
2. To compare the proposed approach with existing techniques for attack
detection in SDN networks.
3. To evaluate the performance of the method in a real SDN model
Overall, the research objectives aim to provide a practical and efficient solution
for improving the security of SDN networks against multiple types of attacks, and to
contribute to the growing body of research on attack detection in SDN networks.
1
approach in real-world SDN networks. Overall, the research contributes to the
advancement of knowledge in the field of SDN security and provides a practical and
effective solution for improving the security of SDN networks against multiple types
of attacks.
2
time window without any data from earlier time windows. Consequently, the threshold
will change over time and help the system detect the new flow of attack more
accurately. The suggested approach was tested on 3 time windows of 10, 30 and 60
seconds in which the 10 seconds window provides the best result.
Another popular method is machine learning detection which a machine learning
algorithm is trained and applied to a detection model to detect the abnormal events
[10]. In [11], the authors suggested a technique that based on the extraction of six
characteristic variables from traffic in the flow table acquired from the switch. They
then also used the SVM algorithm to classify data which helps accurately detect DDoS
attacks. According to experimental data, the method’s average accuracy rate was
95.24% even though only a small amount of flow data was collected. The authors in
[12] enhanced this algorithm with an advanced SVM technique. They customized a
reaction mechanism which informs DDoS attack by taking the security requirements
of the application into account. The method then still extracts 5 characteristics value to
train the model. The detection rate of this enhanced technique is approximately 97%.
Using another machine learning method, the authors in [13] proposed a new
method to detect DDoS attack in an SDN using Principal Component Analysis (PCA).
In the paper, they suggested a unique real-time DDoS detection system for the SDN
environment to examine the network status on traffic data. To minimize the calculating
workload, the network is split into various parts. The residual vector value is then
estimated in real time. The DDoS will be detected if this value falls below a threshold
over a specific period.
In addition, some research has proposed hybrid approaches that combine multiple
techniques to improve the accuracy and effectiveness of attack detection. Authors in
[14] designed a hybrid algorithm that combines entropy and KL-divergence. They
conducted two experiments to assess the accuracy of the proposed method in
determining the occurrence of a DoS attack and to compare its performance to that of
entropy alone in detecting the start of another DoS attack when a previous attack is
ongoing. Results ,from these experiments, provided that it would be difficult to detect
the start and end of the second attack using entropy alone, thus the proposed hybrid
method provides better results in this case. Papers [8-15] introduce a hybrid
classification model, that combined Genetic Algorithm and Decision Tree into an SDN
framework to detect DDoS attack. Characteristics features will be extracted from the
packets and determined by the Genetic Algorithm. If the feature found as abnormal, it
will then be classified with Decision Tree model. The system is tested with several
flooding attack types and have an accuracy rate of 98.20 %.
3
The work in [16] presented a comparison of opensource controllers ODL -
ONOS - Ryu, then described two methods of MITM attacks and presenting potential
security issue in SDN security threats and attack surfaces. The detection based on the
communication between the control layer (ODL) and infrastructure layer (Mininetin
southbound interface. In addition, the authors have also proposed an effective
countermeasure to prevent attacks based on the switch monitoring service.
Overall, the related works demonstrate the potential of using different techniques
to detect various types of attacks in SDN networks. However, there is still a need for
more research to improve the accuracy and efficiency of attack detection in SDN
networks, especially for multi-attack scenarios.
4
easily change network policies and configurations, allowing them to respond quickly
to the continuously changing of network conditions or business requirements.
SDN has been applied in a variety of use cases, such as network virtualization,
traffic engineering, and security. In network virtualization, SDN is used to create
multiple logical networks on top of a physical network infrastructure, allowing
multiple tenants to share the same physical resources. In traffic engineering, SDN is
used to optimize network performance by dynamically adjusting network paths and
traffic flows based on network conditions. In security, SDN can be used to detect and
mitigate cyber-attacks by monitoring network traffic and enforcing security policies.
Despite its many advantages, SDN also faces several challenges, such as security,
interoperability, and scalability. SDN controllers can be a single point of failure and
are vulnerable to cyber-attacks, making it crucial to secure them against potential
threats. Additionally, interoperability can be an issue when implementing SDN, as
different vendors may use different implementations of the OpenFlow protocol.
Finally, as networks become larger and more complex, scaling SDN can become a
significant challenge.
Overall, SDN represents a significant shift in networking architecture, allowing
for greater flexibility and control over network resources. As the demand for more
agile and dynamic networks continues to grow, SDN is likely to play an increasingly
important role in the future of networking.
6
While the POX controller has gained widespread adoption, there are also other
open-source controllers available for SDN, such as Ryu and OpenDaylight, each with
their own strengths and weaknesses. The choice of controller will depend on the
specific requirements of the network and the applications running on it. However, the
flexibility, ease of use, the more straightforward and effective in detection algorithm
and extensibility of the POX controller make it a popular choice for researchers and
developers looking to build custom SDN applications.
7
In this research, we use a hybrid method which combines SVM and Entropy
which improves the accuracy of the detection model and aldo reduce the response
time.
8
2.3.3. Slow-rate DoS attacks
A Slow Denial of Service (Slow DoS) attack is a type of cyber attack that aims
to consume the resources of a target system or network by exploiting vulnerabilities in
its infrastructure or applications. Unlike traditional DoS attacks that overwhelm a
target with a large volume of traffic in a short period of time, Slow DoS attacks use
low-rate traffic or exploits that slowly drain the target's resources over time, causing
the system to become unavailable or significantly slower to respond.
Slow DoS attacks can take many forms, including TCP SYN floods, HTTP
GET/POST floods, and low-and-slow attacks, among others. TCP SYN floods are
designed to flood the target system with a large number of connection requests,
causing it to allocate resources to incomplete connection requests, which eventually
leads to a denial of service. HTTP floods are similar but are targeted at web
applications, using GET or POST requests to exhaust the target's resources. Low-and-
slow attacks, on the other hand, are designed to send a small number of requests that
are spaced out over time, making them harder to detect and mitigate.
9
2. Anomaly Detection: Using machine learning algorithms and other
statistical techniques, anomaly detection can help detect Slow DoS
attacks. The algorithm can analyze traffic patterns, traffic volume, and
resource utilization to identify deviations from normal behavior that may
indicate an attack.
3. Packet Inspection: Deep packet inspection (DPI) is a technique that
involves analyzing the contents of network packets to identify patterns
that may indicate a Slow DoS attack. DPI can identify patterns that are
not visible at the network layer, such as slow HTTP requests or TCP
SYN packets that are sent at irregular intervals.
4. Behavior-based Detection: Behavior-based detection involves
monitoring the behavior of network connections and identifying
connections that are exhibiting suspicious behavior. For example,
connections that are sending a large number of requests or using unusual
protocols may be indicative of a Slow DoS attack.
5. Resource Monitoring: Monitoring the utilization of network resources
such as CPU, memory, and bandwidth can help detect Slow DoS attacks.
Slow DoS attacks consume resources over time, and monitoring the
utilization of these resources can help identify abnormal patterns that
may indicate an attack
6. Traffic Shaping: Traffic shaping involves regulating the flow of traffic to
prevent network congestion and can help detect Slow DoS attacks. By
monitoring traffic patterns and limiting the amount of traffic that can be
sent, traffic shaping can help prevent an attacker from consuming all
available network resources.
In summary, detecting Slow DoS attacks requires a combination of techniques
that involve monitoring network traffic, analyzing traffic patterns, and identifying
deviations from normal behavior. By using these techniques, organizations can detect
Slow DoS attacks and implement appropriate measures to mitigate the impact of the
attack. For that, we will develop a module based on traffic analyzing and machine
learning algorithms, which can correctly detect Slow DoS attacks in SDN.
10
identified. Whereas, the packets will go through the SVM Classifier of Slow-rate DOS
to detect the Slow-rate DOS.
2.4.2. Entropy
Entropy is a measure of randomness or uncertainty in a system, and it has been
used as a feature for detecting Distributed Denial of Service (DDoS) attacks in
network traffic. Entropy-based detection methods rely on the observation that DDoS
attacks often generate traffic with higher entropy than normal traffic. This is because
DDoS attacks often involve a large number of compromised devices generating traffic
with similar characteristics, leading to a less predictable pattern of traffic. By
measuring the entropy of packet payloads, packet headers, or other features of network
traffic, it is possible to identify patterns of traffic that are characteristic of DDoS
attacks.
11
Consider a collection W with n items (n ≤ N ) that represents a window of N
IP addresses and represents the number of distinct destination IP addresses in the
incoming packet headers:
W =\{ x 1 , x 2 , x 3 , … , x n \} (1)
In [27], a static test threshold is chosen based on the execution of many attacks in
order to detect a DDoS attack.
σ
ConfidenceInterval=X ± Z . (4)
√N
In (4), X stands for the sample mean while the remaining is called the margin of
error: Z is a confidence coefficient, σ is the sample standard deviation and N is the
sample size. The chosen confidence level is 95% ( Z = 1.9599).
normal average traffic minus the reliability interval and H a is equivalent to the
ma x
average entropy value in attack event plus a confidence interval. Finally, the static
threshold is determined as H n −∆. This static threshold is fixed and any entropy value
max
2.4.3. SVM
Support Vector Machine is a supervised learning algorithm, which means it will
predict outcomes for the new data based on the training labeled dataset. SVM
compares the new input data with the labeled data used for training in order to find the
accurate label for the new one. In this study, normal traffic will be labeled as “0” while
attack traffic will be labeled as “1”.
SVM can classify data into different classes and it is believed to be the best
machine learning algorithm in terms of data classifier.
The strength of SVM resides in its capacity to represent data as points in an n-
dimensional space (n – the number of features) Fig. 2. SVM converts a nonlinearly
separable sample set into a higher-dimensional hyperspace, enabling linear separability
of the data sample. Then a hyperplane will be created to distinctly classify 2 sample
classes. The hyperplane is called "Decision boundaries" and its shape will be based on
the number of features. Boundaries are lines if there are only two features and planes if
there are more. And the prediction for the new data can be made relying on which side
it lies on the boundaries.
13
Fig. 4: SVM Hyperplane and Hyperspace
a. DDoS attack
Characteristic values will be extracted from the flow status of the switch, then it
will be calculated and used as input data for the SVM model. Characteristic values are
the parameter used to represent the system status and they are collected as training
features for the classifier model. The value in an attack event will differ irregularly
with its in the normal event so by examining the difference in the attack and normal
value, we can detect the attack. There are five-tuple of characteristics [2] that we will
collect for detecting DDoS attack
1. “Speed of Source IP (SSIP)”: Represent the total number of incoming IP
sources within a particular period.
2. “Standard Deviation of Flowpacket (SDFP)”: Represent the standard deviation
of the packet.
3. “Standard Deviation of Flow Bytes (SDFB)”: Represent the deviation of the
number of bits in a particular time period t in a particular period of time.
4. “Speed of Flow Entries (SFE)”: This is the total number of flow entries coming
to the switch within a particular period of time. It also reflects how rapidly the
controller is handling new flow entries.
5. Number of Interactive Flowentries ratio (NIFE): Represent for the ratio
between Interactive Flow and Flow entries.
b. Slow-DoS attack
In a slow DoS attack, the hacker attempts to create as many connections as
possible to the webserver. Each of these connections will try to maintain the minimum
conditions to keep it from being deleted. Based on the advantages of OpenFlow
Switch, we propose the following characteristics that can distinguish between when an
14
attack is occurring and when it is not. First, we collect necessary information about
flow entries in the flow table. We then preprocess and extract four features as follows:
1. "avePackets" represents the average number of packets transmitted per flow.
Hackers during slow DoS attacks attempt to establish as many connections as
possible by sending minimum packets that can maintain the connection open
without deletion. A decrease in the number of packets per flow over time can
indicate a slow DoS attack.
2. "aveBytes" represents the average number of bytes transmitted per flow. In a
slow DoS attack, the header is divided into several parts and sent to the
webserver at a very slow rate. The webserver collects enough parts of the
header to respond to the request. As a result, the average number of bytes per
flow may decrease, indicating a slow DoS attack.
3. "flowPerIP" represents the number of flow entries per IP address. During a slow
DoS attack, the number of flow entries per IP address may increase since the
hacker will send and keep many connections aliving that are displayed in a flow
table. A significant increase in this metric may indicate a slow DoS attack.
4. "newFlowPerTime" represents the number of new flows created within a 10-
second time window. Slow DoS attacks can be detected by an increase in the
number of new flows created within the 10-second window, which suggests that
an attacker is attempting to overwhelm the system with many new connections.
The 10-second time window matches the idle timeout of flow entries, ensuring
that flows are properly deleted and new ones are created.
By monitoring these metrics, network administrators can detect and respond to
slow DoS attacks.
15
Fig. 5: Simulation model
In order to make the host communicate with each other through POX, we use the
l 3 _ learning module in Pox. This module offers layer 3 learning capabilities by storing
a list of IP address information between nodes. l 3 _ learning will analyse and extract
the IP address from each new packet that comes in. This information will be compared
with the list and if there is no similar path, the module will start ARP protocol to start
the request. In addition, we edited integrated algorithms that make it possible for the
POX controller to calculate entropy values and parameters needed to detect attacks
when there is an unusual change in incoming traffic.
a. DDoS
Scapy handled packet initialization and transmission in the system. Scapy is used
to generate UDP packets and spoof their source IP addresses to simulate attack and
normal traffic in the simulation system. The hosts in the model are given IP addresses
that increase gradually, starting from 10.0.0.1.
1) Phase 1: The system is in normal state: In normal state, we use a host to initiate
traffic and distribute packets to the whole system. The packet is sent every 0.1
second with a destination port of 80 and a source port of 2. 500 packets which
equivalent to 10 windows will be delivered in all during a single run.
We use formula (2) and (3) to determine the current entropy in a window of 50
packets. Formulas (5) and (6) are used, respectively, to calculate Average
Entropy and Standard Deviation. The dynamic entropy threshold is then
calculated using the above value and formula (7).
16
2) Phase 2: The system is in a State of Attack: We implement a 75% rate attack on
the system. The rate of an attack is determined by:
Ia
Rattackrate =1− .100 % (8)
I n+ I a
In (8), I a and I n are the period of time where attack traffic and normal traffic
occur, sequentially. In the system, normal traffic is randomly forwarded to all
hosts, whereas attack traffic is only intended for one host.
The rate tests of 75% were performed on a host to examine a more focused
attack so the changes in entropy can be seen more clearly in these simulations.
b. MitM
To execute the MITM attack, we use the dnspoof tools to sniffs live
connections and TCP traffic with filtering content.
c. Slow-rate DOS
17
Fig. 6: SVM feature evalution
Our team generated legitimate traffic during the period from cycle 1 to cycle
230, with each cycle being a sliding window of 10 consecutive captures. It is
easy to see that the aveBytes value varies significantly and fluctuates between
700 and 6000 bytes on average per stream, which is higher than during an
attack because data is continuously sent and received through the streams. On
the other hand, when an attack occurs, the value fluctuates around 200 bytes per
stream, which is the minimum value that a hacker can maintain to prevent the
streams from being deleted and disconnected.
Moving on to the avePackets value, this represents the average number of
packets per stream. When normal, it fluctuates between 5 and 30 packets per
stream, and during an attack, it stabilizes at around 4 packets per stream.
Hackers try to send the minimum number of packets possible to maintain the
connection, which means that packet size will be as small as possible.
The flowsPerIp value also reflects the difference when abnormalities occur in
the network. During an attack, the number of flows generated per IP address is
very high. We take an average value because in many cases, there may be
multiple attackers attacking a web server. This value fluctuates greatly when an
attack occurs, ranging from 100 to 700 connections per IP address.
The next value is newFlowPerTime, which represents the number of new flows
created within a certain time period, specifically 10 seconds. When connections
are deleted, hackers continuously create new connections in large numbers. It is
18
clear that during an attack, the number of new connections created fluctuates
between 400 and over 2000 connections.
2.5.3. Evaluation
We gathered 1000 samples to evaluate metrics for the proposed method. The
table 2 below shows the overview of the system parameter. There are 7 parameters
determine the performance of methods. True Positive (TP) represent the percentage of
attacks event that are successfully detected by the system, False Positive (FP) is the
rate of attack event which detected as normal. In contrast, True Negative (TN) stands
for the normal event that are successfully detected and False Negative (FN) is the
percentage of normal event wrongly detected as attack. Precision is the ratio of true
attack detected flows to all attack detected flows. Recall is the ratio of true attack
detected flows to all attack flows. Finally, accuracy is the detection rate of all system.
a. DDoS attacks
19
Table 1. Evaluated metrics of the proposed method for the DDoS attack.
The results in Table 2 show that the practical result is quite higher than the
simulation results. This happen because our practical topology is quite small
comparing with the simulation topology as there are just 8 hosts in the system. The
hybrid model represents a remarkable achievement in the field of intrusion detection.
The response time of this method is 4 seconds which make it able to swiftly identify
potential threats to the network. Furthermore, its accuracy of up to 99% is a testament
to the efficacy of the model. The entropy module’s sensitivity to anomalous
information variance which then follow up by the reconfirmation of the SVM classifier
help increase the chances of a correct outcome and contribute for the success of the
hybrid model.
b. MitM attacks
Table 2. Evaluated metrics of the proposed method for the MitM attack.
TP FP TN FN Precision Recall Accuracy
(%) (%) (%) (%) (%) (%) (%)
Practical
20
TP FP TN FN Precision Recall Accuracy
(%) (%) (%) (%) (%) (%) (%)
Practical
The presented results show that the SVM model achieved high accuracy and
performance in detecting Slow DoS attacks. The model achieved an overall accuracy
of 96%, indicating that it correctly classified 96% of the instances in the test dataset.
The precision for the normal class was 92%, indicating that when the model predicted
that an instance belonged to the normal class, it was correct 92% of the time. The
recall for the normal class was 100%, indicating that the model correctly identified all
instances that belonged to the normal class.
For the attack class, the precision was 100%, indicating that when the model
predicted that an instance belonged to the attack class, it was correct 100% of the
time. The recall for the attack class was 92%, indicating that the model correctly
identified 92% of the instances that belonged to the attack class.
Overall, the model's high accuracy and performance in detecting both normal
and attack instances suggest that it can be effectively integrated and deployed as a
module within an SDN network to detect Slow DoS attacks in real-time. The
presented figure illustrates an example scenario where host 3 sends a GET request to
retrieve an html file from host 1.
The request is received and returned with a successful response code of 200. At
the same time, the detection module also reports that the network is in a normal state.
21
After that, we sent attack traffic from the host 2 to the web server. At this time,
host 3 was unable to access the web server and was continuously denied due to host 2
sending requests exceeding the web server's allowed threshold (up to 329 connections
at the same time). Additionally, the detection module also issued a warning that the
network was under attack at switch number 2 (s2), where host 2 was connected and
sending data.
22
After host 2 stopped the attack, host 3 was able to send requests to access the
web server normally.
The estimated response time for our module to detect the abnormality in the
network is about 10 seconds after host 2 performs the attack. This time frame is fast
enough to detect a slow DoS attack because of the nature of this type of attack, which
is very similar to normal traffic, making it much harder to classify compared to
traditional DDoS attacks.
The slow DoS attack can go unnoticed for a long time and has the potential to
cause significant damage to a network by consuming its resources, making it
inaccessible to legitimate users. Therefore, early detection is crucial to mitigate the
damage caused by the attack. In our case, the SDN network with the integrated module
is capable of detecting and preventing slow DoS attacks, providing a higher level of
security to the network.
3. Conclusion
The implementation of a multi-attack system for detecting Distributed Denial of
Service (DDoS), Man-in-the-Middle (MitM), and slow-rate DDoS attacks in Software-
Defined Networking (SDN) provides an effective and comprehensive approach to
network security. This academic research has demonstrated the effectiveness of such a
system through both simulation and real-world experiments, highlighting the potential
of SDN for enhancing network security and mitigating various types of attacks.
23
The proposed system leverages the programmability and centralized control of
SDN to monitor network traffic and detect anomalies indicative of DDoS, MitM, and
slow-rate DDoS attacks. By using machine learning algorithms, the system is able to
classify network traffic into different categories and identify malicious patterns. This
approach allows for a more dynamic and adaptive system that can quickly respond to
emerging threats and adjust its detection mechanisms accordingly.
The simulation results demonstrate that the proposed system is capable of
achieving a high detection rate and low false positive rate, even under varying attack
scenarios. The system was able to detect DDoS attacks with an accuracy of over 99%,
and MitM attacks with an accuracy of over 98%. Additionally, the system was able to
detect slow-rate DDoS attacks with an accuracy of over 96%.
The real-world experiments confirmed the feasibility of implementing the
proposed system in a real-world SDN environment, with similar performance and
effectiveness as the simulation results. The experiments involved a testbed network
with multiple virtual machines, simulating various attack scenarios. The system was
able to successfully detect and mitigate all the simulated attacks, highlighting its
effectiveness in a practical setting.
Overall, this research provides valuable insights into the potential of SDN for
enhancing network security, particularly in the detection and mitigation of complex
and evolving network attacks. The proposed multi-attack system demonstrates the
effectiveness of combining machine learning with SDN to achieve a more dynamic
and adaptive security system. Further research can explore additional attack scenarios
and evaluate the proposed system in larger and more complex networks, ultimately
leading to the development of more robust and effective network security solutions.
4. References
[1] Vaseer, G. (2020). Multi-Attack Detection using Forensics and Neural Network based
Prevention for Secure MANETs. 2020 11th International Conference on Computing,
Communication and Networking Technologies (ICCCNT).
[2] Du, H.; Huang, D. Multi-Attack Detection: General Defense Strategy Based on Neural
Networks for CV-QKD. Photonics 2022, 9, 177
[3] Lubna Fayez Eliyan & Roberto Di Pietro (2021), "DoS and DDoS attacks in Software
Defined Networks: A survey of existing solutions and research challenges”, Future
Generation Computer Systems, Vol. 122, pp. 149-171.
24
[4] Kalkan K., Gur, G., & Alagoz F. (2018), “JESS: Joint Entropy-Based DDoS Defense
Scheme in SDN,” in IEEE Journal on Selected Areas in Communications, Vol. 36, No.
10, pp. 2358-2372.
[5] Mao, J.; Deng, W. & Shen, F. (2018), “DDoS Flooding Attack Detection Based on
Joint-Entropy with Multiple Traffic Features”, IEEE International Conference On Trust,
Security And Privacy In Computing And Communications/12th IEEE International
Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 237–
243.
[6] Jiang, Y.; Zhang, X.; Zhou, Q. & Cheng, Z. (2016), “An Entropy-Based DDoS Defense
Mechanism in Software Defined Networks”, Int. Conf. Commun. Netw., Vol.1, pp.169–
178.
[7] Mohammad Aladaileh, Mohammed Anbar, Iznan H. Hasbullah, Yousef K. Sanjalawe
and Yung-Wey Chong, “Entropy-Based Approach to Detect DDoS Attacks on Software
Defined Networking Controller”, Tech Science Press, 2021
[8] Tamer Omar, Anthony Ho & Brian Urbina (2019), “Detection of DDoS in SDN
Environment Using Entropy-based Detection”, IEEE International Symposium on
Technologies for Homeland Security (HST), pp. 1-4.
[9] H. Lotfalizadeh & D. S. Kim (2020), "Investigating Real-Time Entropy Features of
DDoS Attack Based on Categorized Partial-Flows," 14th International Conference on
Ubiquitous Information Management and Communication (IMCOM), pp. 1-6.
[10] Lubna Fayez Eliyan & Roberto Di Pietro (2021), “DoS and DDoS attacks in Software
Defined Networks: A survey of existing solutions and research challenges”, Future
Generation Computer Systems, Vol. 122, pp. 149-171.
[11] Ye J, Cheng X, Zhu J, Feng L & Song L (2018), “A DDoS attack detection method
based on SVM in software defined network”, Security and Communication Networks,
Vol. 2018, Hindawi.
[12] Myo Myint Oo, Sinchai Kamolphiwong, Thossaporn Kamolphiwong & Sangsuree
Vasupongayya (2019), “Advanced Support Vector Machine-(ASVM-) based detection
for Distributed Denial of Service (DDoS) attack on Software Defined Networking
(SDN)'', Journal of Computer Networks and Communications, Vol. 2019, Hindawi.
[13] D. Wu, J. Li, S. K. Das, J. Wu, Y. Ji & Z. Li (2018), “A Novel Distributed Denial-of-
Service Attack Detection Scheme for Software Defined Networking Environments,”
2018 IEEE International Conference on Communications (ICC), pp. 1-6.
[14] Nada M.AbdelAzim, Sherif, F.Fahmy, Mohammed Ali Sobh, Ayman, M.Bahaa Eldin,
"A hybrid entropy-based DoS attacks detection system for software defined networks
25
(SDN): A proposed trust mechanism", Egyptian Informatics Journal, Volume 22, Issue
1, March 2021, Pages 85-90.
[15] X. Zhao, S. Chen, Y. Yu and Z. Sun, "Genetic Algorithm based Intrusion Detection
System for Software-Defined Network Architecture," 2020 IEEE International
Conference on Progress in Informatics and Computing (PIC), Shanghai, China, 2020,
pp. 309-313.
[16] Sebbar, A., Boulmalf, M., Dafir Ech-Cherif El Kettani, M., & Badd, Y. (2018).
Detection MITM Attack in Multi-SDN Controller. 2018 IEEE 5th International
Congress on Information Science and Technology (CiSt).
5. Appendix
26