Paper
28 October 2022 A two-stage DDoS attacks detection method in SDN
Yan Li, Bin Qin, YunSheng Zhang, Wei Nie
Author Affiliations +
Proceedings Volume 12453, Third International Conference on Computer Communication and Network Security (CCNS 2022); 1245315 (2022) https://doi.org/10.1117/12.2659127
Event: Third International Conference on Computer Communication and Network Security (CCNS 2022), 2022, Hohhot, China
Abstract
Distributed Denial of Service (DDoS) attacks are one of the dangers of Software Defined Networking (SDN). In order to detect DDoS attacks quickly and accurately, this paper proposes a two-stage DDoS attacks detection method based on SDN, which combines a preliminary detection method based on information entropy and K-Nearest Neighbors (KNN) regression algorithm, and a depth detection method based on Gated Recurrent Unit (GRU). First, the two-stage detection method extracts their necessary data features from the flow table information respectively through the feature extraction module. Second, the preliminary detection module uses the information entropy of the six-tuple as feature vectors to train the KNN regression model. Third, the depth detection module uses the GRU neural network to fully learn the sequence features. Finally, the method proposed in this paper is verified in the experimental environment based on Mininet. When the first-stage preliminary detection module determines that the SDN network environment is suspected of being attacked by DDoS, the second-stage depth detection module is called for further detection. The experimental results demonstrate that the method proposed in this paper can effectively detect DDoS attacks in SDN.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yan Li, Bin Qin, YunSheng Zhang, and Wei Nie "A two-stage DDoS attacks detection method in SDN", Proc. SPIE 12453, Third International Conference on Computer Communication and Network Security (CCNS 2022), 1245315 (28 October 2022); https://doi.org/10.1117/12.2659127
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Switches

Data modeling

Detection and tracking algorithms

Feature extraction

Device simulation

Environmental sensing

Network architectures

Back to Top