Giter VIP home page Giter VIP logo

analysis-of-ddos-attacks-in-sdn-environments's Introduction

Analysis of DDoS Attacks in SDN Environments

Course : Internet Technology and Applications

Course code : CO368

Overview :

SDN :

Software-Defined Networking (SDN) is an emerging architecture that is dynamic, manageable, cost-effective, and adaptable, making it ideal for the high-bandwidth, dynamic nature of today’s applications. This architecture decouples the network control and forwarding functions enabling the network control to become directly programmable and the underlying infrastructure to be abstracted for applications and network services.


SDN Architecture

DDoS :

A Denial-of-Service (DoS) attack is a cyber-attack where the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. This is typically accomplished by flooding the target with superfluous requests in an attempt to overload systems. In a Distributed Denial-of-Service (DDoS) attack, the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source. We have implemented two methods to detect DDoS attack in SDN environments

  1. Sample Entropy Sample Entropy is a method used to detect DDoS attacks in SDN. There are two essential components to DDoS detection using entropy: window size and a threshold. Window size is either based on a time period or number of packets. Entropy is calculated within this window to measure uncertainty in the coming packets. To detect an attack, a threshold is needed. If the calculated entropy passes a threshold or is below it, depending on the scheme, an attack is detected.
  2. Prinicple Component Analysis It is a mathematical procedure that transforms a number of (possibly) correlated variables into a (smaller) number of uncorrelated variables called principal components. The first principal component accounts for as much of the variability in the data as possible, and each succeeding component accounts for as much of the remaining variability as possible.

Steps to Reproduce :

Steps to reproduce along with the packages needed can be found here

Reference

  1. A Novel DDoS Attacks Detection Scheme for SDN Environments

Conclusion :

Results and conclusions along with output are included in report

Team :

Aswanth P P (15CO112)
Mohammed Ameen (15CO131)
Joe Antony (15CO220)

analysis-of-ddos-attacks-in-sdn-environments's People

Contributors

aswanthpp avatar joe019 avatar m-am33n avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar

analysis-of-ddos-attacks-in-sdn-environments's Issues

Module not found: forwarding.l3_detectionEntropy.py error

when i execute python2.7 ./pox.py forwarding.l3_detectionEntropy.py command in terminal it shows this error...

POX 0.3.0 (dart) / Copyright 2011-2014 James McCauley, et al.
Module not found: forwarding.l3_detectionEntropy.py

i already save l3_detectionEntropy.py file in forwarding folder in pox controller.
help me to solve this.

when i run python2.7 ./pox.py forwarding.l3_learning_editted_final i face a problem can u help me please

root@jack:/home/pox# python2.7 ./pox.py forwarding.l3_learning_editted_final.py
Traceback (most recent call last):
File "./pox.py", line 43, in
from pox.boot import boot
File "/home/pox/pox/boot.py", line 38, in
import pox.core
File "/home/pox/pox/core.py", line 182, in
import pox.lib.recoco as recoco
File "/home/pox/pox/lib/recoco/init.py", line 1, in
from .recoco import *
File "/home/pox/pox/lib/recoco/recoco.py", line 17, in
from queue import PriorityQueue
ImportError: No module named queue
root@jack:/home/pox#

1 way traffic

Hello, thanks for your work. I want to ask you about receiving and sending traffic. I mean you had done the work to send packets 1 way, for example: 33.125.36.55 -> 10.0.0.55. Now I want to send back from 10.0.0.55 -> 33.125.36.55, how can I do it with Scapy?

How PCA is implemented in the code?

Hello! Nice work!

How PCA is implemented in the code? It seems that it is using some linear regression model (statsmodels.regression.linear_model.OLS) between 'source IP' and 'destination IP'.
I do not understand why Ydist coverge to the interval (-1,1) and how Ydist is related to PCA residuals.

Another question: in the original paper "A Novel DDoS Attack..." the autors describes a attack without a fixed target. But the implemented attack requires a IP target. How it works?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.