Ontology type: schema:ScholarlyArticle
2019-05
AUTHORS ABSTRACTIn recent time, software defined networking (SDN) has evolved into a new and promising networking paradigm. In the SDN-based cloud, the essential features of SDN, including global view of the whole network, software-based traffic analysis, centralized control over the network, etc. can greatly improve the DDoS attack detection and mitigation capabilities of the cloud. However, integration of SDN in the cloud itself introduces new DDoS attack vulnerabilities. Limited flow-table size is a vulnerability that can be exploited by the adversaries to perform DDoS attacks on the SDN-based cloud. In this paper, we first discuss various essential features of SDN that makes it a suitable networking technology for cloud computing. In addition, we represent the flow table-space of a switch by using a queuing theory based mathematical model. Further, we propose a novel flow-table sharing approach to protect the SDN-based cloud from flow table overloading DDoS attacks. This approach utilizes idle flow-table of other OpenFlow switches in the network to protect the switch’s flow-table from overloading. Our approach increases the resistance of the cloud system against DDoS attacks with minimal involvement of the SDN controller. Thus, it has very low communication overhead. Our claims are well supported by the extensive simulation-based experiments. More... »
PAGES1985-1997
http://scigraph.springernature.com/pub.10.1007/s12652-018-0800-9
DOIhttp://dx.doi.org/10.1007/s12652-018-0800-9
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1103483226
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Computer Software",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "National Institute of Technology Kurukshetra",
"id": "https://www.grid.ac/institutes/grid.444547.2",
"name": [
"National Institute of Technology Kurukshetra, Kurukshetra, India"
],
"type": "Organization"
},
"familyName": "Bhushan",
"givenName": "Kriti",
"id": "sg:person.016535246671.23",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016535246671.23"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "National Institute of Technology Kurukshetra",
"id": "https://www.grid.ac/institutes/grid.444547.2",
"name": [
"National Institute of Technology Kurukshetra, Kurukshetra, India"
],
"type": "Organization"
},
"familyName": "Gupta",
"givenName": "B. B.",
"id": "sg:person.014643362613.49",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014643362613.49"
],
"type": "Person"
}
],
"citation": [
{
"id": "https://doi.org/10.1016/j.future.2012.12.011",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1002575568"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1145/2043164.2018466",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1002581335"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1016/j.jnca.2010.06.004",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1013494278"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1145/2491185.2491191",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1020395938"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/mc.2014.329",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1025094614"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1145/1355734.1355746",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1034503230"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1016/j.comnet.2015.02.026",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1035138624"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1080/19393550903317070",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1043434055"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1145/2491185.2491212",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1045551095"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1145/2602204.2602219",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1047361055"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/comst.2014.2320094",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061258211"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/comst.2015.2474118",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061258340"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/comst.2015.2487361",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061258348"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/jproc.2014.2371999",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061297977"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/mcom.2013.6461198",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061395796"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/mcom.2015.7081075",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061396323"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/tc.2013.208",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061535589"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/tpds.2013.181",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061754285"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/tpds.2014.2318320",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061754616"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/tsc.2016.2602861",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061787031"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.4018/ijcac.2015040104",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1071877902"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.4018/ijcac.2016070103",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1071877924"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.4018/ijcac.2015010106",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1071883325"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1049/el.2016.2234",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1083922216"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1016/j.future.2017.02.006",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1084076504"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1504/ijbdi.2017.083116",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1084319747"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s10586-017-0849-9",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1084518456",
"https://doi.org/10.1007/s10586-017-0849-9"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s11042-017-4742-6",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1085385312",
"https://doi.org/10.1007/s11042-017-4742-6"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s11042-017-4742-6",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1085385312",
"https://doi.org/10.1007/s11042-017-4742-6"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1016/j.cose.2017.08.007",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1091402103"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/icton.2013.6602678",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094414897"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/lcn.2010.5735752",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094416814"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/icon.2008.4772654",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094779853"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/gree.2013.25",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094789993"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/icppw.2010.46",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1095577860"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s10586-017-1649-y",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1100790497",
"https://doi.org/10.1007/s10586-017-1649-y"
],
"type": "CreativeWork"
}
],
"datePublished": "2019-05",
"datePublishedReg": "2019-05-01",
"description": "In recent time, software defined networking (SDN) has evolved into a new and promising networking paradigm. In the SDN-based cloud, the essential features of SDN, including global view of the whole network, software-based traffic analysis, centralized control over the network, etc. can greatly improve the DDoS attack detection and mitigation capabilities of the cloud. However, integration of SDN in the cloud itself introduces new DDoS attack vulnerabilities. Limited flow-table size is a vulnerability that can be exploited by the adversaries to perform DDoS attacks on the SDN-based cloud. In this paper, we first discuss various essential features of SDN that makes it a suitable networking technology for cloud computing. In addition, we represent the flow table-space of a switch by using a queuing theory based mathematical model. Further, we propose a novel flow-table sharing approach to protect the SDN-based cloud from flow table overloading DDoS attacks. This approach utilizes idle flow-table of other OpenFlow switches in the network to protect the switch\u2019s flow-table from overloading. Our approach increases the resistance of the cloud system against DDoS attacks with minimal involvement of the SDN controller. Thus, it has very low communication overhead. Our claims are well supported by the extensive simulation-based experiments.",
"genre": "research_article",
"id": "sg:pub.10.1007/s12652-018-0800-9",
"inLanguage": [
"en"
],
"isAccessibleForFree": false,
"isPartOf": [
{
"id": "sg:journal.1043999",
"issn": [
"1868-5137",
"1868-5145"
],
"name": "Journal of Ambient Intelligence and Humanized Computing",
"type": "Periodical"
},
{
"issueNumber": "5",
"type": "PublicationIssue"
},
{
"type": "PublicationVolume",
"volumeNumber": "10"
}
],
"name": "Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment",
"pagination": "1985-1997",
"productId": [
{
"name": "readcube_id",
"type": "PropertyValue",
"value": [
"2b58b1fb2a741c9e57b946431b20a0fae09634347ca8855ba2688f53a5dbe338"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/s12652-018-0800-9"
]
},
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1103483226"
]
}
],
"sameAs": [
"https://doi.org/10.1007/s12652-018-0800-9",
"https://app.dimensions.ai/details/publication/pub.1103483226"
],
"sdDataset": "articles",
"sdDatePublished": "2019-04-11T13:57",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000371_0000000371/records_130817_00000005.jsonl",
"type": "ScholarlyArticle",
"url": "https://link.springer.com/10.1007%2Fs12652-018-0800-9"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s12652-018-0800-9'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s12652-018-0800-9'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s12652-018-0800-9'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s12652-018-0800-9'
This table displays all metadata directly associated to this object as RDF triples.
176 TRIPLES
21 PREDICATES
62 URIs
19 LITERALS
7 BLANK NODES