完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Tung, Yung-Hao | en_US |
dc.contributor.author | Wei, Hung-Chuan | en_US |
dc.contributor.author | Ti, Yen-Wu | en_US |
dc.contributor.author | Tsou, Yao-Tung | en_US |
dc.contributor.author | Saxena, Neetesh | en_US |
dc.contributor.author | Yu, Chia-Mu | en_US |
dc.date.accessioned | 2020-10-05T02:01:53Z | - |
dc.date.available | 2020-10-05T02:01:53Z | - |
dc.date.issued | 2020-08-01 | en_US |
dc.identifier.uri | http://dx.doi.org/10.3390/electronics9081239 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/155309 | - |
dc.description.abstract | Software-defined networking (SDN) is a new networking architecture with a centralized control mechanism. SDN has proven to be successful in improving not only the network performance, but also security. However, centralized control in the SDN architecture is associated with new security vulnerabilities. In particular, user-datagram-protocol (UDP) flooding attacks can be easily launched and cause serious packet-transmission delays, controller-performance loss, and even network shutdown. In response to applications in the Internet of Things (IoT) field, this study considers UDP flooding attacks in SDN and proposes two lightweight countermeasures. The first method sometimes sacrifices address-resolution-protocol (ARP) requests to achieve a high level of security. In the second method, although packets must sometimes be sacrificed when undergoing an attack before starting to defend, the detection of the network state can prevent normal packets from being sacrificed. When blocking a network attack, attacks from the affected port are directly blocked without affecting normal ports. The performance and security of the proposed methods were confirmed by means of extensive experiments. Compared with the situation where no defense is implemented, or similar defense methods are implemented, after simulating a UDP flooding attack, our proposed method performed better in terms of the available bandwidth, central-processing-unit (CPU) consumption, and network delay time. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | software-defined networking (SDN) | en_US |
dc.subject | UDP flooding attack | en_US |
dc.subject | network security | en_US |
dc.title | Counteracting UDP Flooding Attacks in SDN | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.3390/electronics9081239 | en_US |
dc.identifier.journal | ELECTRONICS | en_US |
dc.citation.volume | 9 | en_US |
dc.citation.issue | 8 | en_US |
dc.citation.spage | 0 | en_US |
dc.citation.epage | 0 | en_US |
dc.contributor.department | 資訊管理與財務金融系 註:原資管所+財金所 | zh_TW |
dc.contributor.department | Department of Information Management and Finance | en_US |
dc.identifier.wosnumber | WOS:000564796100001 | en_US |
dc.citation.woscount | 0 | en_US |
顯示於類別: | 期刊論文 |