完整後設資料紀錄
DC 欄位語言
dc.contributor.authorTung, Yung-Haoen_US
dc.contributor.authorWei, Hung-Chuanen_US
dc.contributor.authorTi, Yen-Wuen_US
dc.contributor.authorTsou, Yao-Tungen_US
dc.contributor.authorSaxena, Neeteshen_US
dc.contributor.authorYu, Chia-Muen_US
dc.date.accessioned2020-10-05T02:01:53Z-
dc.date.available2020-10-05T02:01:53Z-
dc.date.issued2020-08-01en_US
dc.identifier.urihttp://dx.doi.org/10.3390/electronics9081239en_US
dc.identifier.urihttp://hdl.handle.net/11536/155309-
dc.description.abstractSoftware-defined networking (SDN) is a new networking architecture with a centralized control mechanism. SDN has proven to be successful in improving not only the network performance, but also security. However, centralized control in the SDN architecture is associated with new security vulnerabilities. In particular, user-datagram-protocol (UDP) flooding attacks can be easily launched and cause serious packet-transmission delays, controller-performance loss, and even network shutdown. In response to applications in the Internet of Things (IoT) field, this study considers UDP flooding attacks in SDN and proposes two lightweight countermeasures. The first method sometimes sacrifices address-resolution-protocol (ARP) requests to achieve a high level of security. In the second method, although packets must sometimes be sacrificed when undergoing an attack before starting to defend, the detection of the network state can prevent normal packets from being sacrificed. When blocking a network attack, attacks from the affected port are directly blocked without affecting normal ports. The performance and security of the proposed methods were confirmed by means of extensive experiments. Compared with the situation where no defense is implemented, or similar defense methods are implemented, after simulating a UDP flooding attack, our proposed method performed better in terms of the available bandwidth, central-processing-unit (CPU) consumption, and network delay time.en_US
dc.language.isoen_USen_US
dc.subjectsoftware-defined networking (SDN)en_US
dc.subjectUDP flooding attacken_US
dc.subjectnetwork securityen_US
dc.titleCounteracting UDP Flooding Attacks in SDNen_US
dc.typeArticleen_US
dc.identifier.doi10.3390/electronics9081239en_US
dc.identifier.journalELECTRONICSen_US
dc.citation.volume9en_US
dc.citation.issue8en_US
dc.citation.spage0en_US
dc.citation.epage0en_US
dc.contributor.department資訊管理與財務金融系 註:原資管所+財金所zh_TW
dc.contributor.departmentDepartment of Information Management and Financeen_US
dc.identifier.wosnumberWOS:000564796100001en_US
dc.citation.woscount0en_US
顯示於類別:期刊論文