Experimenting and evaluating the impact of DoS attacks on different SDN controllers

The flexibility and centrality of Software Defined Networking (SDN) has made it vulnerable to Denial of Service (DoS) attacks. Despite of the advantages, the potential DoS attacks may compromise the functions of switches, control channel and SDN controller. This paper is devoted to simulating and an...

Full description

Saved in:
Bibliographic Details
Main Authors: Alashhab, A.A., Soperi Mohd Zahid, M., Barka, A.A., Albaboh, A.M.
Format: Conference or Workshop Item
Published: Institute of Electrical and Electronics Engineers Inc. 2021
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85113651747&doi=10.1109%2fMI-STA52233.2021.9464469&partnerID=40&md5=1e45d8e127d5c94656cde57dc90c4ab7
http://eprints.utp.edu.my/30403/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utp.eprints.30403
record_format eprints
spelling my.utp.eprints.304032022-03-25T06:51:09Z Experimenting and evaluating the impact of DoS attacks on different SDN controllers Alashhab, A.A. Soperi Mohd Zahid, M. Barka, A.A. Albaboh, A.M. The flexibility and centrality of Software Defined Networking (SDN) has made it vulnerable to Denial of Service (DoS) attacks. Despite of the advantages, the potential DoS attacks may compromise the functions of switches, control channel and SDN controller. This paper is devoted to simulating and analyzing the impact of DoS packet in flooding attacks on SDN controller and control channel which may even affect the whole SDN network. The network performance is tested and emulated by using different testing tools of simulation in Mininet such as Hping3 and Wireshark. Likewise, the three different SDN controllers Floodlight, Ryu and POX performed as the uplink control data. Our findings show that with quite limited resources in pure open source SDN controllers, an attacker can produce a major distraction against an SDN networks. The recovery rate of SDN controllers show variable delay weakness between controllers' performance: that the best result for the Ryu controller after sequences packets 6, and the worst recovery rate for POX controller after sequences packets 47. © 2021 IEEE. Institute of Electrical and Electronics Engineers Inc. 2021 Conference or Workshop Item NonPeerReviewed https://www.scopus.com/inward/record.uri?eid=2-s2.0-85113651747&doi=10.1109%2fMI-STA52233.2021.9464469&partnerID=40&md5=1e45d8e127d5c94656cde57dc90c4ab7 Alashhab, A.A. and Soperi Mohd Zahid, M. and Barka, A.A. and Albaboh, A.M. (2021) Experimenting and evaluating the impact of DoS attacks on different SDN controllers. In: UNSPECIFIED. http://eprints.utp.edu.my/30403/
institution Universiti Teknologi Petronas
building UTP Resource Centre
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Petronas
content_source UTP Institutional Repository
url_provider http://eprints.utp.edu.my/
description The flexibility and centrality of Software Defined Networking (SDN) has made it vulnerable to Denial of Service (DoS) attacks. Despite of the advantages, the potential DoS attacks may compromise the functions of switches, control channel and SDN controller. This paper is devoted to simulating and analyzing the impact of DoS packet in flooding attacks on SDN controller and control channel which may even affect the whole SDN network. The network performance is tested and emulated by using different testing tools of simulation in Mininet such as Hping3 and Wireshark. Likewise, the three different SDN controllers Floodlight, Ryu and POX performed as the uplink control data. Our findings show that with quite limited resources in pure open source SDN controllers, an attacker can produce a major distraction against an SDN networks. The recovery rate of SDN controllers show variable delay weakness between controllers' performance: that the best result for the Ryu controller after sequences packets 6, and the worst recovery rate for POX controller after sequences packets 47. © 2021 IEEE.
format Conference or Workshop Item
author Alashhab, A.A.
Soperi Mohd Zahid, M.
Barka, A.A.
Albaboh, A.M.
spellingShingle Alashhab, A.A.
Soperi Mohd Zahid, M.
Barka, A.A.
Albaboh, A.M.
Experimenting and evaluating the impact of DoS attacks on different SDN controllers
author_facet Alashhab, A.A.
Soperi Mohd Zahid, M.
Barka, A.A.
Albaboh, A.M.
author_sort Alashhab, A.A.
title Experimenting and evaluating the impact of DoS attacks on different SDN controllers
title_short Experimenting and evaluating the impact of DoS attacks on different SDN controllers
title_full Experimenting and evaluating the impact of DoS attacks on different SDN controllers
title_fullStr Experimenting and evaluating the impact of DoS attacks on different SDN controllers
title_full_unstemmed Experimenting and evaluating the impact of DoS attacks on different SDN controllers
title_sort experimenting and evaluating the impact of dos attacks on different sdn controllers
publisher Institute of Electrical and Electronics Engineers Inc.
publishDate 2021
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85113651747&doi=10.1109%2fMI-STA52233.2021.9464469&partnerID=40&md5=1e45d8e127d5c94656cde57dc90c4ab7
http://eprints.utp.edu.my/30403/
_version_ 1738657102525628416
score 13.18916