Research Hub

대학 자원

대학 인프라와 자원을 공유해 공동 연구와 기술 활용을 지원합니다.

Loading...

논문 리스트

2015
SDN 환경에서의 목적지 주소별 패킷 샘플링을 이용한SYN Flooding 공격 방어기법 A Protection Method using Destination Address Packet Sampling for SYN Flooding Attack in SDN Environments
한국멀티미디어학회
논문정보
Publisher
멀티미디어학회논문지
Issue Date
2015-01-01
Keywords
-
Citation
-
Source
-
Journal Title
-
Volume
18
Number
1
Start Page
35
End Page
41
DOI
ISSN
12297771
Abstract
SDN(Software Defined Networking) has been considered as a new future computer network architectureand DDoS(Distributed Denial of Service) is the biggest threat in the network security. In SDN architecture,we present the technique to defend the DDoS SYN Flooding attack that is one of the DDoS attack method. First, we monitor the Backlog queue in order to reduce the unnecessary monitoring resources. If theBacklog queue of the certain server is occupied over 70%, the sFlow performs packet sampling withthe server address as the destination address. To distinguish between the attacker and the normal user,we use the source address. We decide the SYN packet threshold using the remaining Backlog queuethat possible to allow the number of connections. If certain sources address send the SYN packet overthe threshold, we judge that this address is attacker. The controller will modify the flow table entryto block attack traffics. By using this method, we reduce the resource consumption about the unnecessarymonitoring and the protection range is expanded to all switches. The result achieved from our experimentshow that we can prevent the SYN Flooding attack before the Backlog queue is fully occupied.

저자 정보

이름 소속
등록된 데이터가 없습니다.