TY - GEN
T1 - DoS Attack Impact Assessment on Software Defined Networks
AU - Sangodoyin, Abimbola
AU - Sigwele, Tshiamo
AU - Pillai, Prashant
AU - Hu, Yim Fun
AU - Awan, Irfan
AU - Disso, Jules
N1 - Publisher Copyright:
© 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
PY - 2018
Y1 - 2018
N2 - Software Defined Networking (SDN) is an evolving network paradigm which promises greater interoperability, more innovation, flexible and effective solutions. Although SDN on the surface provides a simple framework for network programmability and monitoring, few has been said about security measures to make it resilient to hitherto security flaws in traditional network and the new threats the architecture is ushering in. One of the security weaknesses the architecture is ushering in due to separation of control and data plane is Denial of Service (DoS) attack. The main goal of this attack is to make network resources unavailable to legitimate users or introduce large delays. In this paper, the effect of DoS attack on SDN is presented using Mininet, OpenDaylight (ODL) controller and network performance testing tools such as iperf and ping. Internet Control Message Protocol (ICMP) flood attack is performed on a Transmission Control Protocol (TCP) server and a User Datagram Protocol (UDP) server which are both connected to OpenFlow switches. The simulation results reveal a drop in network throughput from 233 Mbps to 87.4 Mbps and the introduction of large jitter between 0.003 ms and 0.789 ms during DoS attack.
AB - Software Defined Networking (SDN) is an evolving network paradigm which promises greater interoperability, more innovation, flexible and effective solutions. Although SDN on the surface provides a simple framework for network programmability and monitoring, few has been said about security measures to make it resilient to hitherto security flaws in traditional network and the new threats the architecture is ushering in. One of the security weaknesses the architecture is ushering in due to separation of control and data plane is Denial of Service (DoS) attack. The main goal of this attack is to make network resources unavailable to legitimate users or introduce large delays. In this paper, the effect of DoS attack on SDN is presented using Mininet, OpenDaylight (ODL) controller and network performance testing tools such as iperf and ping. Internet Control Message Protocol (ICMP) flood attack is performed on a Transmission Control Protocol (TCP) server and a User Datagram Protocol (UDP) server which are both connected to OpenFlow switches. The simulation results reveal a drop in network throughput from 233 Mbps to 87.4 Mbps and the introduction of large jitter between 0.003 ms and 0.789 ms during DoS attack.
UR - http://www.scopus.com/inward/record.url?scp=85043995728&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85043995728&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-76571-6_2
DO - 10.1007/978-3-319-76571-6_2
M3 - Conference contribution
AN - SCOPUS:85043995728
SN - 9783319765709
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 11
EP - 22
BT - Wireless and Satellite Systems - 9th International Conference, WiSATS 2017, Proceedings
A2 - Sithamparanathan, Kandeepan
A2 - Vazquez, Miguel Angel
A2 - Pillai, Prashant
A2 - Giovanni, Giambene
A2 - Mitchell, Paul Daniel
PB - Springer Verlag
T2 - 9th International Conference on Wireless and Satellite Systems, WiSATS 2017
Y2 - 14 September 2017 through 15 September 2017
ER -