Abstract views: 440 / PDF downloads: 196


  • Tasnim ALASALI Karabük Üniversitesi
  • Omar DAKKAK Karabük Üniversitesi




Software Defined Networks (SDN), DDOS, Mitigation, SDN Security, Control Plane, Detection


Over the course of time, a multitude of security solutions have been proposed in order to safeguard the Internet architecture from an extensive array of malware threats. However, the task of ensuring the security of the Internet and its associated applications remains an ongoing research challenge. Researchers persistently delve into the exploration of innovative network architectures, such as the utilization of HTTP as the narrow waist, the implementation of Named Data Networking (NDN), the development of programmable networks, and the adoption of Software-Defined Networking (SDN), with the aim of designing a more dependable and resilient network infrastructure. Among these alternative approaches, SDN has emerged as a robust and secure solution for countering malicious activities. By separating the control plane from the data plane, SDN provides an array of advantages, including enhanced manageability, improved control, dynamic rule updates, advanced analysis capabilities, and a comprehensive network overview facilitated by a centralized controller. Despite its superiority over conventional IP-based networks, SDN is susceptible to various network intrusions and encounters significant challenges in terms of deployment. The purpose of this paper is to conduct a comprehensive review of approximately 70 prominent mechanisms employed for the detection and mitigation of Distributed Denial of Service (DDoS) attacks in SDN networks. These mechanisms are systematically categorized into four main groups, namely information theory-based methods, machine learning-based methods, approaches based on Artificial Neural Networks (ANN), and other miscellaneous methods. Furthermore, the paper identifies and discusses several unresolved research issues and gaps that exist in the deployment of a secure DDoS defense solution within SDN networks. The objective of this comprehensive review is to provide valuable insights to the research community, assisting in the development of more robust and reliable DDoS mitigation solutions that are specifically tailored for SDN networks.


Download data is not yet available.

Author Biographies

Tasnim ALASALI, Karabük Üniversitesi

Department of Computer Engineering,  78050 Karabük, Türkiye

Omar DAKKAK, Karabük Üniversitesi

Department of Computer Engineering, 78050 Karabük, Türkiye


Internet growth usage statistics, 2019, https://www.clickz.com/internetgrowth-usage-stats-2019-time-online-devices-users/235102/.

DoS attack report, 2020, https://www.britannica.com/technology/denialof-service-attack.

M. Feily, A. Shahrestani, S. Ramadass, A survey of botnet and botnet detection, in: 2009 Third International Conference on Emerging Security Information, Systems and Technologies, IEEE, 2009, pp. 268–273.

M. Abu Rajab, J. Zarfoss, F. Monrose, A. Terzis, A multifaceted approach to understanding the botnet phenomenon, in: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, 2006, pp. 41–52.

B. Saha, A. Gairola, Botnet: an overview, CERT-In White Paper, CIWP-2005-05, Vol. 240, 2005.

N.Z. Bawany, J.A. Shamsi, K. Salah, DDoS attack detection and mitigation using SDN: methods, practices, and solutions, Arab. J. Sci. Eng. 42 (2) (2017) 425–441.

M.M. Joëlle, Y.-H. Park, Strategies for detecting and mitigating DDoS attacks in SDN: A survey, J. Intell. Fuzzy Systems 35 (6) (2018) 5913–5925.

S. Dong, K. Abbas, R. Jain, A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments, IEEE Access 7 (2019) 80813–80828.

A.P. Fajar, T.W. Purboyo, A survey paper of distributed denial-of-service attack in software defined networking (sdn), Int. J. Appl. Eng. Res. 13 (1) (2018) 476–482.

X. Xu, H. Yu, K. Yang, DDoS attack in software defined networks: a survey, ZTE Commun. 15 (3) (2017).

K. Kalkan, G. Gur, F. Alagoz, Defense mechanisms against DDoS attacks in SDN environment, IEEE Commun. Mag. 55 (9) (2017) 175–179.

M.P. Singh, A. Bhandari, New-flow based DDoS attacks in SDN: Taxonomy, rationales, and research challenges, Comput. Commun. (2020). [13] C. Douligeris, D.N. Serpanos, Network Security: Current Status and Future Directions, John Wiley & Sons, 2007.

B. Mukherjee, L.T. Heberlein, K.N. Levitt, Network intrusion detection, IEEE Netw. 8 (3) (1994) 26–41.

D. Kreutz, F.M. Ramos, P.E. Verissimo, C.E. Rothenberg, S. Azodolmolky, S. Uhlig, Software-defined networking: A comprehensive survey, Proc. IEEE 103 (1) (2014) 14–76.

T. Benson, A. Akella, D.A. Maltz, Unraveling the complexity of network management, in: NSDI, 2009, pp. 335–348.

W. Xia, Y. Wen, C.H. Foh, D. Niyato, H. Xie, A survey on software-defined networking, IEEE Commun. Surv. Tutor. 17 (1) (2014) 27–51.

J. Pan, S. Paul, R. Jain, A survey of the research on future internet architectures, IEEE Commun. Mag. 49 (7) (2011) 26–36.

L. Popa, A. Ghodsi, I. Stoica, HTTP as the narrow waist of the future Internet, in: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, 2010, pp. 1–6.

L. Zhang, D. Estrin, J. Burke, V. Jacobson, J.D. Thornton, D.K. Smetters, B. Zhang, G. Tsudik, D. Massey, C. Papadopoulos, et al., Named data networking (ndn) project, in: Relatório Técnico NDN-0001, Xerox Palo Alto Research Center-PARC, Vol. 157, Citeseer, 2010, p. 158.

A.T. Campbell, H.G. De Meer, M.E. Kounavis, K. Miki, J.B. Vicente, D. Villela, A survey of programmable networks, ACM SIGCOMM Comput. Commun. Rev. 29 (2) (1999) 7–23. [22] O.N. Fundation, Software-defined networking: The new norm for networks, ONF White Paper, Vol. 2, pp. 2–6.

I. Ahmad, S. Namal, M. Ylianttila, A. Gurtov, Security in software defined networks: A survey, IEEE Commun. Surv. Tutor. 17 (4) (2015) 2317–2346. J. Singh and S. Behal / Computer Science Review 37 (2020) 100279 23 [24] S. Shin, G. Gu, Attacking software-defined networks: A first feasibility study, in: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013, pp. 165–166.

P. Fonseca, R. Bennesby, E. Mota, A. Passito, A replication component for resilient OpenFlow-based networking, in: 2012 IEEE Network Operations and Management Symposium, IEEE, 2012, pp. 933–939.

S. Scott-Hayward, S. Natarajan, S. Sezer, A survey of security in software defined networks, IEEE Commun. Surv. Tutor. 18 (1) (2015) 623–654.

S.T. Ali, V. Sivaraman, A. Radford, S. Jha, A survey of securing networks using software defined networking, IEEE Trans. Reliab. 64 (3) (2015) 1086–1097.

K. Bhushan, B.B. Gupta, Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment, J. Ambient Intell. Humaniz. Comput. 10 (5) (2019) 1985–1997.

T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama, et al., Onix: A distributed control platform for large-scale production networks, in: OSDI, Vol. 10, 2010, pp. 1–6.

OpenFlow switch, 2020, https://www.opennetworking.org/wp-content/ uploads/2014/10/openflow-switch-v1.5.1.pdf. (Accessed on 11 March 2020).

N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, J. Turner, OpenFlow: enabling innovation in campus networks, ACM SIGCOMM Comput. Commun. Rev. 38 (2) (2008) 69–74.

Open networking foundation, 2020, https://www.opennetworking.org. [33] A. Lara, A. Kolasani, B. Ramamurthy, Network innovation using openflow: A survey, IEEE Commun. Surv. Tutor. 16 (1) (2013) 493–512. [34] B.A.A. Nunes, M. Mendonca, X.-N. Nguyen, K. Obraczka, T. Turletti, A survey of software-defined networking: Past, present, and future of programmable networks, IEEE Commun. Surv. Tutor. 16 (3) (2014) 1617–1634.

Y. Jarraya, T. Madi, M. Debbabi, A survey and a layered taxonomy of software-defined networking, IEEE Commun. Surv. Tutor. 16 (4) (2014) 1955–1980.

R. Presuhn, J. Case, K. McCloghrie, M. Rose, S. Waldbusser, Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP), Tech. Rep., 2002, STD 62, RFC 3416, December.

A. Ghodsi, S. Shenker, T. Koponen, A. Singla, B. Raghavan, J. Wilcox, Intelligent design enables architectural evolution, in: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, 2011, pp. 1–6.

B. Raghavan, M. Casado, T. Koponen, S. Ratnasamy, A. Ghodsi, S. Shenker, Software-defined internet architecture: decoupling architecture from infrastructure, in: Proceedings of the 11th ACM Workshop on Hot Topics in Networks, 2012, pp. 43–48.

H. Kim, N. Feamster, Improving network management with software defined networking, IEEE Commun. Mag. 51 (2) (2013) 114–119.

J. Sherry, S. Ratnasamy, J.S. At, A Survey of Enterprise Middlebox Deployments, Technical Report No. UCB/EECS-2012-24, Citeseer, 2012.

Technical Report on SDN, 2019, http://www2.technologyreview.com/ article/412194/tr10-software-defined-networking/.

H. Jamjoom, D. Williams, U. Sharma, Don’t call them middleboxes, call them middlepipes, in: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, 2014, pp. 19–24.

S. Shenker, M. Casado, T. Koponen, N. McKeown, et al., The future of networking, and the past of protocols, Open Networking Summit, Vol. 20, 2011, pp. 1–30.

H. Alkhatib, P. Faraboschi, E. Frachtenberg, H. Kasahara, D. Lange, P. Laplante, A. Merchant, D. Milojicic, K. Schwan, IEEE CS 2022 Report (Draft), Tech. Rep., IEEE Computer Society, 2014.

S. Scott-Hayward, G. O’Callaghan, S. Sezer, SDN security: A survey, in: 2013 IEEE SDN for Future Networks and Services, SDN4FNS, IEEE, 2013, pp. 1–7.

A. Doria, J.H. Salim, R. Haas, H.M. Khosravi, W. Wang, L. Dong, R. Gopal, J.M. Halpern, Forwarding and control element separation (ForCES) protocol specification, RFC 5810 (2010) 1–124.

A. Tewari, B. Gupta, Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework, Future Gener. Comput. Syst. (2018).

H. Song, Protocol-oblivious forwarding: Unleash the power of SDN through a future-proof forwarding plane, in: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013, pp. 127–132. [49] T. Ubale, A.K. Jain, Survey on DDoS attack techniques and solutions in software-defined network, in: Handbook of Computer Networks and Cyber Security, Springer, 2020, pp. 389–419. [50] Nox controller, 2020, https://github.com/noxrepo/nox. (Accessed on 11 March 2020). [51] Pox controller, 2020, https://github.com/noxrepo/pox. (Accessed on 11 March 2020). [52] Project floodlight, 2020, http://www.projectfloodlight.org/floodlight/. (Accessed on 11 March 2020). [53] Ryu, 2020, https://osrg.github.io/ryu/. (Accessed on 11 March 2020). [54] S. Khan, A. Gani, A.W.A. Wahab, A. Abdelaziz, M.A. Bagiwa, FML: A novel forensics management layer for software defined networks, in: 2016 6th International Conference-Cloud System and Big Data Engineering, Confluence, IEEE, 2016, pp. 619–623. [55] A. Voellmy, H. Kim, N. Feamster, Procera: a language for high-level reactive network control, in: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, 2012, pp. 43–48.

C.J. Anderson, N. Foster, A. Guha, J.-B. Jeannin, D. Kozen, C. Schlesinger, D. Walker, NetKAT: Semantic foundations for networks, ACM SIGPLAN Not. 49 (1) (2014) 113–126.

N. Foster, R. Harrison, M.J. Freedman, C. Monsanto, J. Rexford, A. Story, D. Walker, Frenetic: A network programming language, ACM SIGPLAN Not. 46 (9) (2011) 279–291.

A. Tootoonchian, Y. Ganjali, Hyperflow: A distributed control plane for openflow, in: Proceedings of the 2010 Internet Network Management Conference on Research on Enterprise Networking, Vol. 3, 2010.

Opendaylight user guide, 2020, https://docs.opendaylight.org/en/stablefluorine/user-guide/alto-user-guide.html. (Accessed on 11 March 2020).

H. Uppal, D. Brandon, OpenFlow Based Load Balancing, CSE561: Networking Project Report, University of Washington, Citeseer, 2010.

N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, S. Shenker, NOX: towards an operating system for networks, ACM SIGCOMM Comput. Commun. Rev. 38 (3) (2008) 105–110. [62] K. Dhamecha, B. Trivedi, Sdn issues-a survey, Int. J. Comput. Appl. 73 (18) (2013).

A. Voellmy, P. Hudak, Nettle: Taking the sting out of programming network routers, in: International Symposium on Practical Aspects of Declarative Languages, Springer, 2011, pp. 235–249.

W. Stallings, Software-defined networks and openflow, Internet Protocol J. 16 (1) (2013) 2–14. [65] F. Hu, Q. Hao, K. Bao, A survey on software-defined network and openflow: From concept to implementation, IEEE Commun. Surv. Tutor. 16 (4) (2014) 2181–2206.

P. Manso, J. Moura, C. Serrão, SDN-based intrusion detection system for early detection and mitigation of DDoS attacks, Information 10 (3) (2019) 106.

J. Zheng, Q. Li, G. Gu, J. Cao, D.K. Yau, J. Wu, Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis, IEEE Trans. Inf. Forensics Secur. 13 (7) (2018) 1838–1853.

Y. Xu, Y. Liu, DDoS attack detection under SDN context, in: IEEE INFOCOM 2016-the 35th Annual IEEE International Conference on Computer Communications, IEEE, 2016, pp. 1–9.

Z. Liu, R.H. Campbell, M. Mickunas, Active security support for active networks, IEEE Trans. Syst. Man Cybern. C Appl. Rev. 33 (4) (2003) 432–445.

S.W. Shin, P. Porras, V. Yegneswaran, G. Gu, A framework for integrating security services into software-defined networks, in: Open Networking Summit, Open Networking Summit, 2013.

X. Wen, Y. Chen, C. Hu, C. Shi, Y. Wang, Towards a secure controller platform for openflow applications, in: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013, pp. 171–172.

S. Hartman, M. Wasserman, D. Zhang, Security requirements in the software defined networking model, 2013, Internet Engineering Task Force, Internet-Draft draft-hartman-sdnsec-requirements-01.

H. Xie, T. Tsou, D. Lopez, H. Yin, V. Gurbani, Use cases for ALTO with software defined networks, 2012, Working Draft, IETF Secretariat, Internet-Draft draft-xie-alto-sdn-extension-use-cases-01. txt.

J. Naous, D. Erickson, G.A. Covington, G. Appenzeller, N. McKeown, Implementing an OpenFlow switch on the NetFPGA platform, in: Proceedings of the 4th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2008, pp. 1–9.

S. Shin, V. Yegneswaran, P. Porras, G. Gu, Avant-guard: Scalable and vigilant switch flow management in software-defined networks, in: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, 2013, pp. 413–424.

G. Yao, J. Bi, L. Guo, On the cascading failures of multi-controllers in software defined networks, in: 2013 21st IEEE International Conference on Network Protocols, ICNP, IEEE, 2013, pp. 1–2.

Crippling cyber-attacks, 1998, https://www.bbc.com/news/technology35376327. 25/3/2019, (Accessed on 13 February 2020).

N.Z. Bawany, J.A. Shamsi, Application layer DDoS attack defense framework for smart city using SDN, in: The Third International Conference on Computer Science, Computer Engineering, and Social Media, CSCESM2016, 2016, p. 1.

S. Jajodia, K. Kant, P. Samarati, A. Singhal, V. Swarup, C. Wang, Secure Cloud Computing, Springer, 2014. 24 J. Singh and S. Behal / Computer Science Review 37 (2020) 100279

S. Bu, F.R. Yu, X.P. Liu, H. Tang, Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks, IEEE Trans. Wireless Commun. 10 (9) (2011) 3064–3073.

S. Sezer, S. Scott-Hayward, P.K. Chouhan, B. Fraser, D. Lake, J. Finnegan, N. Viljoen, M. Miller, N. Rao, Are we ready for SDN? Implementation challenges for software-defined networks, IEEE Commun. Mag. 51 (7) (2013) 36–43

. [82] A. Wang, Y. Guo, F. Hao, T. Lakshman, S. Chen, Scotch: Elastically scaling up sdn control-plane using vswitch based overlay, in: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, 2014, pp. 403–414.

Q. Yan, F. Yu, Q. Gong, J. Li, Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges, IEEE Commun. Surv. Tutor. 18 (1) (2015) 602–622.

T. Ubale, A.K. Jain, Taxonomy of DDoS attacks in software-defined networking environment, in: International Conference on Futuristic Trends in Network and Communication Technologies, Springer, 2018, pp. 278–291.

B. Wang, Y. Zheng, W. Lou, Y. Hou, DDoS attack protection in the era of cloud computing and software-defined networking, Comput. Netw. 81 (2015) 308–319.

D. Kreutz, F.M. Ramos, P. Verissimo, Towards secure and dependable software-defined networks, in: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013, pp. 55–60.

L. Schehlmann, S. Abt, H. Baier, Blessing or curse? Revisiting security aspects of software-defined networking, in: 10th International Conference on Network and Service Management (CNSM) and Workshop, IEEE, 2014, pp. 382–387.

Open Networking Specifications 1.5.1, Vol. 3, Open Networking Foundation, 2015.

E. Spitznagel, D. Taylor, J. Turner, Packet classification using extended TCAMs, in: 11th IEEE International Conference on Network Protocols, 2003. Proceedings, IEEE, 2003, pp. 120–131.

M. Parashar, A. Poonia, K. Satish, A survey of attacks and their mitigations in software defined networks, in: 2019 10th International Conference on Computing, Communication and Networking Technologies, ICCCNT, IEEE, 2019, pp. 1–8.

A. Akhunzada, E. Ahmed, A. Gani, M.K. Khan, M. Imran, S. Guizani, Securing software defined networks: taxonomy, requirements, and open issues, IEEE Commun. Mag. 53 (4) (2015) 36–44. [92] J.M. Dover, A Denial of Service Attack Against the Open Floodlight SDN Controller, Tech. Rep., Dover Networks, 2013.

R. Kandoi, M. Antikainen, Denial-of-service attacks in OpenFlow SDN networks, in: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), IEEE, 2015, pp. 1322–1326.

P. Zhang, H. Wang, C. Hu, C. Lin, On denial of service attacks in software defined networks, IEEE Netw. 30 (6) (2016) 28–33.

C.E. Shannon, A mathematical theory of communication, Bell Syst. Tech. J. 27 (1948) 379–423.

C.H. Bennett, P. Gács, M. Li, P.M. Vitányi, W.H. Zurek, Information distance, IEEE Trans. Inform. Theory 44 (4) (1998) 1407–1423.

K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, V. Maglaris, Combining openFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments, Comput. Netw. 62 (2014) 122–136.

R. Wang, Z. Jia, L. Ju, An entropy-based distributed DDoS detection mechanism in software-defined networking, in: 2015 IEEE Trustcom/BigDataSE/ISPA, Vol. 1, IEEE, 2015, pp. 310–317.

S.M. Mousavi, M. St-Hilaire, Early detection of DDoS attacks against SDN controllers, in: 2015 International Conference on Computing, Networking and Communications, ICNC, IEEE, 2015, pp. 77–81.

J. Boite, P.-A. Nardin, F. Rebecchi, M. Bouet, V. Conan, Statesec: Stateful monitoring for DDoS protection in software defined networks, in: 2017 IEEE Conference on Network Softwarization, NetSoft, IEEE, 2017, pp. 1–9

. [101] S.-C. Tsai, I.-H. Liu, C.-T. Lu, C.-H. Chang, J.-S. Li, Defending cloud computing environment against the challenge of DDoS attacks based on software defined network, in: Advances in Intelligent Information Hiding and Multimedia Signal Processing, Springer, 2017, pp. 285–292.

K. Kalkan, L. Altay, G. Gür, F. Alagöz, JESS: Joint entropy-based DDoS defense scheme in SDN, IEEE J. Sel. Areas Commun. 36 (10) (2018) 2358–2372.

K.S. Sahoo, D. Puthal, M. Tiwary, J.J. Rodrigues, B. Sahoo, R. Dash, An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics, Future Gener. Comput. Syst. 89 (2018) 685–697.

K.S. Sahoo, M. Tiwary, B. Sahoo, Detection of high rate DDoS attack from flash events using information metrics in software defined networks, in: 2018 10th International Conference on Communication Systems & Networks, COMSNETS, IEEE, 2018, pp. 421–424.

Y. Jiang, X. Zhang, Q. Zhou, Z. Cheng, An entropy-based DDoS defense mechanism in software defined networks, in: International Conference on Communicatins and Networking in China, Springer, 2016, pp. 169–178.

G.-C. Hong, C.-N. Lee, M.-F. Lee, Dynamic threshold for DDoS mitigation in SDN environment, in: 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC, IEEE, 2019, pp. 1–7.

N.Z. Bawany, J.A. Shamsi, SEAL: SDN based secure and agile framework for protecting smart city applications from DDoS attacks, J. Netw. Comput. Appl. 145 (2019) 102381.

A. Ahalawat, S.S. Dash, A. Panda, K.S. Babu, Entropy based DDoS detection and mitigation in openflow enabled SDN, in: 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking, ViTECoN, IEEE, 2019, pp. 1–5.

M. Xuanyuan, V. Ramsurrun, A. Seeam, Detection and mitigation of DDoS attacks using conditional entropy in software-defined networking.

J. Cui, M. Wang, Y. Luo, H. Zhong, DDoS detection and defense mechanism based on cognitive-inspired computing in SDN, Future Gener. Comput. Syst. 97 (2019) 275–283.

R. Li, B. Wu, Early detection of DDoS based on phi-entropy in SDN networks, in: 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference, Vol. 1, ITNEC, IEEE, 2020, pp. 731–735.

N. Pitropakis, E. Panaousis, T. Giannetsos, E. Anastasiadis, G. Loukas, A taxonomy and survey of attacks against machine learning, Comp. Sci. Rev. 34 (2019) 100199.

N. Bindra, M. Sood, Detecting DDoS attacks using machine learning techniques and contemporary intrusion detection dataset, Autom. Control Comput. Sci. 53 (5) (2019) 419–428.

Q. Niyaz, W. Sun, A.Y. Javaid, A deep learning based DDoS detection system in software-defined networking (SDN), 2016, arXiv preprint arXiv: 1611.07400.

T. Hurley, J.E. Perdomo, A. Perez-Pons, HMM-based intrusion detection system for software defined networking, in: 2016 15th IEEE International Conference on Machine Learning and Applications, ICMLA, IEEE, 2016, pp. 617–621.

A. Alshamrani, A. Chowdhary, S. Pisharody, D. Lu, D. Huang, A defense system for defeating DDoS attacks in SDN based networks, in: Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access, 2017, pp. 83–92.

D. Hu, P. Hong, Y. Chen, FADM: DDoS flooding attack detection and mitigation system in software-defined networking, in: GLOBECOM 2017-2017 IEEE Global Communications Conference, IEEE, 2017, pp. 1–7.

A.B. Dehkordi, M. Soltanaghaie, F.Z. Boroujeni, A New DDoS Detection Method in Software Defined Network. [119] J. Li, Z. Zhao, R. Li, H. Zhang, Ai-based two-stage intrusion detection for software defined iot networks, IEEE Internet Things J. 6 (2) (2018) 2093–2102.

S. Guozi, W. JIANG, G. Yu, R. Danni, L. Huakang, DDoS attacks and flash event detection based on flow characteristics in SDN, in: 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS, IEEE, 2018, pp. 1–6.

V. Deepa, K. Sudar, P. Deepalakshmi, Design of ensemble learning methods for DDoS detection in SDN environment, in: 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking, ViTECoN, IEEE, 2019, pp. 1–6.

T.V. Phan, M. Park, Efficient distributed denial-of-service attack defense in SDN-based cloud, IEEE Access 7 (2019) 18701–18714.

M. Myint Oo, S. Kamolphiwong, T. Kamolphiwong, S. Vasupongayya, Advanced support vector machine-(ASVM-) based detection for distributed denial of service (DDoS) attack on software defined networking (SDN), J. Comput. Netw. Commun. 2019 (2019).

J. Li, Y. Liu, L. Gu, DDoS attack detection based on neural network, in: 2010 2nd International Symposium on Aware Computing, IEEE, 2010, pp. 196–199.

R. Braga, E. Mota, A. Passito, Lightweight DDoS flooding attack detection using NOX/OpenFlow, in: IEEE Local Computer Network Conference, IEEE, 2010, pp. 408–415.

Y. Cui, L. Yan, S. Li, H. Xing, W. Pan, J. Zhu, X. Zheng, SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks, J. Netw. Comput. Appl. 68 (2016) 65–79.

J. Cui, J. He, Y. Xu, H. Zhong, TDDAD: Time-based detection and defense scheme against DDoS attack on SDN controller, in: Australasian Conference on Information Security and Privacy, Springer, 2018, pp. 649–665.

C. Li, Y. Wu, X. Yuan, Z. Sun, W. Wang, X. Li, L. Gong, Detection and defense of DDoS attack–based on deep learning in OpenFlow-based SDN, Int. J. Commun. Syst. 31 (5) (2018) e3497. J. Singh and S. Behal / Computer Science Review 37 (2020) 100279 25

T.M. Nam, P.H. Phong, T.D. Khoa, T.T. Huong, P.N. Nam, N.H. Thanh, L.X. Thang, P.A. Tuan, V.D. Loi, et al., Self-organizing map-based approaches in DDoS flooding detection using SDN, in: 2018 International Conference on Information Networking, ICOIN, IEEE, 2018, pp. 249–254.

M.P. Novaes, L.F. Carvalho, J. Lloret, M.L. Proença, Long shortterm memory and fuzzy logic for anomaly detection and mitigation in software-defined network environment, IEEE Access 8 (2020) 83765–83781.

S. Dotcenko, A. Vladyko, I. Letenko, A fuzzy logic-based information security management for software-defined networks, in: 16th International Conference on Advanced Communication Technology, IEEE, 2014, pp. 167–171.

T. Chin, X. Mountrouidou, X. Li, K. Xiong, Selective packet inspection to detect DoS flooding using software defined networking (SDN), in: 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops, IEEE, 2015, pp. 95–99.

P. Xiao, Z. Li, H. Qi, W. Qu, H. Yu, An efficient DDoS detection with bloom filter in SDN, in: 2016 IEEE Trustcom/BigDataSE/ISPA, IEEE, 2016, pp. 1–6.

A. AlEroud, I. Alsmadi, Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach, J. Netw. Comput. Appl. 80 (2017) 152–164.

M. Conti, A. Gangwal, M.S. Gaur, A comprehensive and effective mechanism for DDoS detection in SDN, in: 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob, IEEE, 2017, pp. 1–8.

K. Kalkan, G. Gür, F. Alagöz, Sdnscore: A statistical defense mechanism against DDoS attacks in sdn environment, in: 2017 IEEE Symposium on Computers and Communications, ISCC, IEEE, 2017, pp. 669–675.

J. Wang, R. Wen, J. Li, F. Yan, B. Zhao, F. Yu, Detecting and mitigating target link-flooding attacks using sdn, IEEE Trans. Dependable Secure Comput. 16 (6) (2018) 944–956.

H. Wang, L. Xu, G. Gu, Floodguard: A dos attack prevention extension in software-defined networks, in: 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, IEEE, 2015, pp. 239–250.

A.F.M. Piedrahita, S. Rueda, D.M. Mattos, O.C.M. Duarte, Flowfence: a denial of service defense system for software defined networking, in: 2015 Global Information Infrastructure and Networking Symposium, GIIS, IEEE, 2015, pp. 1–6.

X. Wang, M. Chen, C. Xing, SDSNM: a software-defined security networking mechanism to defend against DDoS attacks, in: 2015 Ninth International Conference on Frontier of Computer Science and Technology, IEEE, 2015, pp. 115–121.

B. Yuan, D. Zou, S. Yu, H. Jin, W. Qiang, J. Shen, Defending against flow table overloading attack in software-defined networks, IEEE Trans. Serv. Comput. 12 (2) (2016) 231–246.

L. Dridi, M.F. Zhani, SDN-guard: DoS attacks mitigation in SDN networks, in: 2016 5th IEEE International Conference on Cloud Networking, Cloudnet, IEEE, 2016, pp. 212–217.

T.V. Phan, T. Van Toan, D. Van Tuyen, T.T. Huong, N.H. Thanh, OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks, in: 2016 IEEE Sixth International Conference on Communications and Electronics, ICCE, IEEE, 2016, pp. 13–18.

R. Sahay, G. Blanc, Z. Zhang, H. Debar, ArOMA: An SDN based autonomic DDoS mitigation framework, Comput. Secur. 70 (2017) 482–499. [145] S. Hameed, H. Ahmed Khan, SDN based collaborative scheme for mitigation of DDoS attacks, Future Internet 10 (3) (2018) 23.

M. Conti, C. Lal, R. Mohammadi, U. Rawat, Lightweight solutions to counter DDoS attacks in software defined networking, Wirel. Netw. 25 (5) (2019) 2751–2768. [147] K.K. Karmakar, V. Varadharajan, U. Tupakula, Mitigating attacks in software defined networks, Cluster Comput. 22 (4) (2019) 1143–1157.

Y. Wang, T. Hu, G. Tang, J. Xie, J. Lu, SGS: Safe-guard scheme for protecting control plane against DDoS attacks in software-defined networking, IEEE Access 7 (2019) 34699–34710.

A.S. Da Silva, C.C. Machado, R.V. Bisol, L.Z. Granville, A. SchaefferFilho, Identification and selection of flow features for accurate traffic classification in SDN, in: 2015 IEEE 14th International Symposium on Network Computing and Applications, IEEE, 2015, pp. 134–141.

S. Agarwal, M. Kodialam, T. Lakshman, Traffic engineering in software defined networks, in: 2013 Proceedings IEEE INFOCOM, IEEE, 2013, pp. 2211–2219.

C.E. Rothenberg, M.R. Nascimento, M.R. Salvador, C.N.A. Corrêa, S. Cunha de Lucena, R. Raszuk, Revisiting routing control platforms with the eyes and muscles of software-defined networking, in: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, 2012, pp. 13–18.

J. Xie, F.R. Yu, T. Huang, R. Xie, J. Liu, C. Wang, Y. Liu, A survey of machine learning techniques applied to software defined networking (SDN): Research issues and challenges, IEEE Commun. Surv. Tutor. 21 (1) (2018) 393–430.

S. Vissicchio, L. Vanbever, O. Bonaventure, Opportunities and research challenges of hybrid software defined networks, ACM SIGCOMM Comput. Commun. Rev. 44 (2) (2014) 70–75.

J. McCauley, A. Panda, M. Casado, T. Koponen, S. Shenker, Extending SDN to large-scale networks, Open Networking Summit, 2013, pp. 1–2.

S. Hassas Yeganeh, Y. Ganjali, Kandoo: a framework for efficient and scalable offloading of control applications, in: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, 2012, pp. 19–24.

W. Li, W. Meng, L.F. Kwok, A survey on openFlow-based software defined networks: Security challenges and countermeasures, J. Netw. Comput. Appl. 68 (2016) 126–139.

S. Bhatia, G. Mohay, A. Tickle, E. Ahmed, Parametric differences between a real-world distributed denial-of-service attack and a flash event, in: 2011 Sixth International Conference on Availability, Reliability and Security, IEEE, 2011, pp. 210–217.

S. Behal, K. Kumar, M. Sachdeva, Characterizing DDoS attacks and flash events: Review, research gaps and future directions, Comp. Sci. Rev. 25 (2017) 101–114.

S. Floyd, V. Paxson, Difficulties in simulating the Internet, IEEE/ACM Trans. Netw. 9 (4) (2001) 392–403.

L. Yao, P. Hong, W. Zhou, Evaluating the controller capacity in software defined networking, in: 2014 23rd International Conference on Computer Communication and Networks, ICCCN, IEEE, 2014, pp. 1–6.

P. Wang, K.-M. Chao, H.-C. Lin, W.-H. Lin, C.-C. Lo, An efficient flow control approach for SDN-based network threat detection and migration using support vector machine, in: 2016 IEEE 13th International Conference on E-Business Engineering, ICEBE, IEEE, 2016, pp. 56–63




How to Cite

ALASALI, T., & DAKKAK, O. (2023). EXPLORING THE LANDSCAPE OF SDN-BASED DDOS DEFENSE: A HOLISTIC EXAMINATION OF DETECTION AND MITIGATION APPROACHES, RESEARCH GAPS AND PROMISING AVENUES FOR FUTURE EXPLORATION. International Journal of Advanced Natural Sciences and Engineering Researches, 7(4), 327–349. https://doi.org/10.59287/ijanser.726

Conference Proceedings Volume