Alashhab, A.A. and Soperi Mohd Zahid, M. and Barka, A.A. and Albaboh, A.M. (2021) Experimenting and evaluating the impact of DoS attacks on different SDN controllers. In: UNSPECIFIED.
Full text not available from this repository.Abstract
The flexibility and centrality of Software Defined Networking (SDN) has made it vulnerable to Denial of Service (DoS) attacks. Despite of the advantages, the potential DoS attacks may compromise the functions of switches, control channel and SDN controller. This paper is devoted to simulating and analyzing the impact of DoS packet in flooding attacks on SDN controller and control channel which may even affect the whole SDN network. The network performance is tested and emulated by using different testing tools of simulation in Mininet such as Hping3 and Wireshark. Likewise, the three different SDN controllers Floodlight, Ryu and POX performed as the uplink control data. Our findings show that with quite limited resources in pure open source SDN controllers, an attacker can produce a major distraction against an SDN networks. The recovery rate of SDN controllers show variable delay weakness between controllers' performance: that the best result for the Ryu controller after sequences packets 6, and the worst recovery rate for POX controller after sequences packets 47. © 2021 IEEE.
Item Type: | Conference or Workshop Item (UNSPECIFIED) |
---|---|
Impact Factor: | cited By 0 |
Uncontrolled Keywords: | Automation; Computer system recovery; Denial-of-service attack; Electric lighting; Floods; Open source software; Process control, Control channels; Control data; Denial of Service; Flooding attacks; Recovery rate; Software defined networking (SDN); Testing tools; Variable delays, Controllers |
Depositing User: | Ms Sharifah Fahimah Saiyed Yeop |
Date Deposited: | 25 Mar 2022 06:51 |
Last Modified: | 25 Mar 2022 06:51 |
URI: | http://scholars.utp.edu.my/id/eprint/30403 |