Is an action that prevent the Authorised use of network systems or applications by exhausting resources such as CPU memory and disk space?

Is an action that prevent the Authorised use of network systems or applications by exhausting resources such as CPU memory and disk space?

  • View PDF

Is an action that prevent the Authorised use of network systems or applications by exhausting resources such as CPU memory and disk space?

Is an action that prevent the Authorised use of network systems or applications by exhausting resources such as CPU memory and disk space?

Under a Creative Commons license

Open access

Highlights

DoS and DDoS attacks in software defined networks.

Effect of DoS and DDoS in software networks.

State-of-the-art solutions addressing both DoS and DDoS attacks in SDNs.

Possible countermeasures and related building blocks to DoS/DDoS attacks in SDNs.

Abstract

Software Defined Networking (SDN) is a new networking paradigm where forwarding hardware is decoupled from control decisions. It promises to dramatically simplify network management and enable innovation and evolution. In SDN, network intelligence is logically centralized in software-based controllers (the control plane), while network devices (OpenFlow Switches) become simple packet-forwarding devices (the data plane) that can be programmed via an open interface (OpenFlow protocol). Such decoupling of the control plane from the data plane introduces various challenges that include security, reliability, load balancing, and traffic engineering. Dreadful security challenges in SDNs are denial of service (DoS) and distributed denial of service (DDoS) attacks. For instance, in SDNs, DoS/DDoS attacks could flood the control plane, the data plane, or the communication channel. Attacking the control plane could result in failure of the entire network, while attacking the data plane or the communication channel results in packet drop and network unavailability. In this paper we deliver several contributions that shed light on the field of DoS/DDoS attacks in SDNs, providing a complete background about the area, including attacks and analysis of the existing solutions. In particular, our contributions can be summarized as follow: we review and systematize the state-of-the-art solutions that address both DoS and DDoS attacks in SDNs through the lenses of intrinsic and extrinsic approaches. Moreover, the discussed countermeasures are organized accordingly to their focus, be it on detection, mitigation, prevention, or graceful degradation. Further, we survey the different approaches and tools adopted to implement the revised solutions. Finally, we also highlight possible future research directions to address DoS/DDoS attacks in SDNs.

Keywords

SDN

Security

Attacks

DoS

DDoS

Research challenges

Survey

Cited by (0)

Is an action that prevent the Authorised use of network systems or applications by exhausting resources such as CPU memory and disk space?

Lubna Fayez Eliyan is a Ph.D. student in Computer Science and Engineering program at HBKU-CSE in Doha–Qatar, with a major in cybersecurity. She holds a B.Sc. degree in computer engineering from Qatar University, and a M.Sc. in computer networks from the same university. Her main research interests include computer networks and security and privacy of networks, IoT, and crowd simulation for studying human behavior.

Is an action that prevent the Authorised use of network systems or applications by exhausting resources such as CPU memory and disk space?

Dr. Roberto Di Pietro, ACM Distinguished Scientist, is Full Professor in Cybersecurity at HBKU-CSE. Previously, he was in the capacity of Global Head Security Research at Nokia Bell Labs, and Associate Professor (with tenure) of Computer Science at University of Padova, Italy. He has been working in the security field for 23+ years, leading both technology-oriented and research-focused teams in the private sector, government, and academia (MoD, United Nations HQ, EUROJUST, IAEA, WIPO). His main research interests include AI driven cybersecurity, security and privacy for wired and wireless distributed systems (e.g. Blockchain technology, Cloud, IoT, OSNs), virtualization security, applied cryptography, computer forensics, and data science. Other than being involved in M&A of start-up – and having founded one (exited) – he has been producing 230+ scientific papers and patents over the cited topics, has co-authored three books, edited one, and contributed to a few others. In 2011–2012 he was awarded a Chair of Excellence from University Carlos III, Madrid. In 2020 he received the Jean-Claude Laprie Award for having significantly influenced the theory and practice of Dependable Computing.

© 2021 The Authors. Published by Elsevier B.V.

Is an action that prevent the authorized use of network systems or applications by exhausting resources such as CPU memory and disk space?

The NIST Computer Security Incident Handling Guide defines a DoS attack as: “an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU), memory, bandwidth, and disk space.”

What type of attack is a compromise of availability quizlet?

A denial-of-service attack is an attempt to compromise availability by hindering or blocking completely the provision of some service.

When a DoS attack is detected the first step is T?

The first step in avoiding or stopping a DDoS attack is knowing that an attack is taking place. To detect an attack, one has to gather a sufficient network traffic information, then perform analysis to figure out if the traffic is friend of foe.

Why do many DoS attacks use packets with spoofed source addresses?

Why do many DoS attacks use packets with spoofed source addresses? they do this to prevent the attack being traced back to them and also to prevent response packets from returning and overwhelming there computer.