All Projects → aswanthpp → Analysis-of-DDoS-Attacks-in-SDN-Environments

aswanthpp / Analysis-of-DDoS-Attacks-in-SDN-Environments

Licence: other
Analysis of DDoS attack in SDN Environments using miniedit and pox controller

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Analysis-of-DDoS-Attacks-in-SDN-Environments

HULK-v3
Asynchronous HTTP Botnet for Distributed Denial of Service (DDoS)
Stars: ✭ 152 (+289.74%)
Mutual labels:  ddos-attack
ddos-mitigation
Tips to mitigate and secure your large-scale server against DDoS attacks.
Stars: ✭ 58 (+48.72%)
Mutual labels:  ddos-detection
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (+92.31%)
Mutual labels:  ddos-attack
Aoyama
A New version of Python3 botnet, old version: http://github.com/Leeon123/Python3-botnet
Stars: ✭ 161 (+312.82%)
Mutual labels:  ddos-attack
overload
📡 Overload DoS Tool (Layer 7)
Stars: ✭ 167 (+328.21%)
Mutual labels:  ddos-attack
dheater
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (+264.1%)
Mutual labels:  ddos-attack
phalanx
DDos detection and mitigation system written in Go (Experimental)
Stars: ✭ 33 (-15.38%)
Mutual labels:  ddos-detection
DDos-Attack
This is a simple DDoS Attack tool and even a begginer hacker can use this.Just type python run.py after cloning this repository.
Stars: ✭ 76 (+94.87%)
Mutual labels:  ddos-attack

Analysis of DDoS Attacks in SDN Environments

Course : Internet Technology and Applications

Course code : CO368

Overview :

SDN :

Software-Defined Networking (SDN) is an emerging architecture that is dynamic, manageable, cost-effective, and adaptable, making it ideal for the high-bandwidth, dynamic nature of today’s applications. This architecture decouples the network control and forwarding functions enabling the network control to become directly programmable and the underlying infrastructure to be abstracted for applications and network services.


SDN Architecture

DDoS :

A Denial-of-Service (DoS) attack is a cyber-attack where the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. This is typically accomplished by flooding the target with superfluous requests in an attempt to overload systems. In a Distributed Denial-of-Service (DDoS) attack, the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source. We have implemented two methods to detect DDoS attack in SDN environments

  1. Sample Entropy Sample Entropy is a method used to detect DDoS attacks in SDN. There are two essential components to DDoS detection using entropy: window size and a threshold. Window size is either based on a time period or number of packets. Entropy is calculated within this window to measure uncertainty in the coming packets. To detect an attack, a threshold is needed. If the calculated entropy passes a threshold or is below it, depending on the scheme, an attack is detected.
  2. Prinicple Component Analysis It is a mathematical procedure that transforms a number of (possibly) correlated variables into a (smaller) number of uncorrelated variables called principal components. The first principal component accounts for as much of the variability in the data as possible, and each succeeding component accounts for as much of the remaining variability as possible.

Steps to Reproduce :

Steps to reproduce along with the packages needed can be found here

Reference

  1. A Novel DDoS Attacks Detection Scheme for SDN Environments

Conclusion :

Results and conclusions along with output are included in report

Team :

Aswanth P P (15CO112)
Mohammed Ameen (15CO131)
Joe Antony (15CO220)

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].