Inter and Intra Domain DDoS Attack Mitigation for Software Defined Network Based on Hyperledger Fabric Blockchain Technology

0Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

The widespread adoption of Internet of Things devices has led to a significant rise in security concerns. Attackers can exploit the vulnerability of centralized control in software-defined networks (SDN) through distributed denial of service (DDoS) attacks on these networks. The concentration of control within a network introduces novel vulnerabilities and potential avenues for attacks. The present strategies employed for mitigating DDoS attacks face challenges arising from their constrained adaptability, inadequate allocation of resources, and reduced flexibility. The developing technology of blockchain offers a robust solution for cost-effective, optimized, and adaptable mitigation of inter and intra-domain SDN against DDoS attacks. This work utilizes the Hyperledger Fabric platform, a permissioned blockchain, to examine the detection of DDoS attacks using the entropy approach. The IP addresses of the victims are compiled into a blacklist, which is subsequently disseminated as transactions to generate a ledger of the blockchain over the network. Employing this method makes it unnecessary to obstruct the victim's ports. Two scenarios, namely, single and linear, have been employed to represent intradomain topology and one scenario for interdomain in the context of multicontroller environments. The experiment investigates the effects of two attack types, single attack and multi-attacker, across three different circumstances. The findings indicate that the duration of mitigation was decreased, demonstrating the efficacy of enhancing the overall network security with increased flexibility. This approach has promise for countering DDoS attacks. This work advances by using a permissioned network with an SDN to mitigate DDOS attacks and using drop packets rather than block ports. Using HLF makes setting various configurations possible, and this act can enhance performance. Results show that mitigation time in the three topologies (single, liner, and multi-controller) was 30, 21, and 48, respectively, at the victim side, while it takes 40, 43, and 60 at the controller side.

Cite

CITATION STYLE

APA

Khorseed, W. S., & Hamad, A. H. (2024). Inter and Intra Domain DDoS Attack Mitigation for Software Defined Network Based on Hyperledger Fabric Blockchain Technology. Ingenierie Des Systemes d’Information, 29(1), 301–311. https://doi.org/10.18280/isi.290130

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free