SYNGuard: Dynamic threshold-based SYN flood attack detection and mitigation in software-defined networks

22Citations
Citations of this article
41Readers
Mendeley users who have this article in their library.

Abstract

SYN flood attacks (half-open attacks) have been proven a serious threat to software-defined networking (SDN)-enabled infrastructures. A variety of intrusion detection and prevention systems (IDPS) have been introduced for identifying and preventing such security threats, but they often result in significant performance overhead and response time. Therefore, those existing approaches are inflexible for large-scale networks and real-time applications. For this reason, a novel and adaptive threshold-based kernel-level intrusion detection and prevention system by leveraging SDN capabilities are proposed. The proposed systems to detect and mitigate the aforementioned threats within an SDN over widely used traditional IDPS technologies, Snort and Zeek, are comparatively examined. The approach is evaluated using a mixture of fundamental adverse attacks and SDN-specific threats on a real-world testbed. The experimental results demonstrate the efficacy of the mechanism to detect and mitigate SYN flood attacks within an SDN environment.

Cite

CITATION STYLE

APA

Rahouti, M., Xiong, K., Ghani, N., & Shaikh, F. (2021). SYNGuard: Dynamic threshold-based SYN flood attack detection and mitigation in software-defined networks. IET Networks, 10(2), 76–87. https://doi.org/10.1049/ntw2.12009

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free