Next Article in Journal
Methane Production Potential from Apple Pomace, Cabbage Leaves, Pumpkin Residue and Walnut Husks
Previous Article in Journal
Prediction of Suspended Sediment Concentration Based on the Turbidity-Concentration Relationship Determined via Underwater Image Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates

by
Mohammad Adnan Aladaileh
1,
Mohammed Anbar
1,*,
Ahmed J. Hintaw
1,2,
Iznan H. Hasbullah
1,
Abdullah Ahmed Bahashwan
1 and
Shadi Al-Sarawi
1
1
National Advanced IPv6 (NAv6), Universiti Sains Malaysia, Gelugor 11800, Penang, Malaysia
2
Department of Computer Techniques Engineering, Alsafwa University College, Karbala 56001, Iraq
*
Author to whom correspondence should be addressed.
Appl. Sci. 2022, 12(12), 6127; https://doi.org/10.3390/app12126127
Submission received: 16 May 2022 / Revised: 9 June 2022 / Accepted: 14 June 2022 / Published: 16 June 2022

Abstract

:
The increasing incidence of distributed denial-of-service (DDoS) attacks has made software-defined networking (SDN) more vulnerable to the depletion of controller resources. DDoS attacks prevent the SDN controller from processing all incoming data efficiently, potentially disrupting a network or denying legitimate users access to network services. Thus, the protection of the SDN controller is crucial, especially from the ones that exploit the SDN characteristics. In this paper, the authors propose an efficient detection approach for low- and high-rate DDoS attacks on the controller with a high detection rate and a low false positive rate by adapting a dynamic threshold algorithm rather than a static one and proposing a new rule-based detection mechanism. In addition, the proposed approach was evaluated using eight simulation scenarios representing all potential attacks against the SDN controller in terms of attack traffic rates (low or high), sources (either single or multiple hosts), and targets (single or multiple victims). The experiment results show that the proposed approach is more effective than the existing approaches based on attack detection and false positive rates.

1. Introduction

Software-defined networking (SDN) is a revolutionary network technology that will eventually replace traditional networks. SDN revolutionizes network management by offering creative solutions to traditional network challenges. As a result, various features distinguish SDN from traditional networks, such as a separation of the control plane and the data plane. The separation enables the SDN to provide data center operators with centralized network management through a controller [1,2,3], resulting in reduced operational costs by boosting the efficiency of network traffic management [4,5]. For example, the SDN allows the operators to comprehensively control network properties to meet the ever-changing network business requirements.
The controller’s importance to the SDN network makes it an appealing target for attackers looking to disrupt the network. Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks are two types of attacks that can cause network disruption [6]. There are many threats to the controller, but a DDoS attack is one of the most significant threats because it could shut down the entire network and prevent legitimate users from accessing network services [7,8]. DDoS attacks against the SDN controller can be launched using a variety of methods [9], such as flooding the network or the controller with vast amounts of packets or traffic to the point where the controller’s resources are exhausted and unable to handle subsequent incoming packets. Another way to flood the network hosts with massive traffic is by using spoofed source IP addresses, forcing the switches to send all incoming packets to the controller for processing. Eventually, the controller’s resources will be exhausted, affecting its ability to process incoming packets that result in network deterioration, network collapse, and the denial of legitimate users’ access to network services or resources [10].
A threshold mechanism is one of the techniques used for detecting DDoS attacks by enabling the identification of network traffic flow, whether normal or attack traffic [11,12]. However, it is not easy to effectively establish the threshold value since it is dependent on the network traffic flow characteristics. However, some researchers rely on observation and experimentation to determine the threshold value. The fundamental disadvantage of predefined threshold-based detection systems is that a fixed threshold may be useless if the attack traffic rate changes, resulting in a low DDoS attack detection rate and a high false positive rate [13]. Consequently, undetected DDoS attacks often exceed the threshold value, resulting in the controller being subjected to attack traffic.
Mousavi et al. [14] proposed a fixed threshold value based on their detection approach experiment to detect DDoS attacks on the SDN controller involving a single victim. Nonetheless, several current techniques that rely on a dynamic threshold in non-SDN networks to detect DDoS attacks, such as [15,16], contribute to our understanding of the dynamic threshold fundamentals to be implemented in the SDN environment. Furthermore, using the adaptive threshold improves the detection rate and decreases false positive rates.
The adoption rate of the SDN architecture is increasing due to the need to manage vast amounts of data and this requires the use of a controller that can be updated with new rules or instructions to manage new incoming traffic flows and be flexible enough to deal with various types of network traffic using a programmable controller [17,18]. Meanwhile, disruptive attempts on the SDN controller are becoming increasingly frequent with DDoS attacks. The most significant network threats are DDoS attacks with varying traffic rates (low or high). Many researchers have conducted studies on the security of SDN [19,20,21], including techniques related to detecting and mitigating DDoS attacks on SDN [22,23]. Meanwhile, techniques proposed for detecting DDoS attacks with varying attack rates have low accuracy and a high false positive rate when dealing with attacks targeting several victims. Therefore, this work offers a novel technique capable of detecting DDoS attacks with a high detection rate and a low false positive rate, regardless of attack traffic rate or victim number.
Many existing detection approaches are limited due to the reliance on a static threshold to detect DDoS attacks with varying attack traffic rates. Unfortunately, some entropy-based techniques [23,24] that depend on static thresholds cannot detect DDoS attacks with a high detection rate and low false positive rate, particularly when involving low-rate DDoS attacks on multiple victims [25,26,27]. Additionally, most existing detection approaches depend on a single incoming packet header feature to detect DDoS attacks on controllers launched by a single host on a single or on multiple victims. As a result, the detection rate is low and the false positive rate is high [28].
This paper contributes to the body of knowledge by (i) adapting a dynamic threshold that caters to varying DDoS attack traffic rates, resulting in reduced false positive rates and increased detection rates, and (ii) proposing a rule-based detection mechanism to detect DDoS attacks against the controller. Furthermore, the proposed approach is compared to the existing approaches using the proposed approach environment for different DDoS attack rates (low or high), sources of the attacks (single or multiple), and the number of victim hosts (single or multiple).
The paper is organized as follows: Section 2 presents the related work and the motivation behind this research, followed by Section 3, which presents the proposed DDoS attack detection approach. Section 4 describes the experimental result in terms of dataset generation, discusses the proposed performance evaluation, and compares the proposed approach with existing detection approaches. Finally, Section 5 summarizes this paper and recommends several directions for future research.

2. Related Work

Several significant studies on SDN security proposed approaches [29,30] to detect and mitigate DDoS attacks on SDN. Unfortunately, most existing approaches have limitations in detecting low- and high-rate DDoS attacks when both occur simultaneously. In addition, approaches for detecting DDoS attacks with different attack traffic rates have low detection rates and high false positive rates when attackers simultaneously attack multiple targets.
Similarly, many existing approaches for detecting DDoS attacks on the SDN have limitations in detecting DDoS attacks with different attack traffic rates since they rely on a static threshold. As a result, the controller is still vulnerable to DDoS attacks, which might bring the entire network down or deny legitimate users access to network services [31]. Therefore, a dynamic threshold is proposed in this work to detect DDoS attacks on SDN controllers that use varying traffic rates (low- and high-traffic attack rates), originate from single or multiple hosts, and target one or more victims. Consequently, the proposed method is expected to have a high detection rate and a low false positive rate for DDoS attack detection.
Fan et al. [32] proposed a fusion entropy method for computing network traffic randomness to detect DDoS attacks in the SDN network environment. A dataset was used to evaluate and test the proposed approach. Furthermore, the proposed approach effectively detects the attack by showing an entropy value 91.25% lower than the entropy value of normal traffic flow. However, the proposed approach uses a fixed threshold, which reduces detection rates and increases false positive rates. In addition, the information about the dataset and the features used to detect DDoS attacks is lacking. Finally, it is only limited to high-rate DDoS attacks.
Tan et al. [33] proposed a new technique for detecting DDoS attacks on SDN controllers that operates in the network’s data layer. The technique combines the k-means machine-learning method to leverage the rate features and asymmetry features of the traffic flow to be used in the detection trigger mechanism for detecting DDoS attacks. The collaboration between the control plane and the data plane resulted in highly accurate attack detection. However, the effectiveness of their proposed technique decreases when high-rate network traffic is involved.
Singh et al. [34] introduced a unique approach known as Jensen–Renyi divergence (JRD) based on information theory. The proposed method identifies DDoS attacks at a high rate in SDN-based network flows. Because there are fewer traffic characteristics to calculate, this approach has a reduced computing requirement. The detecting method begins with time intervals and then extracts the appropriate traffic characteristics (i.e., source and destination IP, source and destination port, and protocol operated). Finally, the technique calculates information theory metrics for detection using source IP addresses. The proposed technique, on the other hand, achieves lower performance, especially for low-rate DDoS attacks.
Wu et al. [35] proposed a machine-based factorization detection technique for detecting low DDoS attack traffic rates. The proposed method was integrated with a support vector machine (SVM) and extracted features to categorize low-rate DDoS attack traffic using the dynamic deletion of flow rules.
Wang et al. [36] proposed a new approach termed a safeguard scheme that mitigates DDoS attacks on the SDN controller (SGS). It uses behavior features for DDoS attack detection. The proposed method has two models. The first model detects any suspicious traffic in the data plane, and the second model is the controller’s dynamic defense in the control plane. The technique, however, is incapable of detecting low-rate DDoS attacks, and it relies on multiple controllers, which take longer to detect DDoS attacks.
Furthermore, Sahoo et al. [37] proposed an attack detection method for detecting low-rate DDoS attacks on the SDN controller by combining information distance and generalized entropy. The difference in probability distributions signals a DDoS attack on the network. Experiments with the proposed technique show that combining the information distance with the generalized entropy effectively detects low-rate DDoS attacks. However, it is hard to figure out the dynamic threshold because of the changing attack traffic rates in the traffic flow.
Mousavi et al. [28] proposed a detection technique based on the entropy method. The suggested technique analyzes network traffic flows to determine the likelihood of packets entering the flow. Their technique seems effective and lightweight for detecting attacks in the early stages. However, although the proposed technique aims to detect attacks early, it has some limitations that reduce its effectiveness. An example of such a limitation is using a constant threshold, which is ineffective for detecting different DDoS attack traffic rates and raises the false positive rate.
Hu et al. [38] proposed a FADM approach based on traffic flow statistical analysis of network traffic data gathered by the controller’s sFlow agent. Furthermore, the proposed technique uses the entropy method that determines the probability of packet features to quantify network traffic changes. In addition, it detects DDoS attacks using a machine-learning algorithm (SVM). However, the false positive rate considerably increases when there is a burst of DDoS attack traffic that targets multiple victims within a short period.
Additionally, Jiang et al. [39] presented a DDoS defense mechanism (EDDM) based on an entropy method. The proposed approach prevents DDoS attacks on legitimate network users during flash crowd situations by tracking the attack traffic flows. The EDDM has three steps based on traffic statistics collected inside a specific window size and used to determine the entropy value for detecting DDoS attacks. In the sFlow, the entropy value is compared to a static threshold to reveal the traffic packet rate that targets a specific victim. However, there is a latency in processing new packets, and detection accuracy is low for multi-victim attacks.
Several techniques for dealing with DDoS attacks that target a single victim have been developed and have high detection accuracy. However, several techniques [37,38] struggle with multiple-victim attacks. Attackers might exploit this limitation to execute attacks against the controller, disrupting the whole network. Meanwhile, [36,38] attempted to protect the controller against high-rate DDoS attacks targeting a single victim or multiple victims with a high detection accuracy rate and a low false positive rate. However, most of these techniques only depend on static thresholds. Table 1 summarizes the existing DDoS attack detection techniques by highlighting their strengths and limitations.
As shown in Table 1, all existing approaches rely on a static threshold. The fixed threshold will be ineffective when the attack traffic rate varies. In addition, the existing approaches can only detect either low-rate or high-rate DDoS attacks, but not both, unlike the current proposed approach, which relies on a dynamic threshold that adopted EWMA [40]. The usage of a dynamic threshold highly contributes to the detection of DDoS attacks regardless of DDoS attack type (low-rate or high-rate).

3. Proposed Approach

This study’s contribution adapts a dynamic threshold for the accurate detection of DDoS attacks with a low false positive rate. The value is adjusted in response to the dynamic network traffic flows since the attack traffic flow behaviors vary depending on the specified window size. However, the difference between the low and high DDoS attack traffic rates does little to improve the performance of detection techniques that depend on a static threshold.
Adapting a dynamic threshold resulted in a lower false positive rate, a higher attack detection rate, and reduced time for selecting a threshold value since most attack detection techniques rely on observation and experimentation to find a fitting threshold value (static threshold). Furthermore, the dynamic threshold influences the technique’s performance to detect low- and high-rate DDoS attacks. In addition, determining threshold values is usually time-consuming because it depends on observation and experimentation. So, the proposed method aims to dynamically find the threshold for detecting different DDoS attack traffic rates by autonomously observing the network traffic for attacks targeting single or multiple victims.
The proposed approach’s dynamic threshold value depends on three variables: (i) the number of incoming network traffic flows into the controller, (ii) the rate of DDoS attack traffic flows triggered toward the host victims, and (iii) the Renyi joint entropy value within a specific time interval (t).
The Renyi joint entropy algorithm is a statistical method used to calculate packets’ randomness in network traffic flows over a specific time interval. The proposed Renyi joint entropy algorithm is based on two variables from the packet header features, source IP and destination IP addresses, symbolized as x and y. The Renyi joint entropy equation formula, Equation (1) [41], is based on generalizing Renyi joint entropy by merging two concepts: the joint entropy method and the Renyi method for analyzing the network traffic, which calculates the probability of each packet in the traffic flow within a specified time that depends on two packet header features to obtain the randomness of incoming traffic flows. Based on that, this work adopted the Renyi joint entropy equation method as an input to the dynamic threshold equation.
  H R J α x , y = 1 1 α   log 2 i = 1 N j = 1 M p x i y j α  
where H R J α x , y indicates Renyi joint entropy and α is a positive parameter and exposes the main mass (the concentration of events that occurred frequently). Thus, α is an arbitrary value between 0 and 1 to provide a more accurate result and reduce the variance between observed values, which leads to more stability and convergence for the proposed approach [42]. Thus, the α value is determined based on experimental observation and P x i y j represents the probability distribution between the source IP (x) and the destination IP (y) during the time t.
Furthermore, Equation (1) is used to calculate the randomness of these packets in the traffic flow (i.e., source/destination IP address) within a certain time t. The attack behaviour and legitimate packet behaviour vary and this variation can cause fluctuations in the calculation of the threshold. The Renyi joint entropy algorithm, used in the calculation of the dynamic threshold, is found by the analysis of the incoming traffic flow statistics. Thus, we adopted the exponentially weighted moving average algorithm (EWMA) [40] in our proposed approach to generate a dynamic threshold method. The dynamic threshold depends on the Renyi joint entropy algorithm, which analyzes network traffic flow statistics collected by the SDN controller. Equation (2) is the basic EWMA equation.
E W M A i = 1 α · E W M A i 1 + α · Y i
where the Y i value is observed at a particular t time and E W M A i is the mean of historical data. In the proposed approach, Y i is exchanged with H R J α x , y i , as shown in Equation (3), to compute the randomness of both the source and the destination IP addresses of the packet header features.
E W M A i = 1 α · E W M A i 1 + α · H R J α x , y i
where E W M A i is the current value of the EWMA and E W M A i 1 is the previously calculated EWMA value. The initial value of the threshold adopted in this research is 1.31, based on the calculation by [43], which allows accurate calculation of the first value of the dynamic threshold. H R J α x , y i is the currently measured value; therefore, the assumed current value is a Renyi joint entropy value for a specific time duration (a single-window size), and α is the smoothing factor that filters the noise of H R J α x , y i and stabilizes EMWA; i  1 , 0 < α < 1 because the new threshold will be more precise based on the experiments to limit the value of false negative error, although this choice is somewhat arbitrary [40].
Moreover, the proposed approach depends on a rule-based detection mechanism, which has been used to detect DDoS attacks against the controller based on a statistical analysis of incoming network traffic flows. The proposed rule is based on the Renyi joint entropy value and dynamic threshold. A low- or high-rate DDoS attack within t time (window size) exists if the H R J α x , y value is less than the Th value; otherwise, the traffic is considered normal. Figure 1 shows the flowchart of the rule-based DDoS detection mechanism.
In Figure 1, Th is a dynamic threshold (refer to Equation (3)) and H R J α x , y denotes Renyi joint entropy (refer to Equation (1)). As stated before, contrary to some existing DDoS attack detection approaches that use a static threshold, as listed in Table 1, the proposed approach considers the rate and dynamic threshold of incoming attack traffic that feed the proposed rule-based detection mechanism to accurately detect DDoS attacks, regardless of attack traffic rates (low or high).
In a nutshell, the proposed adaptive dynamic threshold formula is capable of accurately detecting different DDoS attack traffic rates targeted at a single host victim or multiple host victims with a low false positive rate. Equation (3) is a general dynamic threshold formula used to find the optimal dynamic threshold based on Renyi joint entropy (refer to Equation (1)). Renyi joint entropy measures the randomness of the source and destination IP addresses of a packet in the network traffic flow that occurred within time t, which is used as a clue for detecting low- and high-rate DDoS attacks on an SDN controller, and proposes a new rule mechanism based on the dynamic threshold value and Renyi joint entropy value.
We use several scenarios to evaluate how the dynamic threshold method impacts the detection approach for low and high DDoS attack traffic rates. Thus, the optimal dynamic threshold value is found using various attack scenarios involving various attack sources (single or multiple hosts) that target single or multiple victim hosts. Based on this, the incoming packet’s behavior changes over time due to varying attack sources. As previously stated, the EWMA algorithm defines a dynamic threshold depending on changes in network traffic flow situations. Thus, the values keep changing through calculations automatically based on the evaluation of the current network traffic flow situation at a particular time. The adaptive threshold method facilitates attack detection. An attack is detected when the traffic behavior computed during a specified time exceeds or falls below the threshold value. In addition, a comparison between the Renyi joint entropy algorithm H R J α x , y i and the dynamic threshold method E W M A i was made.

4. Experimental Result

The experimental step in the proposed approach topology has been used based on the existing approach topology, such as [28,44]. In this study, experiments were designed to conduct a quantitative research evaluation through a simulation of proposed approach scenarios that cover different attack scenarios. Simulation scenarios provide an easy assessment of the effectiveness of the proposed approach in terms of detecting DDoS attacks on the SDN controller. Figure 2 depicts the topology of the experimental SDN testbed. This section explains the dataset generation, performance evaluation, and the results in Section 4.1, Section 4.2 and Section 4.3, respectively.

4.1. Dataset Generation

This study generates several datasets based on the topology shown in Figure 2 to evaluate the effectiveness of the proposed approach in detecting low and high DDoS attack traffic rates on the controller due to a lack of available benchmark datasets. The generated databases include both normal and abnormal network traffic. Each dataset aggregates network traffic every 5 s, representing different attack scenarios. The attack scenarios are (i) a low-rate DDoS attack on a single victim host by a single host (LSS), (ii) a high-rate DDoS attack on a single victim by a single host (HSS), (iii) a low-rate DDoS attack on multiple victim hosts by a single host (LMS), (iv) a high-rate DDoS attack on multiple victim hosts by a single host (HMS), (v) a low-rate DDoS attack on a single victim host by multiple hosts (LSM), (vi) a high-rate DDoS attack on a single victim by multiple hosts (HSM), (vii) a low-rate DDoS attack on multiple victim hosts by multiple hosts (LMM), and (viii) a high-rate DDoS attack on multiple victim hosts by multiple hosts (HMM). These eight scenarios are replicated from previously published work [41]. The diversity of scenarios is required to evaluate the robustness of the proposed approach to detect DDoS attacks on SDN controllers under different circumstances. In addition, to the best of the authors’ knowledge, the employed dataset is the first to cover all DDoS attack scenarios on the SDN controller.
Each simulation scenario lasts 60 min. The results of the average detection rate and the false positive rate will be presented every 10 min. Table 2 lists the total number of normal and attack traffic packets in a DDoS attack targeting a single victim for 60 min in eight different scenarios.
The virtual network topology created on the Mininet network emulator comprises 64 hosts with IP addresses ranging from 10.0.0.1 to 10.0.0.64; a POX controller; an OpenFlow [45] switch, which has been widely used by researchers, such as by [28] and [44]; therefore, it has been selected in this research; and an attacker running Kali Linux, a Debian-based Linux distribution built for penetration testing and security research. All hosts run Ubuntu Linux OS and Python programming language. Furthermore, the experiment’s workstation runs on a 2.20 GHz Intel® Core i5-5200U CPU with 8 GB of RAM and a 500 GB hard drive.
Suppose a single attack packet is sent in 0.2 s, then the send rate is five packets per second. Therefore, every five seconds, the total number of attack packets sent will be 25. The five packets per second sent rate indicates a low-rate DDoS attack, as stated in [44]. Meanwhile, for the high-rate attack scenario, if a single attack packet is sent in 0.03 s, then the total number of attack packets sent per second is 33. The 33 packets per second sent rate indicates a high-rate DDoS attack, according to [44].
Therefore, for a single attacker scenario with a low DDoS attack traffic rate, the total number of attacks and normal packets sent in five seconds is 25 and 63 × 5 = 315, respectively, regardless of the number of targets (single or multiple victims). As for the multiple attacker scenario with a low-rate DDoS attack, the total number of attacks and normal packets sent in five seconds is 75 and 61 × 5 = 305, respectively, regardless of the number of targets (single or multiple victims). Meanwhile, in a single attacker scenario with a high-rate DDoS attack, the total number of attacks and normal packets sent in five seconds is 166 and 63 × 5 = 315, respectively, regardless of the number of targets (single or multiple victims). As for the multiple attacker scenario with a high DDoS attack traffic rate, the total number of attacks and normal packets sent in five seconds is 500 and 61 × 5 = 305, respectively, regardless of the number of targets (single or multiple victims). However, due to the SDN characteristics that only forward a packet with a unique IP address towards the controller, only 63 or 61 packets are forwarded to the controller.
Consequently, using Equation (4), the attack traffic ratio within a 60 min window for single or multiple hosts’ low-rate DDoS attacks is 7% and 19%, respectively. Moreover, the attack ratio within the 60 min window for single or multiple hosts’ high-rate DDoS attacks is 34% and 62%, respectively.
A T T a c k   T r a f f i c   R a t i o = A t t a c k   P a c k e t   p a c k e t   t o t a l   × 100 %  
where A t t a c k   P a c k e t denotes the number of attack packets and P a c k e t   T o t a l represents the total number of packets generated throughout the simulation.
This work utilizes a new dynamic threshold based on the Renyi joint entropy values and proposes a rule-based detection mechanism to detect low- and high-rate DDoS attacks. Figure 3 illustrates the flowchart of the proposed approach.
As shown in Figure 3, the proposed approach consists of three core steps: (i) calculation of Renyi joint entropy to calculate the network traffic randomness, based on ( H R J α x , y i ); (ii) calculation of the dynamic threshold (Th), based on H R J α x , y i ; and (iii) rule-based detection to detect DDoS attacks, based on Th and H R J α x , y i ).

4.2. Performance Evaluation

The proposed approach was evaluated using well-known metrics, which are also used by existing research [46,47]: detection rate (DR) and false positive rate (FPR). The calculation of these metrics is based on confusion metrics attributes shown in Table 3, while Table 4 shows the description of these attributes.

4.3. Results

This section presents the analysis of the proposed approach’s performance in improving the DR and reducing the FPR for detecting low- and high-rate DDoS attacks on the controller, targeting single or multiple victims. The proposed approach’s performance was evaluated using eight simulation scenarios with varying attack traffic rates to measure the average DR and FPR. The proposed approach yielded the following results for low- and high-rate DDoS attack scenarios.
Figure 4 shows the proposed approach’s DR and FPR in detecting low-rate DDoS attacks. In this scenario, a single host or multiple hosts launch DDoS attacks on the SDN controllers regardless of the number of targets, with a low attack traffic ratio of up to 7 % and 19 %, respectively. In addition, the host acting as the attacker generates packets with unique spoofed IP addresses to trigger low-rate DDoS attacks. Since the switch’s flow table does not yet have any record of these source IP addresses, the packets will be forwarded to the controller for further processing and action.
Although the DDoS attack traffic rate is low (0.2/s) and similar to normal traffic, the proposed approach’s DR ranges between 95.11 % to 96.98 %, which means the proposed approach can accurately detect low-rate DDoS attacks against the controller. Meanwhile, the FPRs range from 3.02% to 4.90%. The detection effectiveness is due to the dynamic threshold that changes its value according to the varying network traffic rates within t time.
Meanwhile, Figure 5 shows the proposed approach’s DR and FPR in detecting high-rate DDoS attacks. In this scenario, a single host or multiple hosts launch DDoS attacks on the SDN controllers regardless of the number of targets, with a high attack traffic ratio of up to 34 to 62%. In addition, the host acting as the attacker generates spoofed IP packets with unique IP addresses to trigger high-rate DDoS attacks.
Figure 5 shows the proposed approach’s DDoS attack detection ratios at 34%, and 62% of the high attack traffic rates range between 99.03% to 97.03%, which means the proposed approach can accurately detect high-rate DDoS attacks on the SDN controller. Meanwhile, the FPR range is between 0.97% to 2.97% for high-rate DDoS attack scenarios.
Meanwhile, the proposed approach’s performance was compared with two existing approaches dependent on the entropy algorithm [28], the fusion entropy algorithm [32], and information theory [34]. Since the entropy technique is the basis for all entropy-based methods, those approaches share the same common limitations. For instance, the reliance on a fixed threshold to detect different DDoS attack traffic rates targeting single or multiple hosts makes it challenging to detect low-rate DDoS attacks with a high DR and low FPR. In this study, the comparison uses eight attack simulation scenarios and two evaluation metrics, DR and FPR.
The rest of this section first discusses the performance of the approaches [28,32,34] in detecting low and high DDoS attack traffic rates, regardless of whether the target is a single or multiple victims, then compares the results with the proposed approach. Table 5 compares the DR and FPR for all eight attack scenarios.
As shown in Table 5, the proposed approach outperformed existing approaches even though the attack traffic of the low-rate DDoS attack is almost indistinguishable from normal traffic flows. Therefore, the existing detection approaches need more statistical analysis within t time of the incoming network traffic to conduct further analysis of the DDoS attack behavior. The difference in the performance is because the proposed approach utilizes a dynamic threshold instead of a fixed threshold utilized by the existing approaches.
The experiments were performed on the proposed approach and the existing approaches [28,32] to prove the proposed approach could accurately detect low- and high-rate DDoS attacks on SDN controllers by single or multiple attackers regardless of whether the target is a single victim or multiple victims with high DR, without adding significant overhead to the SDN controller.
The difference in DR and FPR in Figure 3 and Figure 4 is due to the varying DDoS attack traffic rates. The highest DR and lowest FPR are obtained when multiple attackers target single or multiple victims with high-rate DDoS attacks. Meanwhile, the highest DR and FPR are obtained when a single attacker targets a single victim or multiple victims with a low-rate DDoS attack. The difference between high- and low-rate DDoS attacks is noticeable in the number of attack traffic flows that the victims receive.
Based on the average DDoS attack DRs, the results show that the proposed approach enhances the accuracy of DDoS attack detection. Similarly, when compared to the existing approaches, the proposed approach decreases average FPRs, as depicted in Figure 6, Figure 7 and Figure 8.
Figure 6, Figure 7 and Figure 8 show the proposed approach’s enhancement over the existing approach to detect DDoS attacks in terms of the DR and the FPR for all attack simulation scenarios. Meanwhile, the proposed approach outperformed existing approaches in all scenarios by reducing the average FPR. The low average FPR in Figure 6, Figure 7 and Figure 8 demonstrates the proposed approach’s performance against low and high DDoS attack rates, targeting either a single victim or multiple victims. On the other hand, the existing approaches have a high average FPR, primarily due to static thresholds.

5. Conclusions

An enormous amount of various traffic flows heading toward the SDN controller could overload it and exhaust the controller’s resources, resulting in the collapse of the whole SDN network. Therefore, the controller must be able to handle both high- and low-rate traffic flows efficiently. The main goal of this study was to detect DDoS attacks on SDN controllers regardless of the attack traffic flow rates, the source of the attack, or the number of victims, with a high DR and a low FPR. The goal was achieved by utilizing a dynamic threshold adaptable to varying incoming traffic rates, reducing false positive rates, and obtaining a higher DR.
This study adapted a dynamic threshold and the newly proposed rule-based detection mechanism to detect DDoS attacks on the SDN controller with different attack traffic rates. The proposed approach depends on a dynamic threshold and rule-based detection mechanism to reduce the FPR and increase the DR of the DDoS attack detection approach, which adapts to variations in the rates of the attack traffic. Thus, the dynamic threshold used the generalized Renyi joint entropy values as the input. Meanwhile, the rule-based DDoS attack detection used Renyi joint entropy values and dynamic threshold values. Future research could investigate the hybridization of the dynamic threshold with other information-theory-based algorithms. In addition, the rules can be generated using machine-learning algorithms.

Author Contributions

Conceptualization, M.A.A., M.A. and A.A.B.; methodology, M.A.A. and M.A.; software, M.A.A. and M.A.; validation, M.A.A. and A.J.H.; formal analysis, M.A.A. and S.A.-S.; investigation, M.A.A.; resources, A.A.B. and S.A.-S.; data curation, M.A.A., M.A. and A.J.H.; writing—original draft preparation, M.A.A., M.A. and I.H.H.; writing—review and editing, M.A.A., M.A. and I.H.H.; visualization, M.A.A. and M.A.; supervision, M.A.; project administration, M.A.A. and M.A. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by Universiti Sains Malaysia under an external grant (Grant Number 304/PNAV/650958/U154).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

For the experimental data and results of this article, you can contact us at [email protected].

Acknowledgments

We would like to express our gratitude to Universiti Sains Malaysia (USM) for all the support and facilities that enable the completion of this research.

Conflicts of Interest

The authors declare that they have no conflict of interest to report regarding the present study.

References

  1. Xia, W.; Wen, Y.; Foh, C.H.; Niyato, D.; Xie, H. A Survey on software-defined networking. IEEE Commun. Surv. Tutor. 2015, 17, 27–51. [Google Scholar] [CrossRef]
  2. Kreutz, D.; Ramos, F.M.; Verissimo, P.E.; Rothenberg, C.E.; Azodolmolky, S.; Uhlig, S. Software-Defined Networking: A Comprehensive Survey. Proc. IEEE 2015, 103, 14–76. [Google Scholar] [CrossRef] [Green Version]
  3. Scott-Hayward, S.; Natarajan, S.; Sezer, S. A Survey of Security in Software Defined Networks. IEEE Commun. Surv. Tutor. 2016, 18, 623–654. [Google Scholar] [CrossRef] [Green Version]
  4. Al-Mashhadi, S.; Anbar, M.; Jalal, R.A.; Al-Ani, A. Design of cloud computing load balance system based on SDN technology. In Computational Science and Technology; Springer: Singapore, 2020; pp. 123–133. [Google Scholar]
  5. Zubaydi, H.D.; Anbar, M.; Wey, C.Y. Review on detection techniques against DDoS attacks on a software-defined networking controller. In Proceedings of the 2017 Palestinian International Conference on Information and Communication Technology (PICICT), Gaza, Palestine, 8–9 May 2017; pp. 10–16. [Google Scholar]
  6. Thyagarajan, K. An Integrated Defense Approach for Distributed Denial of Service Attacks In Mobile Ad-Hoc Network. Int. J. Appl. Eng. Res. 2016, 11, 4898–4910. [Google Scholar]
  7. Haque, M.R.; Ali, S.; Tan, S.C.; Yusoff, Z.; Kwang, L.C.; Kaspin, I.R.; Ziri, S.R. Motivation of DDoS Attack-Aware in Software Defined Networking Controller Placement. In Proceedings of the International Conference on Computer and Applications, ICCA 2017, Doha, Qatar, 6–7 September 2017; pp. 36–42. [Google Scholar]
  8. Alomari, E.; Manickam, S.; Gupta, B.B.; Anbar, M.; Saad, R.M.; Alsaleem, S. A survey of botnet-based DDoS flooding attacks of application layer: Detection and mitigation approaches. In Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security; IGI Global: Hershey, PA, USA, 2016; pp. 52–79. [Google Scholar]
  9. Al-Adaileh, M.A.; Anbar, M.; Chong, Y.W.; Al-Ani, A. Proposed Statistical-Based Approach for Detecting Distribute Denial of Service Against the Controller of Software Defined Network (SADDCS). In Proceedings of the International Conference on Advances in Cyber Security, Penang, Malaysia, 24–25 August 2018; Volume 218, pp. 1–8. [Google Scholar]
  10. Dharma, N.G.; Muthohar, M.F.; Prayuda, J.A.; Priagung, K.; Choi, D. Time-Based DDoS Detection and Mitigation for SDN Controller. In Proceedings of the 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS), Busan, Korea, 19–21 August 2015; pp. 550–553. [Google Scholar]
  11. Abdollah, M.F.; Mas’ud, M.Z.; Yusof, R.; Selamat, S.R. Threshold Verification Using Statistical Approach for Fast Attack Detection. In Proceedings of the International Conference on Computing and Informatics 2009 (ICOCI09), Kuala Lumpur, Malaysia, 24–25 June 2009; pp. 118–123. [Google Scholar]
  12. Singh, B.; Panda, D.S.; Samra, D.G. Threshold Based Approach to Detect DDoS Attacks in Cloud. Int. J. Innov. Res. Inf. Secur. 2015, 3, 22–28. [Google Scholar]
  13. Ahmed, M.; Mahmood, A.N.; Hu, J. A Survey of Network Anomaly Detection Techniques. J. Netw. Comput. Appl. 2016, 60, 19–31. [Google Scholar] [CrossRef]
  14. Mousavi, S.M.; St-Hilaire, M. Early Detection of DDoS Attacks Against SDN Controllers. In Proceedings of the 2015 International Conference on Computing, Networking and Communications (ICNC), Anaheim, CA, USA, 16–19 February 2015; pp. 77–81. [Google Scholar]
  15. Özçelik, I.; Brooks, R.R. Cusum—Entropy: An Efficient Method for DDoS Attack Detection. In Proceedings of the 4th International Istanbul Smart Grid Congress and Fair, ICSG 2016, Istanbul, Turkey, 20–21 April 2016; pp. 1–5. [Google Scholar]
  16. Yadav, S.; Selvakumar, S. Detection of Application Layer DDoS Attack by Modeling User Behavior Using Logistic Regression. In Proceedings of the 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), Noida, India, 2–4 September 2015; pp. 1–6. [Google Scholar]
  17. Bahashwan, A.A.; Anbar, M.; Abdullah, N. New architecture design of cloud computing using software-defined networking and network function virtualization technology. In Proceedings of the International Conference of Reliable Information and Communication Technology, Johor, Malaysia, 22–23 September 2019; pp. 705–713. [Google Scholar]
  18. Masoudi, R.; Ghaffari, A. Software Defined Networks: A survey. J. Netw. Comput. Appl. 2016, 67, pp. 1–25. [Google Scholar] [CrossRef]
  19. Bouras, C.; Kollia, A.; Papazois, A. SDN & NFV in 5G: Advancements and Challenges. In Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN), ICIN Conference, Paris, France, 7–9 March 2017; pp. 107–111. [Google Scholar]
  20. Huang, X.; Du, X.; Song, B. An Effective DDoS Defense Scheme for SDN. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), ICC Conference, Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar]
  21. Duy, P.; Thi, D.; Hien, T.; Pham, V. A Role-Based Statistical Mechanism for DDoS Attack Detection in SDN. In Proceedings of the 2018 5th NAFOSTED Conference on Information and Computer Science (NICS), Ho Chi Minh, Vietnam, 23–24 November 2018; pp. 177–182. [Google Scholar]
  22. He, D.; Chan, S.; Ni, X.; Guizani, M. Software-Defined-Networking-Enabled Traffic Anomaly Detection and Mitigation. IEEE Internet Things J. 2017, 4, 1890–1898. [Google Scholar] [CrossRef]
  23. Kalkan, K.; Altay, L.; Gur, G.; Alagoz, F. JESS: Joint Entropy Based DDoS Defense Scheme in SDN. IEEE J. Sel. Areas Commun. 2018, 36, 2358–2372. [Google Scholar] [CrossRef]
  24. Mao, J.; Deng, W.; Shen, F. DDoS Flooding Attack Detection Based on Joint-Entropy with Multiple Traffic Features. In Proceedings of the 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 237–243. [Google Scholar]
  25. Ajaeiya, G.A.; Adalian, N.; Elhajj, I.H.; Kayssi, A.; Chehab, A. Flow-Based Intrusion Detection System for SDN. In Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, 3–6 July 2017;–6; Volumes 3–6, pp. 787–793. [Google Scholar]
  26. Boite, J.; Nardin, P.A.; Rebecchi, F.; Bouet, M.; Conan, V. Statesec: Stateful Monitoring for DDoS Protection in Software Defined Networks. In Proceedings of the 2017 IEEE Conference on Network Softwarization (NetSoft), Bologna, Italy, 3–7 July 2017; pp. 1–9. [Google Scholar]
  27. Wang, T.; Chen, H.; Cheng, G.; Lu, Y. SDNManager: A Safeguard Architecture for SDN DoS Attacks Based on Bandwidth Prediction. Secur. Commun. Netw. 2018, 2018, 7545079. [Google Scholar] [CrossRef] [Green Version]
  28. Mousavi, S.; St-Hilaire, M. Early Detection of DDoS Attacks Against Software Defined Network Controllers. J. Netw. Syst. Manag. 2018, 26, 573–591. [Google Scholar] [CrossRef]
  29. Mishra, A.; Gupta, N.; Gupta, B.B. Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommun. Syst. 2021, 77, 47–62. [Google Scholar] [CrossRef]
  30. Swami, R.; Dave, M.; Ranga, V. Detection and Analysis of TCP-SYN DDoS Attack in Software-Defined Networking. Wirel. Pers. Commun. 2021, 118, 2295–2317. [Google Scholar] [CrossRef]
  31. Batool, S.; Zeeshan Khan, F.; Qaiser Ali Shah, S.; Ahmed, M.; Alroobaea, R.; Baqasah, A.M.; Ali, I.; Ahsan Raza, M. Lightweight Statistical Approach towards TCP SYN Flood DDoS Attack Detection and Mitigation in SDN Environment. Secur. Commun. Netw. 2022, 2022, 2593672. [Google Scholar] [CrossRef]
  32. Fan, C.; Kaliyamurthy, N.M.; Chen, S.; Jiang, H.; Zhou, Y.; Campbell, C. Detection of DDoS Attacks in Software Defined Networking Using Entropy. Appl. Sci. 2022, 12, 370. [Google Scholar] [CrossRef]
  33. Tan, L.; Pan, Y.; Wu, J.; Zhou, J.; Jiang, H.; Deng, Y. A New Framework for DDoS Attack Detection and Defense in SDN Environment. IEEE Access. 2020, 8, 161908–161919. [Google Scholar] [CrossRef]
  34. Singh, J.; Behal, S. A novel approach for the detection of DDoS Attacks in SDN using information theory metric. In Proceedings of the 2021 8th International Conference on Computing for Sustainable Global Development, INDIACom 2021, New Delhi, India, 17–19 March 2021; pp. 512–516. [Google Scholar]
  35. Zhijun, W.; Qing, X.; Jingjie, W.; Meng, Y.; Liang, L. Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network. IEEE Access. 2020, 8, 17404–17418. [Google Scholar] [CrossRef]
  36. Wang, Y.; Hu, T.; Tang, G.; Xie, J.; Lu, J. SGS: Safe-Guard Scheme for Protecting Control Plane Against DDoS Attacks in Software-Defined Networking. IEEE Access. 2019, 7, 34699–34710. [Google Scholar] [CrossRef]
  37. Sahoo, K.S.; Puthal, D.; Tiwary, M.; Rodrigues, J.J.; Sahoo, B.; Dash, R. An Early Detection of Low Rate DDoS Attack to SDN Based Data Center Networks Using Information Distance Metrics. Future Gener. Comput. Syst. 2018, 89, 685–697. [Google Scholar] [CrossRef]
  38. Hu, D.; Hong, P.; Chen, Y. FADM: DDoS Flooding Attack Detection and Mitigation System in Software-Defined Networking. In Proceedings of the GLOBECOM 2017–2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–7. [Google Scholar]
  39. Jiang, Y.; Zhang, X.; Zhou, Q.; Cheng, Z. An Entropy-Based DDoS Defense Mechanism in Software Defined Networks. In Proceedings of the International Conference on Communications and Networking in China, Shanghai, China, 29 November–1 December 2019; Volume 1, pp. 169–178. [Google Scholar]
  40. Čisar, P.; Čisar, S.M. EWMA Statistic in Adaptive Threshold Algorithm. In Proceedings of the 2007 11th International Conference on Intelligent Engineering Systems, Hungary Budapest, 29 June–2 July 2007; pp. 51–54. [Google Scholar]
  41. Aladaileh, M.; Anbar, M.; Hasbullah, I.H.; Sanjalawe, Y.K.; Chong, Y.W. Entropy-Based Approach to Detect DDoS Attacks on Software Defined Networking Controller. Comput. Mater. Contin. 2021, 69, 373–391. [Google Scholar] [CrossRef]
  42. Lima, C.F.L.; Assis, F.M.; De Souza, C.P. A Comparative Study of Use of Shannon, Rényi and Tsallis Entropy for Attribute Selecting in Network Intrusion Detection. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics. In Proceedings of the 2011 IEEE International Workshop on Measurements and Networking Proceedings (M&N), Anacapri, Italy, 10–11 October 2012; Volume 7435, pp. 492–501. [Google Scholar]
  43. Mousavi, S.M. Early Detection of DDoS Attacks in Software Defined Networks Controller. Master’s Thesis, Carleton University, Ottawa, ON, Canada, May 2014. [Google Scholar]
  44. Kia, M. Early Detection and Mitigation of DDoS Attacks in Software Defined Networks. Master’s Thesis, Ryerson University, Toronto, ON, Canada, 2015. [Google Scholar]
  45. Dave, T.A. OpenFlow: Enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 2008, 38, 69–74. [Google Scholar]
  46. Anbar, M.; Abdullah, R.; Hasbullah, I.H.; Chong, Y.W.; Elejla, O.E. Comparative performance analysis of classification algorithms for intrusion detection system. In Proceedings of the 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, 12–14 December 2016; pp. 282–288. [Google Scholar]
  47. Anbar, M.; Abdullah, R.; Al-Tamimi, B.N.; Hussain, A. A Machine Learning Approach to Detect Router Advertisement Flooding Attacks in Next-Generation IPv6 Networks. Cogn. Comput. 2018, 10, 201–214. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Rule-based DDoS detection mechanism.
Figure 1. Rule-based DDoS detection mechanism.
Applsci 12 06127 g001
Figure 2. Experimental network topology.
Figure 2. Experimental network topology.
Applsci 12 06127 g002
Figure 3. Proposed approach steps.
Figure 3. Proposed approach steps.
Applsci 12 06127 g003
Figure 4. Average DR and FPR of each low-rate DDoS attack traffic scenarios.
Figure 4. Average DR and FPR of each low-rate DDoS attack traffic scenarios.
Applsci 12 06127 g004
Figure 5. Average DR and FPR of each high-rate DDoS attack traffic scenarios.
Figure 5. Average DR and FPR of each high-rate DDoS attack traffic scenarios.
Applsci 12 06127 g005
Figure 6. Average enhancement of proposed approach compared with entropy method using all simulation scenarios.
Figure 6. Average enhancement of proposed approach compared with entropy method using all simulation scenarios.
Applsci 12 06127 g006
Figure 7. Average enhancement of proposed approach compared with fusion entropy method using all simulation scenarios.
Figure 7. Average enhancement of proposed approach compared with fusion entropy method using all simulation scenarios.
Applsci 12 06127 g007
Figure 8. Average enhancement of proposed approach compared with information theory-based method using all simulation scenarios.
Figure 8. Average enhancement of proposed approach compared with information theory-based method using all simulation scenarios.
Applsci 12 06127 g008
Table 1. Summary of DDoS attack on SDN controller detection techniques.
Table 1. Summary of DDoS attack on SDN controller detection techniques.
Ref.MethodStrengthsLimitations
[32]Fusion EntropyDetect high-rate DDoS attacks- Cannot detect low-rate DDoS attacks
- Rely on a static threshold
[33]Machine-learning algorithmCooperative between control and data plane- Inefficient detection for high-rate network traffic
- Rely on a static threshold
[34]Theory-based informationDetect high-rate DDoS attacks- Low detection rate for multi-victim attacks
- Rely on a static threshold
[35]Factorization machineClassify low-rate DDoS attacks- Low detection rate for multi-victim attacks
- Rely on a static threshold
[36]Safe-Guard SchemeDetect high-rate DDoS attacks against the controller- Cannot detect low-rate DDoS attacks
- Delay in detecting DDoS attacks
- Rely on a static threshold
[28]EntropyEarly detect DDoS attacks- Low detection rate for multi-victim attacks
- Rely on a static threshold
[37]IDDetect DDoS attacks targeting a single victim- Low detection rate for multi-victim attacks
- Rely on a static threshold
[38]FADMClassifies traffic flowDetect DDoS attacks- High false positive rate for multi-victim attacks
- Rely on a static threshold
[39]EDDMPrevent legitimate packets from being lost- Low detection rate for multi-victim attacks
- Rely on a static threshold
Table 2. Total number of normal and attack traffic packets for eight different scenarios.
Table 2. Total number of normal and attack traffic packets for eight different scenarios.
DatasetDescriptionNumber of Normal Packets in the TrafficNumber of Attack Packets in the TrafficAttack Traffic Ratio
Dataset 1LSS226,80018,0007%
Dataset 2HSS226,800118,80034%
Dataset 3LSM226,80018,0007%
Dataset 4HSM226,800118,80034%
Dataset 5LMS219,60054,00019%
Dataset 6HMS219,600356,40062%
Dataset 7LMM219,60054,00019%
Dataset 8HMM219,600356,40062%
Table 3. Attributes of the confusion matrix.
Table 3. Attributes of the confusion matrix.
Predicted Class
AttackNormal
Actual ClassAttackTrue PositiveFalse Negative
NormalFalse PositiveTrue Negative
Table 4. Description of confusion matrix attributes.
Table 4. Description of confusion matrix attributes.
MetricDescription
True Positive (TP)The data instance is correctly predicted as an attack by the classifier.
False Negative (FN)The data instance is wrongly predicted as a normal instance.
False Positive (FP)The data instance is wrongly classified as an attack.
True Negative (TN)The instance is correctly classified as a normal instance.
Detection Rate (DR)Calculated as the percentage of the correctly detected DDoS attack to the summation of the total number of attacks.
The equations used to calculate DR and FPR are as follows: detection rate (DR) = TP/TP + FN; false positive rate (FPR) = FP/FP + TN.
Table 5. Comparison of proposed approaches vs. existing approaches using all scenarios.
Table 5. Comparison of proposed approaches vs. existing approaches using all scenarios.
ScenariosApproachesAverage DRAverage FPR
LSS[28]89.33%10.67%
[32]92.5%7.5%
[34]95%5%
Proposed Approach96.55%3.45%
LSM[28]78.17%21.83%
[32]89.88%10.12%
[34]92.5%7.5%
Proposed Approach95.10%4.90%
LMS[28]90.88%9.12%
[32]93.17%6.83%
[34]94.2%5.8%
Proposed Approach96.98%3.02%
LMM[28]88.00%12.00%
[32]91.25%8.75%
[34]93.8%6.2%
Proposed Approach95.78%4.22%
HSS[28]94.92%5.08%
[32]95.17%4.83%
[34]97%3%
Proposed Approach98.44%1.56%
HSM[28]94.00%6.00%
[32]95.05%4.95%
[34]96.6%3.4%
Proposed Approach97.03%2.97%
HMS[28]97.00%3.00%
[32]98.17%1.83%
[34]98.5%1.5%
Proposed Approach99.03%0.97%
HMM[28]95.75%4.25%
[32]97.55%2.45%
[34]97.88%2.12%
Proposed Approach98.11%1.89%
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Aladaileh, M.A.; Anbar, M.; Hintaw, A.J.; Hasbullah, I.H.; Bahashwan, A.A.; Al-Sarawi, S. Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates. Appl. Sci. 2022, 12, 6127. https://doi.org/10.3390/app12126127

AMA Style

Aladaileh MA, Anbar M, Hintaw AJ, Hasbullah IH, Bahashwan AA, Al-Sarawi S. Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates. Applied Sciences. 2022; 12(12):6127. https://doi.org/10.3390/app12126127

Chicago/Turabian Style

Aladaileh, Mohammad Adnan, Mohammed Anbar, Ahmed J. Hintaw, Iznan H. Hasbullah, Abdullah Ahmed Bahashwan, and Shadi Al-Sarawi. 2022. "Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates" Applied Sciences 12, no. 12: 6127. https://doi.org/10.3390/app12126127

APA Style

Aladaileh, M. A., Anbar, M., Hintaw, A. J., Hasbullah, I. H., Bahashwan, A. A., & Al-Sarawi, S. (2022). Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates. Applied Sciences, 12(12), 6127. https://doi.org/10.3390/app12126127

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop