首页 | 本学科首页   官方微博 | 高级检索  
     


A systematic review on distributed denial of service attack defense mechanisms in programmable networks
Authors:Bruno L. Dalmazo  Jonatas A. Marques  Lucas R. Costa  Michel S. Bonfim  Ranyelson N. Carvalho  Anderson S. da Silva  Stenio Fernandes  Jacir L. Bordim  Eduardo Alchieri  Alberto Schaeffer-Filho  Luciano Paschoal Gaspary  Weverton Cordeiro
Affiliation:1. Centro de Ciências Computacionais, Federal University of Rio Grande, Porto Alegre, Rio Grande do Sul, Brazil;2. Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre, Rio Grande do Sul, Brazil;3. Computer Department, University of Brasilia, Brasilia, Brazil;4. Center for Informatics, Federal University of Pernambuco, Recife, Pernambuco, Brazil
Abstract:Design flaws and vulnerabilities inherent to network protocols, devices, and services make Distributed Denial of Service (DDoS) a persisting threat in the cyberspace, despite decades of research efforts in the area. The historical vertical integration of traditional IP networks limited the solution space, forcing researchers to tweak network protocols while maintaining global compatibility and proper service to legitimate flows. The advent of Software-Defined Networking (SDN) and advances in Programmable Data Planes (PDP) changed the state of affairs and brought novel possibilities to deal with such attacks. In summary, the ability of bringing together network intelligence to a control plane, and offloading flow processing tasks to the forwarding plane, opened up interesting opportunities for network security researchers unlike ever. In this article, we dive into recent research that relies on SDN and PDP to detect, mitigate, and prevent DDoS attacks. Our literature review takes into account the SDN layered view as defined in RFC7426 and focuses on the data, control, and application planes. We follow a systematic methodology to capture related articles and organize them into a taxonomy of DDoS defense mechanisms focusing on three facets: activity level, deployment location, and cooperation degree. From the analysis of existing work, we also highlight key research gaps that may foster future research in the field.
Keywords:
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号