{"id":8508,"date":"2023-09-24T14:09:44","date_gmt":"2023-09-24T11:09:44","guid":{"rendered":"http:\/\/ams.uokerbala.edu.iq\/wp\/en\/?p=8508"},"modified":"2023-09-24T14:11:09","modified_gmt":"2023-09-24T11:11:09","slug":"renyi-joint-entropy-based-dynamic-threshold-approach-to-detect-ddos-attacks-against-sdn-controller-with-various-traffic-rates","status":"publish","type":"post","link":"https:\/\/ams.uokerbala.edu.iq\/wp\/en\/blog\/2023\/09\/24\/renyi-joint-entropy-based-dynamic-threshold-approach-to-detect-ddos-attacks-against-sdn-controller-with-various-traffic-rates\/","title":{"rendered":"Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8508\" class=\"elementor elementor-8508\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-26056663 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"26056663\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-77501182\" data-id=\"77501182\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-167e4348 elementor-widget elementor-widget-heading\" data-id=\"167e4348\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3c62754a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3c62754a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5ac53402\" data-id=\"5ac53402\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-55ac7084 elementor-widget elementor-widget-spacer\" data-id=\"55ac7084\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-78bd2216 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"78bd2216\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-606d324a\" data-id=\"606d324a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3f4962c4 elementor-widget elementor-widget-text-editor\" data-id=\"3f4962c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6 dir=\"ltr\" style=\"text-align: left;\">Abstract: The increasing incidence of distributed denial-of-service (DDoS) attacks has made softwaredefined<br \/>networking (SDN) more vulnerable to the depletion of controller resources. DDoS attacks<br \/>prevent the SDN controller from processing all incoming data efficiently, potentially disrupting a<br \/>network or denying legitimate users access to network services. Thus, the protection of the SDN<br \/>controller is crucial, especially from the ones that exploit the SDN characteristics. In this paper,<br \/>the authors propose an efficient detection approach for low- and high-rate DDoS attacks on the<br \/>controller with a high detection rate and a low false positive rate by adapting a dynamic threshold<br \/>algorithm rather than a static one and proposing a new rule-based detection mechanism. In addition,<br \/>the proposed approach was evaluated using eight simulation scenarios representing all potential<br \/>attacks against the SDN controller in terms of attack traffic rates (low or high), sources (either single<br \/>or multiple hosts), and targets (single or multiple victims). The experiment results show that the<br \/>proposed approach is more effective than the existing approaches based on attack detection and false<br \/>positive rates.<br \/>Keywords: software-defined networking; static threshold; distributed denial of service; controller;<br \/>dynamic threshold; attack detection; Renyi joint entropy<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8d005d9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8d005d9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-35b4b8f6\" data-id=\"35b4b8f6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-39c433c7 elementor-widget elementor-widget-button\" data-id=\"39c433c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/drive.google.com\/file\/d\/1ZAMWSmpXQZKA1r7rDEqFQvn5ojVsgSpK\/view?usp=sharing\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Link<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates Abstract: The increasing incidence of distributed denial-of-service (DDoS) attacks has made softwaredefinednetworking (SDN) more vulnerable to the depletion of controller resources. DDoS attacksprevent the SDN controller from processing all incoming data efficiently, potentially disrupting anetwork or denying legitimate [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[1],"tags":[],"class_list":["post-8508","post","type-post","status-publish","format-standard","hentry","category-1","entry"],"aioseo_notices":[],"jetpack_featured_media_url":"","rttpg_featured_image_url":null,"rttpg_author":{"display_name":false,"author_link":"https:\/\/ams.uokerbala.edu.iq\/wp\/en\/blog\/author\/ams0manager\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/ams.uokerbala.edu.iq\/wp\/en\/blog\/category\/%d8%ba%d9%8a%d8%b1-%d9%85%d8%b5%d9%86%d9%81\/\" rel=\"category tag\">\u063a\u064a\u0631 \u0645\u0635\u0646\u0641<\/a>","rttpg_excerpt":"Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates Abstract: The increasing incidence of distributed denial-of-service (DDoS) attacks has made softwaredefinednetworking (SDN) more vulnerable to the depletion of controller resources. DDoS attacksprevent the SDN controller from processing all incoming data efficiently, potentially disrupting anetwork or denying legitimate&hellip;","_links":{"self":[{"href":"https:\/\/ams.uokerbala.edu.iq\/wp\/en\/wp-json\/wp\/v2\/posts\/8508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ams.uokerbala.edu.iq\/wp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ams.uokerbala.edu.iq\/wp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ams.uokerbala.edu.iq\/wp\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/ams.uokerbala.edu.iq\/wp\/en\/wp-json\/wp\/v2\/comments?post=8508"}],"version-history":[{"count":3,"href":"https:\/\/ams.uokerbala.edu.iq\/wp\/en\/wp-json\/wp\/v2\/posts\/8508\/revisions"}],"predecessor-version":[{"id":8511,"href":"https:\/\/ams.uokerbala.edu.iq\/wp\/en\/wp-json\/wp\/v2\/posts\/8508\/revisions\/8511"}],"wp:attachment":[{"href":"https:\/\/ams.uokerbala.edu.iq\/wp\/en\/wp-json\/wp\/v2\/media?parent=8508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ams.uokerbala.edu.iq\/wp\/en\/wp-json\/wp\/v2\/categories?post=8508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ams.uokerbala.edu.iq\/wp\/en\/wp-json\/wp\/v2\/tags?post=8508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}