This trust value is compared with schemes relying on a threshold value that changes dynamically and assists in detecting the DDoS attack. ![]() Our proposed approach relies on a two-phases algorithm that assigns a variable trust value for every user. Many DDoS mitigation scheme have been proposed, however, determining the threshold between legitimate requests and malicious requests is still a challenging task. Hence, in our proposed approach, we aim to mitigate the DDoS attack that maybe launched to compromise the SDN controller, flood the control plane and cripple the entire network. As one of the main features of SDN is the centralization of all the control plane in the SDN controller, it becomes a central point of attack that may compromise the whole network. Among the most important types of these attacks is the Distributed Denial of Service (DDoS) attack, which in turn affects the network’s performance and delays many real user requests. ![]() ![]() ![]() However, some loopholes make such modern networks vulnerable to many types of attacks. Software-defined networks offer a new approach that attracts the attention of most academic and industrial circles due to the features it contains.
0 Comments
Leave a Reply. |