Title | ||
---|---|---|
Suspicious Flow Forwarding for Multiple Intrusion Detection Systems on Software-Defined Networks. |
Abstract | ||
---|---|---|
In recent years, there have been an increasing number of attacks on networks, such as the distributed denial-of-service attack. However, the traditional network is not sufficiently flexible to control the huge amount of traffic that now passes through an intrusion detection system. With SDN, which separates control planes and data planes for programmability, elasticity, and simplicity, it becomes possible to force traffic to pass through an IDS by simply rerouting or mirroring traffic to an IDS. This article focuses on how to distribute traffic to multiple IDSs in order to increase the detection of network attacks and balance IDS loads. A clustering-based flow grouping scheme that distributes flows according to routing information and flow data rate is proposed. Through experiments with a virtualized testbed, we show that the proposed scheme detects network attacks more quickly and achieves a better balance of traffic loads on the IDSs. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1109/MNET.2016.1600106NM | IEEE Network |
Keywords | Field | DocType |
Computer crime,Intrusion detection,Principal component analysis,Inspection,Routing,Load management,Forensics,Surveillance,Network security | Load management,Computer science,Flow (psychology),Network security,Computer network,Testbed,Data rate,Cluster analysis,Software-defined networking,Intrusion detection system,Distributed computing | Journal |
Volume | Issue | ISSN |
30 | 6 | 0890-8044 |
Citations | PageRank | References |
2 | 0.37 | 0 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Taejin Ha | 1 | 150 | 17.16 |
Seunghyun Yoon | 2 | 20 | 3.37 |
Aris Cahyadi Risdianto | 3 | 11 | 4.47 |
Jongwon Kim | 4 | 1042 | 153.38 |
Hyuk Lim | 5 | 161 | 11.83 |