An efficient defense mechanism for spoofed IP attack in SDN based CDNi

Nishat I. Mowla, Inshil Doh, Kijoon Chae

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

16 Scopus citations

Abstract

In recent years enhancing the capability of network services automatically and dynamically through SDN and CDN/CDNi networks has become a new field of research. These future network architectures pose both a blessing and a threat in the network field. Such network architectures can optimize the overall network services by analyzing the topology, traffic paths, packet handling and so on and also can create a potential target for spoofed IP attacks. We, therefore, propose an architecture for an SDN based CDNi network to detect spoofed ip and create a defense against attacks created by them. We also propose ALTO like servers in our architecture which enable mapping a very big network to provide a summarized view. In the ALTO server we propose an additional map named the mark map as a mechanism to detect spoofed IP addresses. SDN switches are utilized to extract rules associated with the ALTO server mark map and follow a mechanism of spoofed IP detection fed to them by the SDN controller application layer.

Original languageEnglish
Title of host publication2015 International Conference on Information Networking, ICOIN 2015
PublisherIEEE Computer Society
Pages92-97
Number of pages6
ISBN (Electronic)9781479983421
DOIs
StatePublished - 10 Mar 2015
Event2015 International Conference on Information Networking, ICOIN 2015 - Siem Reap, Cambodia
Duration: 12 Jan 201514 Jan 2015

Publication series

NameInternational Conference on Information Networking
Volume2015-January
ISSN (Print)1976-7684

Conference

Conference2015 International Conference on Information Networking, ICOIN 2015
Country/TerritoryCambodia
CitySiem Reap
Period12/01/1514/01/15

Bibliographical note

Publisher Copyright:
© 2015 IEEE.

Keywords

  • ALTO
  • Attack
  • CDN
  • CDNi
  • SDN
  • defense

Fingerprint

Dive into the research topics of 'An efficient defense mechanism for spoofed IP attack in SDN based CDNi'. Together they form a unique fingerprint.

Cite this