Research Article
DoS Attack Impact Assessment on Software Defined Networks
@INPROCEEDINGS{10.1007/978-3-319-76571-6_2, author={Abimbola Sangodoyin and Tshiamo Sigwele and Prashant Pillai and Yim Hu and Irfan Awan and Jules Disso}, title={DoS Attack Impact Assessment on Software Defined Networks}, proceedings={Wireless and Satellite Systems. 9th International Conference, WiSATS 2017, Oxford, UK, September 14-15, 2017, Proceedings}, proceedings_a={WISATS}, year={2018}, month={3}, keywords={Software Defined Networks DoS Network security}, doi={10.1007/978-3-319-76571-6_2} }
- Abimbola Sangodoyin
Tshiamo Sigwele
Prashant Pillai
Yim Hu
Irfan Awan
Jules Disso
Year: 2018
DoS Attack Impact Assessment on Software Defined Networks
WISATS
Springer
DOI: 10.1007/978-3-319-76571-6_2
Abstract
Software Defined Networking (SDN) is an evolving network paradigm which promises greater interoperability, more innovation, flexible and effective solutions. Although SDN on the surface provides a simple framework for network programmability and monitoring, few has been said about security measures to make it resilient to hitherto security flaws in traditional network and the new threats the architecture is ushering in. One of the security weaknesses the architecture is ushering in due to separation of control and data plane is Denial of Service (DoS) attack. The main goal of this attack is to make network resources unavailable to legitimate users or introduce large delays. In this paper, the effect of DoS attack on SDN is presented using Mininet, OpenDaylight (ODL) controller and network performance testing tools such as iperf and ping. Internet Control Message Protocol (ICMP) flood attack is performed on a Transmission Control Protocol (TCP) server and a User Datagram Protocol (UDP) server which are both connected to OpenFlow switches. The simulation results reveal a drop in network throughput from 233 Mbps to 87.4 Mbps and the introduction of large jitter between 0.003 ms and 0.789 ms during DoS attack.