INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.14, No.1, Feb. 2022

Mitigation of DDOS and MiTM Attacks using Belief Based Secure Correlation Approach in SDN-Based IoT Networks

Full Text (PDF, 1291KB), PP.52-68


Views:7   Downloads:1

Author(s)

Mimi M Cherian, Satishkumar L. Varma

Index Terms

Distributed Denial of Service Attacks (DDoS);Software-Defined Networking (SDN);Internet of Things(IoT);Encryption;Decryption

Abstract

In recent years the domain of Internet of Things (IoT) has acquired great interest from the ICT community. Environmental observation and collecting information is one of the key reasons that IoT infrastructure facilitates the creation of many varieties of the latest business methods and applications. There are however still issues about security measures to be resolved to ensure adequate operation of devices. Distributed Denial of Service (DDoS) attacks are currently the most severe virtual threats that are causing serious damage to many IoT devices. With this in mind, numerous research projects were carried out to discover new methods and develop Novel techniques and solutions for DDOS attacks prevention. The use of new technology, such as software-defined networking (SDN) along with IoT devices has proven to be an innovative solution to mitigate DDoS attacks. In this article, we are using a novel data sharing system in IoT units that link IoT units with the SDN controller and encrypt information from IoT unit. We use conventional Redstone cryptographic algorithms to encrypt information from IoT devices in this framework. The Proposed Belief Based Secure Correlation methodology supports the prevention of DDOS attacks and other forms of data attacks. The system proposes new routes for transmission through the controller and communicates with approved switches for the safe transmission of data. To simulate our entire scenario, we proposed the algorithm Belief Based Secure Correlation (BBSC) implemented in  SDN–IoT Testbed and verified IoT data is secure during transmission in the network.

Cite This Paper

Mimi M Cherian, Satishkumar L. Varma, "Mitigation of DDOS and MiTM Attacks using Belief Based Secure Correlation Approach in SDN-Based IoT Networks", International Journal of Computer Network and Information Security(IJCNIS), Vol.14, No.1, pp.52-68, 2022. DOI: 10.5815/ijcnis.2022.01.05

Reference

[1]Chuah, J.W.: The Internet of Things: an overview and new perspectives in systems design. In: International Symposium on Integrated Circuits (2019). 978-1-4799-4833-8/14

[2]Agrawal, S., Das, M.L.: Internet of Things – A Paradigm Shift of Future Internet Applications, Institute of Technology, Nirma University, Ahmedabad 382 481, 08-10 (2011)

[3]Guest Editorial: IEEE Systems Journals Special Issue on “Intelligent Internet of Things”.IEEE Syst. J. 10(3) (2018).

[4]Jararweh, Y., Al-Ayyoub, M., Darabseh, A., Benkhelifa, E., Vouk, M., Rindos, A.: SDIoT: a software defined based Internet of Things framework. Springer, Heidelberg (2018). Print ISSN 1868-5137, Online ISSN 1868-5145

[5]Shin, S., Gu, G.: Attacking software-defined networks: a first feasibility study. In: Proceedings of the 2nd ACM SIGCOMM Workshop Hot Topics Software Defined Networks, New York, NY, USA, pp. 165–166 (2017)

[6]Xu, X.: Study on security problems and key technologies of the Internet of Things. In: International Conference on Computation and Information Sciences (2019)

[7]Kanuparthi, A., Karri, R., Addepalli, S.: Hardware and embedded security in the context of Internet of Things. In: CyCAR 2013: Proceedings of the 2013 ACM Workshop on Security, Privacy and Dependability for Cyber Vehicles, pp. 61–64 (2018)

[8]Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges, countermeasures, and future directions, impact of next-generation mobile technologies on IoT: cloud sconvergence.,2018

[9]Dao, N.N.; Park, J.; Park, M.; Cho, S. A feasible method to combat against DDoS attack in SDN network. In Proceedings of the 2015 International Conference on Information Networking (ICOIN), Siem Reap, Cambodia, 12–14 January 2017; pp. 309–311. doi:10.1109/ICOIN.2015.7057902.

[10]Mousavi, S.M.; St-Hilaire, M. Early detection of DDoS attacks against SDN controllers. In Proceedings of the 2015 International Conference on Computing, Networking and Communications (ICNC), Anaheim, CA, USA, 16–19 February 2017; pp. 77–81. doi:10.1109/ICCNC.2015.7069319

[11]Dong, P.; Du, X.; Zhang, H.; Xu, T. A detection method for a novel DDoS attack against SDN controllers by vast new low-traffic flows. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 23–27 May 2017; pp. 1–6. doi:10.1109/ICC.2016.7510992

[12]Laboratory, M. Intrusion Detection Attacks Database. Available online: https://archive.ll.mit.edu/ideval/data/index.html

[13]Yan, Q.; Gong, Q.; Yu, F.R. Effective software-defined networking controller scheduling method to mitigate DDoS attacks. Electron. Lett. 2017, 53, 469–471.

[14]Dharma, N.I.G.; Muthohar, M.F.; Prayuda, J.D.A.; Priagung, K.; Choi, D. TDMSC:Time-based DDoS detection and mitigation for SDN controller. In Proceedings of the 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS), Busan, Korea, 19–21 August 2017; pp. 550–553. doi:10.1109/APNOMS.2015.7275389

[15]Shoeb, A.; Chithralekha, T. Resource management of switches and Controller during saturation time to avoid DDoS in SDN. In Proceedings of the 2016 IEEE International Conference on Engineering and Technology (ICETECH), Coimbatore, India, 17–18 March 2018; pp. 152–157. doi:10.1109/ICETECH.2016.7569231.

[16]Xiao, P.; Li, Z.; Qi, H.; Qu, W.; Yu, H. An Efficient DDoS Detection with Bloom Filter in SDN. In Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23–26 August 2018; pp. 1–6. doi:10.1109/TrustCom.2016.0038.

[17]RT, K.; Selvi, S.T.; Govindarajan, K. DDoS detection and analysis in SDN-based environment using support vector machine classifier. In Proceedings of the 2014 Sixth International Conference on Advanced Computing (ICoAC), Chennai, India, 17–19 December 2019; pp. 205–210.

[18]T.Phan.; Bao, N.; Park, M. A Novel Hybrid Flow-Based Handler with DDoS Attacks in Software-Defined Networking. In Pro- ceedings of the IEEE Conferences on UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld, Toulouse, France, 18–21 July 2019; pp. 350–357.

[19]Lim, S.; Ha, J.; Kim, H.; Kim, Y.; Yang, S. A SDN-oriented DDoS blocking scheme for botnet-based attacks. In Proceedings of the Conference on Ubiquitous and Future Networks, Shanghai, China, 8–11 July 2019; pp. 63–68. doi:10.1109/ICUFN.2014.6876752.

[20]Chin, T.; Mountrouidou, X.; Li, X.; Xiong, K. An SDN-supported collaborative approach for DDoS flooding detection and containment. In Proceedings of the IEEE Military Communications Conference, Tampa, FL, USA, 26–28 October 2018; pp. 659–664. doi:10.1109/MILCOM.2015.7357519.

[21]Macedo, R.; de Castro, R.; Santos, A.; Ghamri-Doudane, Y.; Nogueira, M. Self-Organized SDN Controller Cluster Conformations against DDoS Attacks Effects. In Proceedings of the IEEE Global Communications Conference, Washington, DC USA, 4–8 December 2017; pp. 1–6. doi:10.1109/GLOCOM.2016.7842259.

[22]Hameed, S.; Khan, H.A. Leveraging SDN for collaborative DDoS mitigation. In Proceedings of the 2017 International Conference on Networked Systems, Gottingen, Germany, 13–16 March 2018; pp. 1–6. doi:10.1109/NetSys.2017.7903962.

[23]Sahay, R.; Blanc, G.; Zhang, Z.; Debar, H. ArOMA: An SDN based autonomic DDoS mitigation framework. Comput. Secur. 2018,70, 482–499.

[24]Bhavika Pande,et.al: Detection and mitigation of DDoS in SDN.In Proceedings of 2018 Eleventh International Conference on Contemporary Computing (IC3), 2-4 August, 2018, Noida, India.

[25]Yang Y., Wang J., Zhai B., Liu J. (2019) IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDN. In: Vaidya J., Zhang X., Li J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science, vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_

[26]Al Shuhaimi, F.; Jose, M.; Singh, A.V. Software defined network as solution to overcome security challenges in IoT. In Proceedings of the IEEE Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), Noida, India, 7–9 September 2019; pp. 491–496.

[27]Ahmed, M.E.; Kim, H. DDoS Attack Mitigation in Internet of Things Using Software Defined Networking. In Proceedings of the IEEE Conference on Big Data Computing Service and Applications, San Francisco, CA, USA, 6–9 April 2018; pp. 271–276. doi:10.1109/BigDataService.2017.41.

[28]Tortonesi, M.; Michaelis, J.; Morelli, A.; Suri, N.; Baker, M.A. SPF: An SDN-based middleware solution to mitigate the IoT information explosion. In Proceedings of the IEEE Symposium on Computers and Communication, Messina, Italy, 27–30 June 2017; pp. 435–442. doi:10.1109/ISCC.2016.7543778.

[29]Özçelik, M.; Chalabianloo, N.; Gür, G. Software-defined edge defense against IoT-based DDoS. In Proceedings of the 2017 IEEE International Conference on Computer and Information Technology (CIT), Helsinki, Finland, 21–23 August 2017; pp. 308–313.

[30]Sarwar, M.A.; Hussain, M.; Anwar, M.U.; Ahmad, M. FlowJustifier: An optimized trust-based request prioritization approach for mitigation of SDN controller DDoS attacks in the IoT paradigm. In Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, Paris, France, 1–2 July 2019; pp. 1–9.

[31]Ravi, N.; Shalinie, S.M. Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet Things J. 2020, 7, 3559–3570.

[32]Sharma, P.K.; Singh, S.; Park, J.H. OpCloudSec: Open cloud software defined wireless network security for the Internet of Things. Comput. Commun. 2018, 122, 1–8.

[33]Nobakht, M.; Sivaraman, V.; Boreli, R. A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow. In Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria, 31 August–2 September 2019; pp. 147–156.

[34]Meyer, U., and Wetzel, S. (2014, October). A man-in-the-middle attack on UMTS. In Proceedings of the 3rd ACM workshop on Wireless security (pp. 90-97). ACM.

[35]Kish, L. B. (2016). Protection against the man-in-the-middle-attack for the Kirchhoff-loop-Johnson (-like)-noisecipher and expansion by voltage-based security. Fluctuation and Noise Letters, 6(01), L57-L63.

[36]Hypponen, K., and Haataja, K. M. (2017, September). “Nino” man-in-the-middle attack on bluetooth secure simple pairing. In Internet, 2017. ICI 2017. 3rd IEEE/IFIP International Conference in Central Asia on (pp. 1-5).IEEE.

[37]Sun, D. Z., Mu, Y., and Susilo, W. (2018). Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5. 0 and its countermeasure. Personal and Ubiquitous Computing, 22(1), 55-67.

[38]Sounthiraraj, D., Sahs, J., Greenwood, G., Lin, Z., and Khan, L. (2018). Smv-hunter: Large scale, automated detection of ssl/tls man-in-the-middle vulnerabilities in android apps. In In Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS’18).

[39]Tung, Y. C., Shin, K. G., and Kim, K. H. (2016, July). Analog man-in-the-middle attack against link-based packet source identification. In Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing(pp. 331-340). ACM.

[40]Wallace, Brian Michael, and Jonathan Wesley Miller. "Endpoint-based man in the middle attack detection using multiple types of detection tests." U.S. Patent 9,680,860, issued June 13, 2017.

[41]Conti, M., Dragoni, N., and Lesyk, V. (2016). A survey of man in the middle attacks. IEEE Communications Surveys and Tutorials, 18(3), 2027-2051.

[42]Howell, C., Statica, R., and Coppa, K. L. (2018). U.S. Patent No. 9,906,506. Washington, DC: U.S. Patent andTrademark Office.

[43]Kuo, E. C., Chang, M. S., and Kao, D. Y. (2018, February). User-side evil twin attack detection using time-delay statistics of TCP connection termination. In Advanced Communication Technology (ICACT), 2019 20th International Conference on(pp. 211-216). IEEE.

[44]Farouq Aliyu, Tarek Sheltami, Elhadi M. Shakshuki, A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing, Procedia Computer Science,Volume 141,2018,Pages 24-31,ISSN 1877-0509,https://doi.org/10.1016/j.procs.2018.10.125.

[45]C. Li, Z. Qin, E. Novak and Q. Li, "Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks," in IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1156-1164, Oct. 2017, doi: 10.1109/JIOT.2017.2685596.

[46]Li, Y., Serrano, M., Chin, T., Xiong, K. and Lin, J.A Software-defined Networking-based Detection and Mitigation Approach against KRACK.DOI: 10.5220/0007926202440251 In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (ICETE 2019), pages 244-251.ISBN: 978-989-758-378-0

[47]Mimi Cherian and Madhumita Chatterjee, “Survey of Security Threats in IoT and Emerging Countermeasures”, Springer SSCC 2018: Security in Computing and Communications pp 591-604

[48]Mimi Cherian and Satishkumar Varma, “ Integration of IoT and SDN to mitigate DDoS attack with RYU Controller”, Springer, ICCBI 2020 International Conference on Computer networks, Big Data and IoT

[49]Ali Alshahrani, Khaled Suwais and Basil Alkasasbeh ,Authentication method in software –Defined Network based on Ciphertext –Policy At- tributes Encryption.,International Journal of Innovative Computing, In- formation and Control, 2018.

[50]Wang, S.; Chandrasekharan, S.; Gomez, K.; Kandeepan, S.; Al-Hourani, A.; Asghar, M.R.; Russello, G.; Zanna, P. SECOD: SDN sEcure control and data plane algorithm for detecting and defending against DoS attacks. In Proceedings of the NOMS 2018—2019 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 23–27 April 2019; pp. 1–5.

[51]J. Mirkovic and P. Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM Computer Communications Review, vol. 34, no. 2, pp. 39-53, 2015.

[52]Z. He, T. Zhang, and R.B. Lee, "Machine Learning Based DDoS Attack Detection from Source Side in Cloud," Proceedings of the IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), New York, NY, USA, July 2019

[53]Yi-Wen Chen, Jang-Ping Sheu, Yung-Ching Kuo, and Nguyen Van Cuong,” Design and Implementation of IoT DDoS Attacks Detection System based on Machine Learning”, 2020 European Conference on Networks and Communications (EuCNC): Vertical Applications and Internet of Things (VAP).

[54]Yang Y., Wang J., Zhai B., Liu J. (2019) IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDN. In: Vaidya J., Zhang X., Li J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science, vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_1.

[55]Longe Olumide Babatope, Lawal, Babatunde, Ibitola Ayobami,"Strategic Sensor Placement for Intrusion Detection in Network-Based IDS", International Journal of Intelligent Systems and Applications(IJISA), vol.6, no.2, pp.61-68, 2014. DOI: 10.5815/ijisa.2014.02.08