Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{151127, author = {Harsh Jain and Paritosh Dhotre and Anurag Kothari and Suresh Babu K. S.}, title = {A simple security policy enforcement system for an institution using SDN controller}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {7}, number = {12}, pages = {98-103}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=151127}, abstract = {Basically, as we know (SDN) software-defined networking architectural framework eases the work of the n/w administrators by separating the data plane from the control plane. This provides easy network configuration by supporting a programmable interface for applications development related to security, management etc. and the centralized logical controller provides more control over the total network, which has complete network visibility. These SDN advantages exposes the network to vulnerabilities and the impact of the attacks is much severe when compared to traditional networks, where the network devices have protection from the attacks and limits the occurrence of attacks. In this project, we want to explore various attacks that can be launched on SDN at different layers. we also want to evaluate some of the existing security methods in mitigating the attacks and explore a possible solution to prevent DDoS attacks using entropy. Basically, Distributed Denial of Service (DDoS) attack is a DoS attack which utilizes multiple distributed attack sources. We know that every network in the system has an entropy and increase in the randomness causes entropy to decrease. For preventing this DDoS threat, we want to use POX for attack detection and want to provide a solution that is effective in terms of the resources used. More precisely, this project shows how DDoS attacks can consume controller resources and provide a solution to detect such attacks based on the entropy variation of the destination IP address. Now based on this entropy value, we shall block that specific port in the switch if it drops below certain threshold value, and then bring the port down. }, keywords = {DDoS, POX, SDN}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry