Volume 32 Issue 3
May  2023
Turn off MathJax
Article Contents
SU Jian and JIANG Mengnan, “A Hybrid Entropy and Blockchain Approach for Network Security Defense in SDN-Based IIoT,” Chinese Journal of Electronics, vol. 32, no. 3, pp. 531-541, 2023, doi: 10.23919/cje.2022.00.103
Citation: SU Jian and JIANG Mengnan, “A Hybrid Entropy and Blockchain Approach for Network Security Defense in SDN-Based IIoT,” Chinese Journal of Electronics, vol. 32, no. 3, pp. 531-541, 2023, doi: 10.23919/cje.2022.00.103

A Hybrid Entropy and Blockchain Approach for Network Security Defense in SDN-Based IIoT

doi: 10.23919/cje.2022.00.103
Funds:  This work was supported in part by the National Natural Science Foundation of China (61802196, 61872082, 61472184), the Natural Science Foundation of Jiangsu Province (BK20180791), and the Engineering Research Center of Digital Forensics, Ministry of Education.
More Information
  • Author Bio:

    Jian SU has been an Associate Professor in the School of Computer and Software at the Nanjing University of Information Science and Technology since 2022. He received the Ph.D. degree with distinction in communication and information systems at University of Electronic Science and Technology of China (UESTC) in 2016. He holds a B.S. degree in electronic and information engineering from Hankou University and an M.S. degree in electronic circuit and system from Central China Normal University. His current research interests cover Internet of things, RFID, and wireless sensors networking. He is a member of IEEE and a member of ACM. (Email: sj890718@gmail.com)

    Mengnan JIANG received the B.E. degree from Nanjing University of Information Science and Technology, China, in 2019. Currently, he is a master candidate in the School of Computer and Software, Nanjing University of Information Science and Technology. His research interests include Internet of things and network security. (Email: 846094946@qq.com)

  • Received Date: 2022-04-25
  • Accepted Date: 2022-09-26
  • Available Online: 2022-11-21
  • Publish Date: 2023-05-05
  • In the industrial Internet of things (IIoT), various applications generate a large number of interactions and are vulnerable to various attacks, which are difficult to be monitored in a sophisticated way by traditional network architectures. Therefore, deploying software-defined network (SDN) in IIoT is essential to defend against various attacks. However, SDN has a drawback: there is a security problem of distributed denial-of-service (DDoS) attacks at the control layer. This paper proposes an effective solution: DDoS detection within the domain using tri-entropy in information theory. The detected attacks are then uploaded to a smart contract in the blockchain, so that the attacks can be quickly cut off even if the same attack occurs in different domains. Experimental validation was conducted under different attack strengths and multiple identical attacks, and the results show that the method has better detection ability under different attack strengths and can quickly block the same attacks.
  • loading
  • [1]
    D. Evans, “The internet of things: How the next evolution of the internet is changing everything,” Available at: https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf, 2011.
    [2]
    E. Kaljic, A. Maric, P. Njemcevic, et al., “A survey on data plane flexibility and programmability in software-defined networking,” IEEE Access, vol.7, pp.47804–47840, 2019. doi: 10.1109/ACCESS.2019.2910140
    [3]
    S. Scott-Hayward, S. Natarajan and S. Sezer, “A survey of security in software defined networks,” IEEE Communications Surveys & Tutorials, vol.18, no.1, pp.623–654, 2016. doi: 10.1109/COMST.2015.2453114
    [4]
    T. Huang, F. R. Yu, C. Zhang, et al., “A survey on large-scale software defined networking (SDN) testbeds: Approaches and challenges,” IEEE Communications Surveys & Tutorials, vol.19, no.2, pp.891–917, 2017. doi: 10.1109/COMST.2016.2630047
    [5]
    D. B. Rawat and S. R. Reddy, “Software defined networking architecture, security and energy efficiency: A survey,” IEEE Communications Surveys & Tutorials, vol.19, no.1, pp.325–346, 2017. doi: 10.1109/COMST.2016.2618874
    [6]
    J. F. Wan, S. L. Tang, Z. G. Shu, et al., “Software-defined industrial internet of things in the context of industry 4.0,” IEEE Sensors Journal, vol.16, no.20, pp.7373–7380, 2016. doi: 10.1109/JSEN.2016.2565621
    [7]
    R. Wang, Z. P. Jia, and L. Ju, “An entropy-based distributed ddos detection mechanism in software-defined networking,” in Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, pp.310–317, 2015.
    [8]
    K. S. Sahoo, B. Sahoo, M. Vankayala, et al., “Detection of control layer DDoS attack using entropy metrics in SDN: An empirical investigation,” in Proceedings of the 2017 Ninth International Conference on Advanced Computing (ICoAC), Chennai, India, pp.281–286, 2017.
    [9]
    K. S. Sahoo, M. Tiwary, and B. Sahoo, “Detection of high rate DDoS attack from flash events using information metrics in software defined networks,” in Proceedings of the 2018 10th International Conference on Communication Systems & Networks (COMSNETS), Bengaluru, India, pp.421–424, 2018.
    [10]
    Y. Xiang, K. Li, and W. L. Zhou, “Low-rate DDoS attacks detection and traceback by using new information metrics,” IEEE Transactions on Information Forensics and Security, vol.6, no.2, pp.426–437, 2011. doi: 10.1109/TIFS.2011.2107320
    [11]
    K. Kalkan, L. Altay, G. Gür, et al., “JESS: joint entropy-based DDoS defense scheme in SDN,” IEEE Journal on Selected Areas in Communications, vol.36, no.10, pp.2358–2372, 2018. doi: 10.1109/JSAC.2018.2869997
    [12]
    X. Y. Ming, V. Ramsurrun, and A. Seeam, “Detection and mitigation of DDoS attacks using conditional entropy in software-defined networking,” in Proceedings of the 2019 11th International Conference on Advanced Computing (ICoAC), Chennai, India, pp.66–71, 2019.
    [13]
    L. Wang and Y. Li, “A DDoS attack detection method based on information entropy and deep learning in SDN,” in Proceedings of the 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chongqing, China, pp.1084–1088, 2020.
    [14]
    C. M. Liu, Y. Zhang, Z. H. Li, et al., “Dynamic defense architecture for the security of the Internet of things,” in Proceedings of the 2015 11th International Conference on Computational Intelligence and Security (CIS), Shenzhen, China, pp.390–393, 2015.
    [15]
    K. K. Karmakar, V. Varadharajan, S. Nepal, et al., “SDN-enabled secure IoT architecture,” IEEE Internet of Things Journal, vol.8, no.8, pp.6549–6564, 2021. doi: 10.1109/JIOT.2020.3043740
    [16]
    R. T. Kokila, S. T. Selvi, and K. Govindarajan, “DDoS detection and analysis in SDN-based environment using support vector machine classifier,” in Proceedings of the 2014 Sixth International Conference on Advanced Computing (ICoAC), Chennai, India, pp.205–210, 2014.
    [17]
    J. Ali, B. H. Roh, B. Lee, et al., “A machine learning framework for prevention of software-defined networking controller from DDoS attacks and dimensionality reduction of big data,” in Proceedings of the 2020 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea (South), pp.515–519, 2020.
    [18]
    K. Giotis, M. Apostolaki, and V. Maglaris, “A reputation-based collaborative schema for the mitigation of distributed attacks in SDN domains,” in Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, Istanbul, Turkey, pp.495–501, 2018.
    [19]
    B. Rodrigues, T. Bocek, A. Lareida, et al., “A blockchain-based architecture for collaborative DDoS mitigation with smart contracts,” in Proceedings of the 11th IFIP International Conference on Autonomous Infrastructure, Management and Security, Zurich, Switzerland, pp.16–29, 2017.
    [20]
    Z. A. El Houda, A. S. Hafid, and L. Khoukhi, “Cochain-SC: An intra- and inter-domain DDOS mitigation scheme based on blockchain using SDN and smart contract,” IEEE Access, vol.7, pp.98893–98907, 2019. doi: 10.1109/ACCESS.2019.2930715
    [21]
    K. Giotis, C. Argyropoulos, G. Androulidakis, et al., “Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments,” Computer Networks, vol.62, pp.122–136, 2014. doi: 10.1016/j.bjp.2013.10.014
    [22]
    Mininet, Available at: http://mininet.org./, 2021.
    [23]
    Ryu, Available at: https://osrg.github.io/ryu/, 2021.
    [24]
    “MAWI working group traffic archive,” Available at: http://mawi.wide.ad.jp/mawi/, 2021.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(7)  / Tables(11)

    Article Metrics

    Article views (348) PDF downloads(34) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return