Citation: | SU Jian and JIANG Mengnan, “A Hybrid Entropy and Blockchain Approach for Network Security Defense in SDN-Based IIoT,” Chinese Journal of Electronics, vol. 32, no. 3, pp. 531-541, 2023, doi: 10.23919/cje.2022.00.103 |
[1] |
D. Evans, “The internet of things: How the next evolution of the internet is changing everything,” Available at: https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf, 2011.
|
[2] |
E. Kaljic, A. Maric, P. Njemcevic, et al., “A survey on data plane flexibility and programmability in software-defined networking,” IEEE Access, vol.7, pp.47804–47840, 2019. doi: 10.1109/ACCESS.2019.2910140
|
[3] |
S. Scott-Hayward, S. Natarajan and S. Sezer, “A survey of security in software defined networks,” IEEE Communications Surveys & Tutorials, vol.18, no.1, pp.623–654, 2016. doi: 10.1109/COMST.2015.2453114
|
[4] |
T. Huang, F. R. Yu, C. Zhang, et al., “A survey on large-scale software defined networking (SDN) testbeds: Approaches and challenges,” IEEE Communications Surveys & Tutorials, vol.19, no.2, pp.891–917, 2017. doi: 10.1109/COMST.2016.2630047
|
[5] |
D. B. Rawat and S. R. Reddy, “Software defined networking architecture, security and energy efficiency: A survey,” IEEE Communications Surveys & Tutorials, vol.19, no.1, pp.325–346, 2017. doi: 10.1109/COMST.2016.2618874
|
[6] |
J. F. Wan, S. L. Tang, Z. G. Shu, et al., “Software-defined industrial internet of things in the context of industry 4.0,” IEEE Sensors Journal, vol.16, no.20, pp.7373–7380, 2016. doi: 10.1109/JSEN.2016.2565621
|
[7] |
R. Wang, Z. P. Jia, and L. Ju, “An entropy-based distributed ddos detection mechanism in software-defined networking,” in Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, pp.310–317, 2015.
|
[8] |
K. S. Sahoo, B. Sahoo, M. Vankayala, et al., “Detection of control layer DDoS attack using entropy metrics in SDN: An empirical investigation,” in Proceedings of the 2017 Ninth International Conference on Advanced Computing (ICoAC), Chennai, India, pp.281–286, 2017.
|
[9] |
K. S. Sahoo, M. Tiwary, and B. Sahoo, “Detection of high rate DDoS attack from flash events using information metrics in software defined networks,” in Proceedings of the 2018 10th International Conference on Communication Systems & Networks (COMSNETS), Bengaluru, India, pp.421–424, 2018.
|
[10] |
Y. Xiang, K. Li, and W. L. Zhou, “Low-rate DDoS attacks detection and traceback by using new information metrics,” IEEE Transactions on Information Forensics and Security, vol.6, no.2, pp.426–437, 2011. doi: 10.1109/TIFS.2011.2107320
|
[11] |
K. Kalkan, L. Altay, G. Gür, et al., “JESS: joint entropy-based DDoS defense scheme in SDN,” IEEE Journal on Selected Areas in Communications, vol.36, no.10, pp.2358–2372, 2018. doi: 10.1109/JSAC.2018.2869997
|
[12] |
X. Y. Ming, V. Ramsurrun, and A. Seeam, “Detection and mitigation of DDoS attacks using conditional entropy in software-defined networking,” in Proceedings of the 2019 11th International Conference on Advanced Computing (ICoAC), Chennai, India, pp.66–71, 2019.
|
[13] |
L. Wang and Y. Li, “A DDoS attack detection method based on information entropy and deep learning in SDN,” in Proceedings of the 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chongqing, China, pp.1084–1088, 2020.
|
[14] |
C. M. Liu, Y. Zhang, Z. H. Li, et al., “Dynamic defense architecture for the security of the Internet of things,” in Proceedings of the 2015 11th International Conference on Computational Intelligence and Security (CIS), Shenzhen, China, pp.390–393, 2015.
|
[15] |
K. K. Karmakar, V. Varadharajan, S. Nepal, et al., “SDN-enabled secure IoT architecture,” IEEE Internet of Things Journal, vol.8, no.8, pp.6549–6564, 2021. doi: 10.1109/JIOT.2020.3043740
|
[16] |
R. T. Kokila, S. T. Selvi, and K. Govindarajan, “DDoS detection and analysis in SDN-based environment using support vector machine classifier,” in Proceedings of the 2014 Sixth International Conference on Advanced Computing (ICoAC), Chennai, India, pp.205–210, 2014.
|
[17] |
J. Ali, B. H. Roh, B. Lee, et al., “A machine learning framework for prevention of software-defined networking controller from DDoS attacks and dimensionality reduction of big data,” in Proceedings of the 2020 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea (South), pp.515–519, 2020.
|
[18] |
K. Giotis, M. Apostolaki, and V. Maglaris, “A reputation-based collaborative schema for the mitigation of distributed attacks in SDN domains,” in Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, Istanbul, Turkey, pp.495–501, 2018.
|
[19] |
B. Rodrigues, T. Bocek, A. Lareida, et al., “A blockchain-based architecture for collaborative DDoS mitigation with smart contracts,” in Proceedings of the 11th IFIP International Conference on Autonomous Infrastructure, Management and Security, Zurich, Switzerland, pp.16–29, 2017.
|
[20] |
Z. A. El Houda, A. S. Hafid, and L. Khoukhi, “Cochain-SC: An intra- and inter-domain DDOS mitigation scheme based on blockchain using SDN and smart contract,” IEEE Access, vol.7, pp.98893–98907, 2019. doi: 10.1109/ACCESS.2019.2930715
|
[21] |
K. Giotis, C. Argyropoulos, G. Androulidakis, et al., “Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments,” Computer Networks, vol.62, pp.122–136, 2014. doi: 10.1016/j.bjp.2013.10.014
|
[22] |
Mininet, Available at: http://mininet.org./, 2021.
|
[23] |
Ryu, Available at: https://osrg.github.io/ryu/, 2021.
|
[24] |
“MAWI working group traffic archive,” Available at: http://mawi.wide.ad.jp/mawi/, 2021.
|