Browse > Article
http://dx.doi.org/10.9728/dcs.2018.19.4.837

Research on DDoS Detection using AI in NFV  

Kim, HyunJin (Department of Computer Engineering, Chungnam National University)
Park, Sangho (JiranSoft Researh Center)
Ryou, JaeCheol (Department of Computer Engineering, Chungnam National University)
Publication Information
Journal of Digital Contents Society / v.19, no.4, 2018 , pp. 837-844 More about this Journal
Abstract
Recently, the cloud technology has made dynamical network changes by enabling the construction of a logical network without building a physical network. Despite recent research on the cloud, it is necessary to study security functions for the identification of fake virtual network functions and the encryption of communication between entities. Because the VNFs are open to subscribers and able to implement service directly, which can make them an attack target. In this paper, we propose a virtual public key infrastructure mechanism that detects a fake VNFs and guarantees data security through mutual authentication between VNFs. To evaluate the virtual PKI, we built a management and orchestration environment to test the performance of authentication and key generation for data security. And we test the detection of a distributed denial of service by using several AI algorithms to enhance the security in NFV.
Keywords
Virtualization; Cloud; DDoS; Lightweight PKI;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Sanjeet Kumar Nayak, Sujata Mohanty and Banshidhar Majhi. "CLB-ECC: Certificateless Blind Signature Using ECC", Journal of Information Processing Systems(JIPS), Vol. 13, pp. 392-397, 2017.
2 Mihir Bellare, Anand Desai, David Pointcheval; Phillip Rogaway, "Lecture Notes in Computer Science", CRYPTO: Annual International Cryptology Conference, Vol. 1462, pp. 26-45, 1998.
3 Ki-Woong Park, Jaesun Han, JaeWoong Chun and Kyu Ho Park, "THEMIS: A mutually Verifiable Billing System for the Cloud Computing Environment", IEEE Transactions on Services Computing, Vol. 6, Issue 3, pp. 300-313, 2013.   DOI
4 Saket Acharya and Namita Tiwari, "Survey Of DDoS Attacks Based On TCP/IP Protocol Vulnerabilities", IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 18, Issue 3, pp. 68-76, 2016.
5 Neha Gupta, Ankur Jain, Pranav Saini and Vaibhav Gupta, "DDoS attack algorithm using ICMP flood", Computing for Sustainable Global Development(INDIACom), pp. 4082-4084, 2016.
6 Dimitrios Moustis and Panayiotis Kotzanikolaou, "Evaluating security controls against HTTP-based DDoS attacks", 4th International Conference on Information Intelligence, Systems and Applications (IISA), 2013.
7 Wei Chen and Dit-Yan Yeung, "Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing", Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006.
8 Nathan Keegan, Soo-Yeon Ji, Aastha Chaudhary, Claude Concolate and Byunggu Yu, "A survey of cloud-based network intrusion detection analysis", Human-centric Computing and Information Sciences, 2016.
9 U. Maulik and S. Bandyopadhyay, "Performance evaluation of some clustering algorithms and validity indices", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 24, Issue 12, pp.1650-1654, 2002.   DOI
10 Sharmila and Mukesh Kumar, "An optimized farthest first clustering algorithm", Nirma University International Conference on Engineering (NUiCONE), 2013.
11 Sin-seok Seo, Young J. Won and James Won-Ki Hong, "Witnessing Distributed Denial-of-Service traffic from an attacker's network", Network and Service Management (CNSM), pp. 241-247, 2011.
12 Won Min Kang, Seo Yeon Moon and Jong Hyuk Park, "An enhanced security framework for home applicances in smart home", Human-centric Computing and Information Sciences(HCIS), 2017.
13 Syed Mujtiba Hussain and Ghulam Rasool Beigh, "Impact of DDoS attack (UDP Flooding) on queuing models", 4th International Conference on Computer and Communication Technology (ICCCT), pp.210-216, 2013.
14 Seema Bandyopadhyay and E. J. Coyle, "An energy efficient hierarchical clustering algorithm for wireless sensor networks", INFOCOM, Vol. 3, pp.1713-1723, 2003.
15 R.Inokuchi and S. Miyamoto, "LVQ clustering and SOM using a kernel function", International Conference on Fuzzy System, Vol. 3, pp.1497-1500, 2004.