DPI traffic classification technologies in SDN networks: a survey
DOI:
https://doi.org/10.18372/2073-4751.74.17881Keywords:
software-defined networks (SDN), traffic classification, SDN vulnerability, cybercrime, DPI technology, QoSAbstract
The work considers the prerequisites for the emergence of software-defined SDN networks, which are in great demand today.
The purpose of the work is to review the technology of building SDN networks and recognizing types of traffic based on SDN technology. Analyze existing solutions in the field of recognition of encrypted traffic, which is the most popular in modern networks. Compare recognition algorithms, their speed of operation and recognition accuracy. Explore vulnerabilities and potential solutions in SDN security.
The authors suggested further research into ways of using DPI technology in software-configured networks in order to improve the efficiency of using existing communication channels.
The results of a comparison of traffic recognition systems and their vulnerabilities in comparison with classic networks are presented.
References
Kreutz D., Ramos F., Veríssimo P., Esteve Rothenberg C., Azodolmolky S., Uhlig S. Software-Defined Networking: A Comprehensive Survey. 2014. 61 p.
Hakiri A., Gokhale A., Berthou P., Schmidt D., Gayraud T. Software-Defined Networking: Challenges and research opportunities for Future Internet. Computer Networks. 2014. V. 74. P. 453–471.
Thomas D. Nadeau, Ken Gray. Software defined networks. O’Reilly Media, 2013. 384 p.
SDN: A Definition. URL: https://sdn.systemsapproach.org/intro.html#sdn-a-definition
Mendiola Alaitz, Astorga Jasone, Jacob Eduardo, Higuero Marivi. A Survey on the Contributions of Software-Defined Networking to Traffic Engineering. IEEE Communications Surveys & Tutorials. 2017. V. 19, Iss. 2. P. 918–953.
Deri Luca, Martinelli Maurizio, Bujlow Tomasz, Cardigliano Alfredo. NDPI: Open-source high-speed deep packet inspection. 2014 International Wireless Communications and Mobile Computing Conference (IWCMC) / Nicosia, Cyprus, 2014. P. 617–622.
Bujlow Tomasz, Carela-Español Valentín, Barlet-Ros Pere. Independent comparison of popular DPI tools for traffic classification. Computer Networks. 2015. V. 76. P. 75-89.
Alhaj Ali, Dutta Nitul. Analysis of Security Attacks in SDN Network: A Comprehensive Survey. Contemporary Issues in Communication, Cloud and Big Data Analytics. Lecture Notes in Networks and Systems. 2022. V. 281. P. 27–37.
Lubna Fayez Eliyan, Roberto Di Pietro. DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges. Future Generation Computer Systems. 2021. V. 122. P. 149–171.
Agrawal N., Tapaswi S. An SDN-Assisted Defense Mechanism for the Shrew DDoS Attack in a Cloud Computing Environment. Journal of Network and Systems Management. 2021. V. 29, Iss.2. 12.
Dover Jeremy M. A denial of service attack against the Open Floodlight SDN controller. Research report. 2013. 8 p.
Feghali A., Kilany R., Chamoun M. SDN security problems and solutions analysis. 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS) / Paris, France, 2015. P. 1–5.
Cho Shinyoung, et al. BGP hijacking classification. 2019 Network Traffic Measurement and Analysis Conference (TMA) / Paris, France, 2019. P. 25-32.
Trabelsi Zouheir. Switch's CAM table poisoning attack: hands-on lab exercises for network security education. Proceedings of the Fourteenth Australasian Computing Education Conference. 2012. V. 123. P. 113–120.
Elsayed Mahmoud Said, et al. Ddosnet: A deep-learning model for detecting network attacks. 2020 IEEE 21st International Symposium on" A World of Wireless, Mobile and Multimedia Networks"(WoWMoM) / Cork, Ireland, 2020. P. 391–396.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal adheres to the principles of Open Access and provides free, immediate, and permanent access to all published materials without financial, technical, or legal barriers for readers.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.