DPI traffic classification technologies in SDN networks: a survey

Authors

DOI:

https://doi.org/10.18372/2073-4751.74.17881

Keywords:

software-defined networks (SDN), traffic classification, SDN vulnerability, cybercrime, DPI technology, QoS

Abstract

The work considers the prerequisites for the emergence of software-defined SDN networks, which are in great demand today.

The purpose of the work is to review the technology of building SDN networks and recognizing types of traffic based on SDN technology. Analyze existing solutions in the field of recognition of encrypted traffic, which is the most popular in modern networks. Compare recognition algorithms, their speed of operation and recognition accuracy. Explore vulnerabilities and potential solutions in SDN security.

The authors suggested further research into ways of using DPI technology in software-configured networks in order to improve the efficiency of using existing communication channels.

The results of a comparison of traffic recognition systems and their vulnerabilities in comparison with classic networks are presented.

References

Kreutz D., Ramos F., Veríssimo P., Esteve Rothenberg C., Azodolmolky S., Uhlig S. Software-Defined Networking: A Comprehensive Survey. 2014. 61 p.

Hakiri A., Gokhale A., Berthou P., Schmidt D., Gayraud T. Software-Defined Networking: Challenges and research opportunities for Future Internet. Computer Networks. 2014. V. 74. P. 453–471.

Thomas D. Nadeau, Ken Gray. Software defined networks. O’Reilly Media, 2013. 384 p.

SDN: A Definition. URL: https://sdn.systemsapproach.org/intro.html#sdn-a-definition

Mendiola Alaitz, Astorga Jasone, Jacob Eduardo, Higuero Marivi. A Survey on the Contributions of Software-Defined Networking to Traffic Engineering. IEEE Communications Surveys & Tutorials. 2017. V. 19, Iss. 2. P. 918–953.

Deri Luca, Martinelli Maurizio, Bujlow Tomasz, Cardigliano Alfredo. NDPI: Open-source high-speed deep packet inspection. 2014 International Wireless Communications and Mobile Computing Conference (IWCMC) / Nicosia, Cyprus, 2014. P. 617–622.

Bujlow Tomasz, Carela-Español Valentín, Barlet-Ros Pere. Independent comparison of popular DPI tools for traffic classification. Computer Networks. 2015. V. 76. P. 75-89.

Alhaj Ali, Dutta Nitul. Analysis of Security Attacks in SDN Network: A Comprehensive Survey. Contemporary Issues in Communication, Cloud and Big Data Analytics. Lecture Notes in Networks and Systems. 2022. V. 281. P. 27–37.

Lubna Fayez Eliyan, Roberto Di Pietro. DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges. Future Generation Computer Systems. 2021. V. 122. P. 149–171.

Agrawal N., Tapaswi S. An SDN-Assisted Defense Mechanism for the Shrew DDoS Attack in a Cloud Computing Environment. Journal of Network and Systems Management. 2021. V. 29, Iss.2. 12.

Dover Jeremy M. A denial of service attack against the Open Floodlight SDN controller. Research report. 2013. 8 p.

Feghali A., Kilany R., Chamoun M. SDN security problems and solutions analysis. 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS) / Paris, France, 2015. P. 1–5.

Cho Shinyoung, et al. BGP hijacking classification. 2019 Network Traffic Measurement and Analysis Conference (TMA) / Paris, France, 2019. P. 25-32.

Trabelsi Zouheir. Switch's CAM table poisoning attack: hands-on lab exercises for network security education. Proceedings of the Fourteenth Australasian Computing Education Conference. 2012. V. 123. P. 113–120.

Elsayed Mahmoud Said, et al. Ddosnet: A deep-learning model for detecting network attacks. 2020 IEEE 21st International Symposium on" A World of Wireless, Mobile and Multimedia Networks"(WoWMoM) / Cork, Ireland, 2020. P. 391–396.

Published

2023-06-30

Issue

Section

Статті