• editor.aipublications@gmail.com
  • Track Your Paper
  • Contact Us
  • ISSN: 2456-2319

International Journal Of Electrical, Electronics And Computers(IJEEC)

A Novel Blockchain based Software Defined Network (SDN) Architecture to Curb the Impact of DoS/DDoS

Subhasis Sanyal , Mohit Kumar Barai , Anil Goplani

International Journal of Electrical, Electronics and Computers (IJECC), Vol-6,Issue-5, September - October 2021, Pages 12-24, 10.22161/eec.65.3

Download | Downloads : 7 | Total View : 1109


The proliferation of virtualization or containerization has created a new state of the art in the networking domain; Software Defined Networking (SDN). In the prior state of the art, networking was performed through two abstractions, a "Data plane" and a "Control plane." Whereas in SDN, it's done via a new centralized "Network OS" and a "Virtualization Layer." The "Network OS" runs on servers, observing and controlling the data plane of the "Virtualization Layer." Even though this architecture has given flexibility and agility to new network development and management, but it has created various security vulnerabilities like confidentiality, integrity, availability, etc. Here in this paper, a novel blockchain-based architecture has been proposed to unravel a particular issue, denial of services (DoS). In the proposed state of the art, a novel layered architecture has been considered. From the top, the control plane has been decomposed into a decentralized blockchain layer. A fog layer follows this. Blockchain-based multiple fog nodes or fog servers will be connected to numerous blockchain light nodes inside the fog layer. The user plane will be directly related to the fog layer. Also, here a particular type of intelligent node has been introduced. The proposed state-of-the-art shows more willingness and adaptability to surpass the challenges of vulnerabilities due to DoS and DDoS while maintaining scalability.

Blockchain, Chaos Theory, Control Plane, Fog Server, User Plane, Software-Defined network.

[1] Hu, Q. Hao and K. Bao, "A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation," in IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 2181-2206, Fourthquarter 2014, doi: 10.1109/COMST.2014.2326417.
[2] Abdelouahid Derhab, Mohamed Guerroumi, Mohamed Belaoued, Omar Cheikhrouhou, "BMC-SDN: Blockchain-Based Multicontroller Architecture for Secure Software-Defined Networks", Wireless Communications and Mobile Computing, vol. 2021, Article ID 9984666, 12 pages, 2021. https://doi.org/10.1155/2021/9984666.
[3] J. Soares et al., "Toward a telco cloud environment for service functions," in IEEE Communications Magazine, vol. 53, no. 2, pp. 98-106, Feb. 2015, doi: 10.1109/MCOM.2015.7045397.
[4] X. Zhiqun, C. Duan, H. Zhiyuan and S. Qunying, "Emerging of Telco Cloud," in China Communications, vol. 10, no. 6, pp. 79-85, June 2013, doi: 10.1109/CC.2013.6549261.
[5] 2021, https://www.sdxcentral.com/sdn/definitions/what-is-openflow/.
[6] M. Imran, M. H. Durad, F. A. Khan, and A. Derhab, "Toward an optimal solution against denial of service attacks in software defined networks," Future Generation Computer Systems, vol. 92, pp. 444–453, 2019.
[7] Mishra, Shailendra & Alshehri, Mohammed. (2017). Software Defined Networking: Research Issues, Challenges and Opportunities. Indian Journal of Science and Technology. 10. 1-9. 10.17485/ijst/2017/v10i29/112447.
[8] Raphael Horvath, Dietmar Nedbal, Mark Stieninger,A Literature Review on Challenges and Effects of Software Defined Networking,Procedia Computer Science Volume 64,2015,Pages 552-561,ISSN 18770509,https://doi.org/10.1016/j.procs.2015.08.563(https://www.sciencedirect.com/science/article/pii/S1877050915026988)
[9] arXiv:1905.04649v1 [cs.NI]
[10] Faridullah Amarkhil , Prashansa Taneja, 2020, A Research Paper of Security Enforcement Policy for (SDN) (WLAN) Software Defined Network, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT.) Volume 09, Issue 06 (June 2020)
[11] Papavassiliou, Symeon. 2020. "Software Defined Networking (SDN) and Network Function Virtualization (NFV)" Future Internet 12, no. 1: 7. https://doi.org/10.3390/fi12010007
[12] Bermbach, David & Pallas, Frank & Pérez, David & Plebani, Pierluigi & Anderson, Maya & Kat, Ronen & Tai, Stefan. (2017). A Research Perspective on Fog Computing.
[13] https://www.gartner.com/doc/2963217/rightsizing-data-center-network-
[14] Rahman, Gohar & Chuah, Chai Wen. (2018). Fog Computing, Applications, Security and Challenges, Review. International Journal of Engineering & Technology. 7. 1615. 10.14419/ijet.v7i3.12612.
[15] https://www.a10networks.com/blog/5-most-famous-ddos-attacks/
[16] https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html
[17] Sayeed, S.; Marco-Gisbert, H. Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack. Appl. Sci. 2019, 9, 1788. https://doi.org/10.3390/app9091788 AMA Style
[18] Dokoumetzidis, A., Iliadis, A. & Macheras, P. Nonlinear Dynamics and Chaos Theory: Concepts and Applications Relevant to Pharmacodynamics. Pharm Res 18, 415–42(2001).https://doi.org/10.1023/A:1011083723190
[19] Cetinkaya, A.; Ishii, H.; Hayakawa, T. An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses. Entropy 2019, 21, 210. https://doi.org/10.3390/e21020210
[20] Andria Procopiou, Nikos Komninos, Christos Douligeris, "ForChaos: Real Time Application DDoS Detection Using Forecasting and Chaos Theory in Smart Home IoT Network", Wireless Communications and Mobile Computing, vol. 2019, Article ID 8469410, 14 pages, 2019. https://doi.org/10.1155/2019/8469410
[21] Chen, Jianwen & Duan, Kai & Zhang, Rumin & Zeng, Liaoyuan & Wang, Wenyi. (2018). An AI Based Super Nodes Selection Algorithm in BlockChain Networks.
[22] Chonka, Ashley & Singh, Jaipal & Zhou, Wanlei. (2009). Chaos theory based detection against network mimicking DDoS attacks. Communications Letters, IEEE. 13. 717 - 719. 10.1109/LCOMM.2009.090615.
[23] S. Boukria, M. Guerroumi and I. Romdhani, "BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN," 2019 IEEE Symposium on Computers and Communications (ISCC), 2019, pp. 1034-1039, doi: 10.1109/ISCC47284.2019.8969780.
[24] Wenjuan, LI., Weizhi, M., Zhiqiang, L., & Man-Ho, A. (2020). Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions. IEICE Transactions on Information and Systems, E103.D(2), 196-203. https://doi.org/10.1587/transinf.2019ini0002
[25] Yazdinejad, R. Parizi, A. Dehghantanha, Q. Zhang and K. Choo, "An Energy-Efficient S.D.N. Controller Architecture for IoT Networks With Blockchain-Based Security" in IEEE Transactions on Services Computing, vol. 13, no. 04, pp. 625-638, 2020. doi: 10.1109/T.S.C.2020.2966970 keywords: {blockchain;computer architecture;energy consumption;routing protocols;internet of things;authentication} url: https://doi.ieeecomputersociety.org/10.1109/TSC.2020.2966970
[26] Theviyanthan Krishnamohan, Kugathasan Janarthanan, Peramune PRLC, Ranaweera A.T (2020); BlockFlow: A decentralized SDN controller using Blockchain; International Journal of Scientific and Research Publications (IJSRP) 10(03) (ISSN: 2250-3153), DOI: http://dx.doi.org/10.29322/IJSRP.10.03.2020.p999
[27] C. Tselios, I. Politis and S. Kotsopoulos, "Enhancing SDN security for IoT-related deployments through blockchain," 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2017, pp. 303-308, doi: 10.1109/NFV-SDN.2017.8169860.
[28] K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba,A. Miller, P. Saxena, E. Shi, E. G. Sirer, D. Song, and R. Wattenhofer, "On scaling decentralized blockchains," in Proc. Int. Conf. FinancialCryptogr. Data Secur. Berlin, Germany: Springer, 2016, pp. 106–125.
[29] Fan, Stephen & Ghaemi, Sara & Khazaei, Hamzeh & Musilek, Petr. (2020). Performance Evaluation of Blockchain Systems: A Systematic Survey. IEEE Access. PP. 1-1. 10.1109/ACCESS.2020.3006078.
[30] https://www.f5.com/labs/articles/threat-intelligence/ddos-attack-trends-for-2020
[31] https://www.pwc.com/gx/en/industries/technology/blockchain/blockchain-in-business.html
[32] AUTHOR=Leible Stephan, Schlager Steffen, Schubotz Moritz, Gipp Bela TITLE=A Review on Blockchain Technology and Blockchain Projects Fostering Open Science JOURNAL=Frontiers in Blockchain VOLUME=2 YEAR=2019 PAGES=16 URL=https://www.frontiersin.org/article/10.3389/fbloc.2019.00016 DOI=10.3389/fbloc.2019.00016 ISSN=2624-7852
[33] Makridakis, Spyros & Christodoulou, Klitos. (2019). Blockchain: Current Challenges and Future Prospects/Applications. Future Internet. 11. 258. 10.3390/fi11120258.
[34] https://platformvaluenow.org/signals/problems-with-blockchain/
[35] Meva, Dr. Divyakant. (2018). Issues and Challenges with Blockchain: A Survey. INTERNATIONAL JOURNAL OF COMPUTER SCIENCES AND ENGINEERING. 6. 488-491. 10.26438/ijcse/v6i12.488491.
[36] https://blog.holochain.org/satoshi-nakamoto-and-the-fate-of-our-planet-2/
[37] https://assets.ctfassets.net/sdlntm3tthp6/3h8Kkl1fEkk2KEMKiQQ2eC/d88343ceab28a70b0f121fc9c032b208/holochain__1_.pdf
[38] Sayeed, Sarwar & Marco-Gisbert, Hector. (2019). Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack. Applied Sciences. 9. 1788. 10.3390/app9091788.
[39] Vitalik Buterin. Selfish Mining: A 25% Attack Against the Bitcoin Network. 2013. Available online: https://bitcoinmagazine.com/articles/selfish-mining-a-25-attack-against-the-bitcoin-network/1383578440/
[40] IOTA. What Is IOTA? 2018. Available online: https://www.iota.org/get-started/what-is-iota
[41] Daniel Barta. IOTA: The Currency of Skynet. 2018. Available online: https://hackernoon.com/iota-the currency-of-skynet-281b6abaec5
[42] Bitcoin.com. What Is Bitcoin Double-Spending? 2017. Available online: https://www.bitcoin.com/info/what-is-bitcoin-double-spending
[43] Jon Matonis. The Bitcoin Mining Arms Race: GHash.io and the 51% Issue. 2017. Available online:https://www.coindesk.com/bitcoin-mining-detente-ghash-io-51-issue
[44] Blockchain. Hash Distribution. 2019. Available online: https://www.blockchain.com/pools?timespan=24hours
[45] Alberto Garoffolo, Pier Stabilini, Robert Viglione and Uri Stav. A Penalty System for Delayed Block Submission. 2018. Available online: https://www.horizen.global/assets/files/A-Penalty-System-forDelayed-Block-Submission-by-Horizen.pdf
[46] Bonomi, Flavio (June 4–8, 2011). "Cloud and Fog Computing: Trade-offs and Applications. EON-2011 Workshop, International Symposium on Computer Architecture (ISCA 2011), San Jose, CA, USA". sites.google.com. Retrieved 2019-08-07.
[47] Janakiram, MSV (18 April 2016). "Is Fog Computing the Next Big Thing in the Internet of Things". Forbes Magazine. Retrieved 18 April 2016.
[48] Brogi, Antonio; Forti, Stefano (2017). "QoS-aware Deployment of IoT Applications Through the Fog" (PDF). IEEE Internet of Things Journal. PP (99): 1185–1192. doi:10.1109/JIOT.2017.2701408. ISSN 2327-4662. S2CID 2880664.
[49] Nikoloudakis, Y.; Panagiotakis, S.; Markakis, E.; Pallis, E.; Mastorakis, G.; Mavromoustakis, C. X.; Dobre, C. (November 2016). "A Fog-Based Emergency System for Smart Enhanced Living Environments". IEEE Cloud Computing. 3 (6): 54–62. doi:10.1109/mcc.2016.118. ISSN 2325-6095. S2CID 25475572
[50] Sarkar, S.; Chatterjee, S.; Misra, S. (2018). "Assessment of the Suitability of Fog Computing in the Context of Internet of Things". IEEE Transactions on Cloud Computing. 6 (1): 46–59. doi:10.1109/TCC.2015.2485206. ISSN 2168-7161. S2CID 3823420.
[51] https://en.wikipedia.org/wiki/Fog_computing