Synopsis Junaid V2.2
Synopsis Junaid V2.2
Synopsis Junaid V2.2
SUPERVISORY COMMITTEE
i) Supervisor ________________
Dr. Syed Mushhad Mustuzhar Gilani
Director,
University Institute of Information Technology
Director,
Advanced Studies
Pir Mehr Ali Shah
SCRUTINY COMMITTEE
i) Convener ________________
Dr. Muhammad Razzaq Athar
Director,
University Institute of Information Technology
ABSTRACT
separates the data plane and control plane from the devices. In easy words, it takes
the decision power from routing devices and gives it to a device called SDN
techniques. Cyber Security is a very trendy topic because of the diversity of the
attacking techniques. Cyber Security started from very beginning of the networks
because there was a greed and negative thoughts and people from the very
beginning of the world. There are different type of attacks that are performed to
gain the unauthorized access or to steal the important data to use it for personal
uses. Famous cyber-attacks are DDOS, ARP spoofing, and Injection attacks. Most
of the attacks are performed on the industrial networks because industrial networks
has more sophisticated data than a personal network that is why this research
very large-scale damage in terms of data or money because industrial data has a
high number of dependents on them. For this reason, this research work is focused
on proposing a new strategy for the DDOS attack and ARP spoofing attack. This
strategy will be implemented using any distributed SDN controller because the
centralized controllers are not successful in industrial use cases. The evaluation of
the proposed strategy will be performed using some SDN simulation tool.
1
INTRODUCTION
Software Defined Networking (SDN) is a comparatively novel technique in
the world of networking. This approach separated the control plane and data plane,
in other words it took decision power from the networking devices and provides a
programmable interface to the users. Formal definition of SDN is “SDN derives its
importance from separating the control plane from the data plane, which facilitates
(Anbarsu, Rayan, & Vetrian, 2020). The control plane controls the transfer of the
data and implements some important networking mechanisms like flow control,
load balancing, Intrusion detection/prevention and firewalls in simple words all the
decision making is done here at control plane (Karakus & Durresi, 2017). The
project (Casado, McKeown, & Shenker, 2019) and may have distributed controllers
like Open Networking Operating System (Berde et al., 2014). This helps to
device one by one. Its programmable interface provides the researchers and the
network engineers to innovate the network configuration whenever they need, this
Every network and device connected to network may have many security
example being data loss, hardware loss, or some type of ransomware attack. These
2
against unauthorized access or attack.” (Bullock, Haddow, & Coppola, 2013). This
field is as old as the networks are because evil minded people always had tendency
to steal the information or harm the system through some malicious programs.
There is a need to have some security mechanism against these attacks. Those
mechanisms are known as cyber security. Similar to other networks SDN is also
vulnerable to the attacks, its programmable interface is used to not only implement
alarming situation for security. The latest tools for attacks performs a lot of things
automatically that’s why any person with very less and in some cases without any
knowledge of networks and security can initiate and may be perform a successful
attack, to avoid such type of situation security techniques are needed to be evolved
time to time in this context this project will propose the cyber security strategy for
industry.
network (Sahay, Meng, & Jensen, 2019) and there is a need of evolving the
configurations very frequently and SDN provides the facility to evolve the
configurations very easily. The industrial networks are facing severe cyber-attacks
very frequently as they have very highly confidential data, thus it is a need to
enhance cyber security techniques and incorporate SDN-based cyber security rules
3
The scope of this research is limited to two attacks DDOS attacks and ARP
spoofing attacks, these attacks will be mitigated using SDN platform as DDOS and
ARP spoofing attacks are most common attacks in industry (Correa Chica,
Problem Statement
In Industrial networks the most it is been noted that the DDOS and ARP
spoofing attacks are still very successful because current mitigating techniques lags
in terms of latency and accuracy. For this reason, a new strategy for mitigation of
Objectives
Outcomes
The proposed strategy is to filter the malicious packets, so the expected outcome is
the malicious packets will be filtered and the industrial network will remain secure
4
REVIEW OF LITERATURE
and proposed a successful approach to mitigate the ARP spoofing attacks but the
proposed approach used centralized controller, in case for some reasons controller
goes down whole network will go down. This problem can be solved by using
Babiceanu & Seker (2019) proposed cyber resilience technique to mitigate the
DDOS attack. The system shows some flexibility in case the number of input
packets is being increased by the server capacity and some virtual servers are
created to respond the packets but this approach has very low accuracy due to
imbalance dataset the results can be improved by using new and updated datasets
Girdler & Vassilakis (2021) proposed an ARP spoofing attack technique; this
technique matches the MAC addresses of ARP packet and Ethernet packet in
which ARP packet was encapsulated. This technique has very great accuracy rate
but it can be improved if current ARP table is also checked that if the entry or the
Tuan et al. (2020) proposed a DDOS mitigation technique and used KNN
really helped in improving the latency but the dataset used was very old the
Badotra & Panda, (2021) also proposed DDOS attack mitigation technique
they used SVM for the classification purposes and have been successful in
5
mitigating the DDOS attack. Their technique got a good accuracy score but there
approach was very slow and creates the high latency that is problematic in
industrial networks the problem can be solved by changing the SVM approach with
they checked the current ARP table that whether the IP or MAC address from
incoming ARP packet already exists or not. If any of IP or MAC address exist then
the packet is dropped. Although this is very good technique, but this can be
improved if they also check the MAC addresses of the incoming ARP packet and
Gadze et al. (2021) did an investigation over different Machine Learning and
dataset and then applied Naïve Bayes, KNN, SVM, ANN, CNN and RNN, and
have compared the obtained results from all of these approaches. The end results
are CNN outperformed every other approach and gave best latency and quickest
Tan et al. (2020) proposed a security framework for detection and mitigation
applying KNN algorithm for classification; this helped them to scrutinize the
useless data and improve the accuracy level to 98.8% but their approach also
affected the latency very badly. The latency has been increased with a huge
difference.
6
The proposed strategy will use machine-learning approach to mitigate the
DDOS attack for that a latest dataset will be chosen because with the passage of
time the size of traffic is getting increased very rapidly and the DDOS attack is
directly linked with the size of traffic. That is why the choice of dataset also
matters a lot, then a model will be trained on that after training it will be tested if
the results are satisfactory then it will be deployed in the SDN controller. In case of
ARP attacks there will be two rules that will be added to the controller
1. If the MAC addresses of ARP and Ethernet packet that was encapsulating
ARP packet matches then the packet will be passed otherwise it will be
dropped
2. If any of the IP or MAC address from ARP packet is already exist in ARP
SDN controllers like ONOS (Berde et al., 2014), ONIX (Koponen et al., 2019) or
controllers will be integrated with Mininet simulator or NS3 simulator for the
perform the successful DDOS and attack to assess the capacity of server. This will
help to how much load the server can bear, because it is needed to make sure that
in case of any delay in attack detection server must not go down. So, the mitigation
technique will be devised in such a way that it will not only detect the attack but
also mitigate it before server or network goes down. The common problem in many
DDOS mitigation techniques is the delay in attack detection, The attack detection
takes time because the network traffic is imbalance because the major part of
7
network traffic is legitimate and very small part of traffic is malicious secondly in
case of ICMP flooding the traffic is not malicious. Similarly, in case of ARP
spoofing attacks first successful attack will be performed and then a mitigation
strategy will be devised. ARP spoofing attacks are comparatively easy to detect.
controller, then the controller can be connected to any industrial infrastructure like
in education industry during admission and result time the servers are very
vulnerable to DDOS attack and the network is all time vulnerable to ARP spoofing
attack for intrusion in the network of different purposes similarly the networks in
the state owned institutions are all time vulnerable to both DDOS and ARP
spoofing attacks for example NADRA database server can be attacked for different
8
reason like data breach or to create problems for the public facilities. The bank
servers and networks are also all time vulnerable to attack because their attacker
will get the money access and can alter bank account details. This is why this
research is focused proposing a new strategy for mitigating the DDOS attack and
prevent the ARP spoofing attack. Using SDN controller, to deploy the proposed
strategy the network will be migrated from traditional to SDN. The detailed is
LITERATURE CITED
9
Anbarsu, S., Rayan, A. X. A., & Vetrian, V. (2020). Software-Defined Networking
for the Internet of Things: Securing home networks using SDN. In Real-Time
https://doi.org/10.1016/b978-0-12-818014-3.00010-3
Babiceanu, R. F., & Seker, R. (2019). Cyber resilience protection for industrial
Badotra, S., & Panda, S. N. (2021). SNORT based early DDoS detection system
Berde, P., Gerola, M., Hart, J., Higuchi, Y., Kobayashi, M., Koide, T., Parulkar, G.
Bullock, J. A., Haddow, G. D., & Coppola, D. P. (2013). Cybersecurity and Critical
Elsevier. https://doi.org/10.1016/b978-0-12-415802-3.00008-7
Casado, M., McKeown, N., & Shenker, S. (2019). From ethane to SDN and
Correa Chica, J. C., Imbachi, J. C., & Botero Vega, J. F. (2020). Security in SDN:
10
Learning in the Detection and Mitigation of DDOS Attack on SDN
Karakus, M., & Durresi, A. (2017). A survey: Control plane scalability issues and
Koponen, T., Casado, M., Gude, N., Stribling, J., Poutievski, L., Zhu, M., Shenker,
Medved, J., Varga, R., Tkacik, A., & Gray, K. (2014). OpenDaylight: Towards a
https://doi.org/10.1109/WoWMoM.2014.6918985
Sahay, R., Meng, W., Estay, D. A. S., Jensen, C. D., & Barfod, M. B. (2019).
736–750. https://doi.org/10.1016/j.future.2019.05.049
Sahay, R., Meng, W., & Jensen, C. D. (2019). The application of Software Defined
11
and Computer Applications, 131, 89–108.
Tan, L., Pan, Y., Wu, J., Zhou, J., Jiang, H., & Deng, Y. (2020). A New
https://doi.org/10.1109/ACCESS.2020.3021435
Tchendji, V. K., Mvah, F., Djamegni, C. T., & Yankam, Y. F. (2021). E2BaSeP:
https://doi.org/10.1007/s41635-020-00105-x
Tuan, N. N., Hung, P. H., Nghia, N. D., Tho, N. Van, Phan, T. Van, & Thanh, N.
12