Skip to main content

Detection and Mitigation of Spoofing Attacks by Using SDN in LAN

  • Conference paper
  • First Online:
Proceedings of Sixth International Conference on Soft Computing for Problem Solving

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 547))

Abstract

Software Defined Networking (SDN) is defined as a solution for security, reliability and flexibility problems in traditional networks. It decouples the data plane and control plane. SDN is a programmable approach of networking. In this technology network can be controlled by a program. The key characteristic of Software Defined Networking is that it proposes the separation of the data plane and the control plane, this control is given to a centralize controller and Open data devices are used for data forwarding. These devices can act either as switch, hub or as any other network device it depends upon the application. Those applications also can be attack mitigation applications. In our proposed work we develop an IP spoofing attack mitigation application. That application can detect and mitigate the IP spoofing attack in SDN in LAN. Here, we will use POX controller so have to develop program in python language. The emulation tool Mininet is used for experiment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mendon, M., Nunes, B., Nguyen, X.N., Obraczka, K.: A survey of software-defined networking: past, present and future of programming networks, p. 18. IEEE (2015)

    Google Scholar 

  2. Nick, F., Rexford, J., Zegura, E.: The road to SDN: an intellectual history of programmable network, p. 13 (2014)

    Google Scholar 

  3. Li, X., Yuan, D., Hu, H., Ran, J., Li, S.: DDs detection in SDN switches using support vector machine classifier. In: JIMET (2015)

    Google Scholar 

  4. Vizvary, M.: Mitigation of DDoS Attacks in Software Defined Networks (2015)

    Google Scholar 

  5. Shu, Z., Wan, J., Li, D., Vasilakos, A.V.: Imran, M: Security in software-defined networking: threats and countermeasures. Mob. Netw. Appl. 21(5), 764–776 (2016)

    Article  Google Scholar 

  6. Hande, Y.H, Kadhu, T, Hublikar, S, Kulkarni, S, Kasirsagar, A: DDos attacks in SDN networks. Int. Eng. Res. J. 2015

    Google Scholar 

  7. Open networking foundation SDN Architecture version 1.0., POX (2013). http://www.noxrepo.org/pox/about-pox/

  8. Open networking foundation. www.mininet.org

Download references

Acknowledgement

The author would like to thank Mr. Vipin Gupta for valuable help. This work is supported by U-net solution, Moga.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amandeep Kaur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Kaur, A., Bhandari, A. (2017). Detection and Mitigation of Spoofing Attacks by Using SDN in LAN. In: Deep, K., et al. Proceedings of Sixth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 547. Springer, Singapore. https://doi.org/10.1007/978-981-10-3325-4_24

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3325-4_24

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3324-7

  • Online ISBN: 978-981-10-3325-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics