Figure 7: Time to process in experiment C.
NFV and microservices. That was due to the fact that
the call to the classifier occurs through POST/HTTP.
For that, we used a Python library called requests, to
make the request, while on the server side we used
FLask, which is a web framework written in Python
and based on the WSGI library. When making calls to
the classifier endpoint in an uninterrupted sequential
manner with each flow that reaches the controller, the
API requests collapses and stops working. That is, it
is as if the DDoS attack was also affecting requests
library. Thus, in order to carry out the experiment, it
was necessary to classify only a few samples of flows.
The experiments have proved to be effective in de-
tecting UDP Flood DDoS attacks, using booth fuzzy
c-means and k-means algorithms. We obtained sat-
isfactory results for all the metrics studied: precision,
recall, f1-score, support, accuracy and execution time.
As future work, we intend to research datasets cre-
ated from SDN/NFV environments and use them for
cross-validation of the proposed approach, since in
this work we use synthetic dataset and traffic. Also,
we intend to research how to use real traffic in a sim-
ulated network or to use a real controlled network for
validation and testing. As also, research on different
machine learning libraries to compare them. Besides
that, use another strategy of extracting statistics to be
compared with the one explored in this work, in order
to analyze its overall performances in architecture. As
a chosen strategy, the POX component web.webcore
could be used together with the webservice module
from openflow.webservice, which exposes some in-
formation between them and the flow statistics. In
addition, there is the possibility of using some cache
solution that stores the flows that reach the POX Con-
troller, in order to solve the problem found in the re-
quests library. Furthermore, it could be analyzed the
advantages and disadvantages of this scenario with
caching, since traffic analysis will not take place on-
line.
REFERENCES
Bawany, N. Z., Shamsi, J. A., and Salah, K. (2017). Ddos
attack detection and mitigation using sdn: methods,
practices, and solutions. Arabian Journal for Science
and Engineering, 42(2):425–441.
Bhushan, K. and Gupta, B. B. (2019). Distributed denial
of service (ddos) attack mitigation in software defined
network (sdn)-based cloud computing environment.
Journal of Ambient Intelligence and Humanized Com-
puting, 10(5):1985–1997.
Bonfim, M. S., Dias, K. L., and Fernandes, S. F. (2019). In-
tegrated nfv/sdn architectures: A systematic literature
review. ACM Computing Surveys (CSUR), 51(6):1–
39.
Dias, M. L. D. (2019). fuzzy-c-means: An implementation
of fuzzy c-means clustering algorithm.
Dragoni, N., Giallorenzo, S., Lafuente, A. L., Mazzara,
M., Montesi, F., Mustafin, R., and Safina, L. (2017).
Microservices: yesterday, today, and tomorrow. In
Present and ulterior software engineering, pages 195–
216. Springer.
Duy, P. T., Pham, V.-H., et al. (2018). A role-based statisti-
cal mechanism for ddos attack detection in sdn. pages
177–182.
Esch, J. (2014). Prolog to,” software-defined networking:
a comprehensive survey”. Proceedings of the IEEE,
103(1):10–13.
ETSI, N. (2017). Network functions virtualisation (nfv);
network operator perspectives on nfv priorities for 5g.
Kaur, S., Singh, J., and Ghumman, N. S. (2014). Net-
work programmability using pox controller. In Inter-
national Conference on Communication, Computing
& Systems (ICCCN’2014), pages 134–138.
Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothen-
berg, C. E., Azodolmolky, S., and Uhlig, S. (2014).
Software-defined networking: A comprehensive sur-
vey. Proceedings of the IEEE, 103(1):14–76.
Kumari, R., Singh, M., Jha, R., Singh, N., et al. (2016).
Anomaly detection in network traffic using k-mean
clustering. In 2016 3rd International Conference on
Recent Advances in Information Technology (RAIT),
pages 387–393. IEEE.
L. Dali, A. Bentajer, E. A. K. A. H. E. E. F. B. A.
(2015). A survey of intrusion detection system. In
2nd world symposium on web applications and net-
working (WSWAN), pages 1–6.
Mahjabin, T., Xiao, Y., Sun, G., and Jiang, W. (2017). A
survey of distributed denial-of-service attack, preven-
tion, and mitigation techniques. International Journal
of Distributed Sensor Networks, 13(12).
McKeown, N., Anderson, T., Balakrishnan, H., Parulkar,
G., Peterson, L., Rexford, J., Shenker, S., and Turner,
J. (2008). Openflow: enabling innovation in campus
networks. ACM SIGCOMM Computer Communica-
tion Review, 38(2):69–74.
Ming-Chuan, H. and Don-Lin, Y. (2001). An efficient
fuzzy c-means clustering algorithm. In Proceedings
of IEEE International Conference on Data Mining,
ICDM-2001, pages 225–232.
Comparative Analysis between the k-means and Fuzzy c-means Algorithms to Detect UDP Flood DDoS Attack on a SDN/NFV
Environment
111