Edge-Based Network Attack Detection Using Apache Pulsar
Total Page:16
File Type:pdf, Size:1020Kb
Volume 5, Issue 8, August – 2020 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Edge Based Network Attack Detection Using Pulsar Sheetal Dash IJISRT20AUG624 www.ijisrt.com 1501 Volume 5, Issue 8, August – 2020 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 ABSTRACT The edge-based network attacks are increasing largely in size, scale and frequency with the booming internet. The Distributed Denial of Service (DDoS) attacks is one of the most diffused types of attacks in the cyberworld which is a great concern for all organizations today. There were 5.2 billion Google searches in the year 2017 alone. Research shows that there cannot be a better example to show how prevalent internet use is nowadays. What started off as a point to point conversation in 1970s as a mode of communication has expanded to millions and millions of devices communicating with each other via some or the other form of the web. And therefore, this research focuses on the strategic approach that has been taken to defend from the growing cyber threat. In this dissertation, the focus is on defending against these edge-based network attacks and collaborating with other neighboring networks in order to communicate with them to transfer information about potentially malicious hosts. This research has focused on exploring ways of integrating the Software Defined Networking with the pub-sub messaging system in order to show a collaborative approach of defense to these attacks. The attacks from unknown multiple sources have also been analyzed in order to cope with them through this robust solution that has been proposed and implemented in this dissertation. IJISRT20AUG624 www.ijisrt.com 1502 Volume 5, Issue 8, August – 2020 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 ACKNOWLEDGEMENT I would take this opportunity to extend a heartfelt thanks to my supervisor, Dr. Sandra-Scott Hayward for providing an opportunity to be a part of this research and guiding throughout the time over completion of this work. Her experience and expertise have been very helpful in supervising my work. She has constantly been a helping hand at all times to my work at Centre for Secure Information Technologies (CSIT), Queen’s University for this research which provides the basis of this article. I am very thankful for the valuable time she has put in to assist me in this research. I would also like to thank my family for their constant support during my academic career and helping provide me with the opportunity to study at Queen’s University. Last but not the least, I would like to thank God for supporting me while I pursued my higher studies and for always being there for me at all times. IJISRT20AUG624 www.ijisrt.com 1503 Volume 5, Issue 8, August – 2020 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Table of Contents Abstract ..................................................................................................................................... 1502 Acknowledgement ..................................................................................................................... 1503 Table of Contents ...................................................................................................................... 1504 List of Figures ........................................................................................................................... 1506 List of Tables ............................................................................................................................. 1507 Chapter 1 Introduction ............................................................................................................... 1508 Goal........................................................................................................................................ 1508 Research Objectives................................................................................................................ 1508 Contribution ........................................................................................................................... 1509 Structure of the Thesis ............................................................................................................ 1509 Chapter 2 Review of Related Work .............................................................................................1511 Introduction ............................................................................................................................ 1511 Mechanisms which uses Devices against the Victim ............................................................... 1511 SDN Mechanisms ................................................................................................................... 1512 Centralized Detection Mechanisms ......................................................................................... 1513 Cross-Layer Approach ............................................................................................................ 1513 Traceability ............................................................................................................................ 1513 Entropy Based Mechanisms .................................................................................................... 1514 Statistical Analysis ................................................................................................................. 1515 Cloud Mechanisms ................................................................................................................. 1515 Summary ................................................................................................................................ 1516 Chapter 3 Aims and Objectives ...................................................................................................1518 Open challenges...................................................................................................................... 1518 Research Tasks ....................................................................................................................... 1518 Summary ................................................................................................................................ 1519 Chapter 4 Design of the Architecture ..........................................................................................1520 Proposed Architectural Model ................................................................................................ 1520 Choice of Tools for this Proposed Mechanism ........................................................................ 1520 Summary ................................................................................................................................ 1521 Chapter 5 Environments and Experiments ...................................................................................1522 Introduction ............................................................................................................................ 1522 Environment Setups ................................................................................................................ 1522 Tools and Analysis ................................................................................................................. 1523 Testbed Layout ................................................................................................................... 1523 Pulsar ................................................................................................................................. 1524 Floodlight Controllers ......................................................................................................... 1525 Mininet Networks/Topology ............................................................................................... 1525 Traffic Monitoring .................................................................................................................. 1527 Bandwidth Usage................................................................................................................ 1527 Packet Speed ...................................................................................................................... 1529 Threshold to Differentiate genuine and Malicious Traffic ....................................................... 1533 Traffic Analysis & Attack Mitigation...................................................................................... 1534 Posting of ACL Rules ......................................................................................................... 1535 ACL Rules Housekeeping ................................................................................................... 1535 Bandwidth Analysis ............................................................................................................ 1536 Packet Speed Analysis ........................................................................................................ 1540 IP Density Analysis ............................................................................................................ 1546 Load Testing ....................................................................................................................... 1546 IJISRT20AUG624 www.ijisrt.com 1504 Volume 5, Issue 8, August – 2020 International Journal of Innovative Science