Low-rate flow table overflow attack defense system based on two-level threshold in software-defined networks
Software-defined networks (SDN) separate traffic management and packet forwarding, allowing for network programmability. SDN has grown more vulnerable to network attacks as a result of its growing use in many facets of social production. Low-rate flow table overflow is a form of attack that targets...
Saved in:
Published in | Expert systems with applications Vol. 293; p. 128685 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Ltd
01.12.2025
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Software-defined networks (SDN) separate traffic management and packet forwarding, allowing for network programmability. SDN has grown more vulnerable to network attacks as a result of its growing use in many facets of social production. Low-rate flow table overflow is a form of attack that targets SDN networks. A significant quantity of flow entries are put in the flow table as a result of sending fake malicious packets to the switch flow table. We provide a two-level threshold (DMS-BTT) based protection solution to counter this threat. DMS-BTT employs the Catboost method to detect LFTO attacks and identify malicious flows by extracting properties from the flow table and flow rules. The system sets two levels of thresholds for flow table utilization depending on the urgency of the flow table subject to LFTO attacks, corresponding to the malicious flow eviction mode and the flow table overflow prevention mode of the attack mitigation module. Finally, we conducted comprehensive experiments to verify that DMS-BTT can effectively mitigate LFTO attacks with low system overhead and limit the proportion of attack flows in total traffic to less than 10 %. |
---|---|
AbstractList | Software-defined networks (SDN) separate traffic management and packet forwarding, allowing for network programmability. SDN has grown more vulnerable to network attacks as a result of its growing use in many facets of social production. Low-rate flow table overflow is a form of attack that targets SDN networks. A significant quantity of flow entries are put in the flow table as a result of sending fake malicious packets to the switch flow table. We provide a two-level threshold (DMS-BTT) based protection solution to counter this threat. DMS-BTT employs the Catboost method to detect LFTO attacks and identify malicious flows by extracting properties from the flow table and flow rules. The system sets two levels of thresholds for flow table utilization depending on the urgency of the flow table subject to LFTO attacks, corresponding to the malicious flow eviction mode and the flow table overflow prevention mode of the attack mitigation module. Finally, we conducted comprehensive experiments to verify that DMS-BTT can effectively mitigate LFTO attacks with low system overhead and limit the proportion of attack flows in total traffic to less than 10 %. |
ArticleNumber | 128685 |
Author | Zhang, Dongshuo Zuo, Chenguang Li, Xinmeng Tang, Dan Qin, Zheng Tan, Pei |
Author_xml | – sequence: 1 givenname: Dan surname: Tang fullname: Tang, Dan email: Dtang@hnu.edu.cn organization: College of Computer Science and Electronic Engineering (CSEE), Hunan University (HNU), Changsha, 410082, China – sequence: 2 givenname: Chenguang orcidid: 0009-0005-6133-6733 surname: Zuo fullname: Zuo, Chenguang email: chenguangzuo@hnu.edu.cn organization: College of Computer Science and Electronic Engineering (CSEE), Hunan University (HNU), Changsha, 410082, China – sequence: 3 givenname: Xinmeng surname: Li fullname: Li, Xinmeng email: lixinmeng@hnu.edu.cn organization: College of Computer Science and Electronic Engineering (CSEE), Hunan University (HNU), Changsha, 410082, China – sequence: 4 givenname: Pei surname: Tan fullname: Tan, Pei email: tanpei@hnu.edu.cn organization: College of Computer Science and Electronic Engineering (CSEE), Hunan University (HNU), Changsha, 410082, China – sequence: 5 givenname: Dongshuo surname: Zhang fullname: Zhang, Dongshuo email: zhangdongshuo@hnu.edu.cn organization: College of Computer Science and Electronic Engineering (CSEE), Hunan University (HNU), Changsha, 410082, China – sequence: 6 givenname: Zheng surname: Qin fullname: Qin, Zheng email: zqin@hnu.edu.cn organization: College of Computer Science and Electronic Engineering (CSEE), Hunan University (HNU), Changsha, 410082, China |
BookMark | eNp9kMtqwzAQRbVIoUnaH-hKP2B3JFuyAt2U0BcEumnXQpZHxIkjFUnE5O_rNF1ndRm4Z7icBZn54JGQBwYlAyYfdyWm0ZQcuCgZV1KJGZnDSjRFzZr6lixS2gGwBqCZk2ETxiKajNQNYaTZtAPScMT4d5qcjd3TDh36hDSdUsYDbU3CjgZP8xiKAY840LyNmLZh6GjvaQoujyZiMXG9n6oep2bcpzty48yQ8P4_l-T79eVr_V5sPt8-1s-bwnJR5cJJbq2sBdS2ax2wVgFHA0pxEHYlHLrKKSN4hQZXClvnqkZJlKJiNTiJ1ZLwy18bQ0oRnf6J_cHEk2agz470Tp8d6bMjfXE0QU8XCKdlxx6jTrZHb7HrI9qsu9Bfw38B_qB2pw |
Cites_doi | 10.1016/j.jnca.2024.103838 10.1109/TSC.2021.3102046 10.1007/s40860-022-00171-8 10.1109/TDSC.2021.3131531 10.1145/3556973 10.1109/TSC.2023.3266757 10.1109/TSC.2023.3325636 10.1016/j.comnet.2022.108802 10.1016/j.comnet.2024.110203 10.1016/j.comnet.2020.107223 10.1109/TDSC.2024.3522104 10.1109/TNSE.2023.3297650 10.1109/TNSE.2023.3236147 10.1109/JSAC.2021.3126053 10.3390/fi12090147 10.1109/TC.2025.3541143 10.1109/TSC.2024.3489437 10.1109/TNET.2018.2819507 10.1109/TNET.2022.3225211 10.1109/TSC.2016.2602861 10.1109/ACCESS.2020.2999668 10.1145/3704434 10.1109/TIFS.2023.3275768 |
ContentType | Journal Article |
Copyright | 2025 Elsevier Ltd |
Copyright_xml | – notice: 2025 Elsevier Ltd |
DBID | AAYXX CITATION |
DOI | 10.1016/j.eswa.2025.128685 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
ExternalDocumentID | 10_1016_j_eswa_2025_128685 S0957417425023036 |
GroupedDBID | --K --M .DC .~1 0R~ 13V 1B1 1RT 1~. 1~5 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN 9JO AAAKF AABNK AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AARIN AATTM AAXKI AAXUO AAYFN AAYWO ABBOA ABFNM ABJNI ABMAC ABMVD ABUCO ACDAQ ACGFS ACHRH ACNTT ACRLP ACVFH ACZNC ADBBV ADCNI ADEZE ADTZH AEBSH AECPX AEIPS AEKER AENEX AEUPX AFJKZ AFPUW AFTJW AGCQF AGHFR AGUBO AGUMN AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIGII AIIUN AIKHN AITUG AKBMS AKRWK AKYEP ALEQD ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOUOD APLSM APXCP AXJTR BJAXD BKOJK BLXMC BNSAS CS3 DU5 EBS EFJIC EFKBS EO8 EO9 EP2 EP3 F5P FDB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HAMUX IHE J1W JJJVA KOM MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 ROL RPZ SDF SDG SDP SDS SES SEW SPC SPCBC SSB SSD SSL SST SSV SSZ T5K TN5 ~G- 29G AAAKG AAQXK AAYXX ABKBG ABWVN ABXDB ACNNM ACRPL ADJOM ADMUD ADNMO AGQPQ ASPBG AVWKF AZFZN CITATION EJD FEDTE FGOYB G-2 HLZ HVGLF HZ~ LG9 LY1 LY7 M41 R2- RIG SBC SET WUQ XPP ZMT |
ID | FETCH-LOGICAL-c253t-f62cc64504cdbf01b802ea088205c95fef3f8a523eae98ebff3786e653140f6e3 |
IEDL.DBID | .~1 |
ISSN | 0957-4174 |
IngestDate | Thu Aug 14 00:21:22 EDT 2025 Sat Aug 30 17:13:15 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Overflow attack Attack detection and mitigation Flow table Two-level threshold Software defined network |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c253t-f62cc64504cdbf01b802ea088205c95fef3f8a523eae98ebff3786e653140f6e3 |
ORCID | 0009-0005-6133-6733 |
ParticipantIDs | crossref_primary_10_1016_j_eswa_2025_128685 elsevier_sciencedirect_doi_10_1016_j_eswa_2025_128685 |
PublicationCentury | 2000 |
PublicationDate | 2025-12-01 2025-12-00 |
PublicationDateYYYYMMDD | 2025-12-01 |
PublicationDate_xml | – month: 12 year: 2025 text: 2025-12-01 day: 01 |
PublicationDecade | 2020 |
PublicationTitle | Expert systems with applications |
PublicationYear | 2025 |
Publisher | Elsevier Ltd |
Publisher_xml | – name: Elsevier Ltd |
References | Tang, Dai, Yan, Li, Liang, Qin (bib0022) 2024; 57 Himanshu, Saha, Das, De (bib0007) 2024 Liatifis, Sarigiannidis, Argyriou, Lagkas (bib0013) 2023; 55 Kim, Seo, Lee, Nam, Yegneswaran, Porras, Shin (bib0011) 2024; 241 Mininet (2010). Mininet. Tang, Yan, Gao, Liang, Jin (bib0027) 2023; 18 Kandula, Sengupta, Greenberg, Patel, Chaiken (bib0010) 2009 Openvswitch (2016). Openvswith. Pascoal, Fonseca, Nigam (bib0020) 2020; 173 Ryu (2010). Ryu. Xie, Li, Wang, Cao, Xie, Wen, Qin (bib0031) 2018; 26 Yao, Wang, Xu, Zhang (bib0033) 2023; 10 Tang, Wang, Liu, Jin, Zhang (bib0025) 2023; 16 Tang, Wang, Li, Vijayakumar, Kumar (bib0026) 2023; 20 Tang, Liu, Li, Xiao, Liang, Zhang (bib0024) 2025; 22 Liu, Lu, Wang, Wang, Jia, Li (bib0014) 2024; 17 Dorogush, A. V., Ershov, V., & Gulin, A. (2018). Catboost: gradient boosting with categorical features support. arXiv preprint arXiv Tang, Zhang, Yan, Chen, Qin (bib0029) 2022; 15 Cao, Xu, Li, Sun, Yang (bib0002) 2022; 31 Pascoal, Dantas, Fonseca, Nigam (bib0019) 2017 Tang, Dai, Zuo, Chen, Li, Qin (bib0023) 2025; 74 Lu, Liu, Jia, Zhang, Wang, Wang (bib0015) 2024; 17 . Isyaku, Mohd Zahid, Bte Kamat, Abu Bakar, Ghaleb (bib0009) 2020; 12 Guo, Matta (bib0006) 2001 Tang, Yan, Zhang, Chen, Qin (bib0028) 2022; 40 Cao, Xu, Li, Sun, Yang, Zheng (bib0003) 2018 Indrason, Saha (bib0008) 2024; 224 Kong, Wu, Shen, Chen, Liu, Zhang (bib0012) 2022 Tang, Zheng, Li, Yin, Liang, Zhang (bib0030) 2024; 11 bigFlows.pcap (2016). bigflows.pcap. Yuan, Zou, Yu, Jin, Qiang, Shen (bib0034) 2016; 12 Yue, Wang, Liu, Wu (bib0035) 2020; 8 Deb, Roy (bib0004) 2022; 206 Maleh, Qasmaoui, El Gholami, Sadqi, Mounir (bib0016) 2023; 9 Xu, Huang, Chen, Zhao (bib0032) 2017 Cao (10.1016/j.eswa.2025.128685_bib0003) 2018 10.1016/j.eswa.2025.128685_bib0001 Lu (10.1016/j.eswa.2025.128685_bib0015) 2024; 17 Liatifis (10.1016/j.eswa.2025.128685_bib0013) 2023; 55 10.1016/j.eswa.2025.128685_bib0005 Deb (10.1016/j.eswa.2025.128685_bib0004) 2022; 206 Tang (10.1016/j.eswa.2025.128685_bib0028) 2022; 40 Tang (10.1016/j.eswa.2025.128685_bib0026) 2023; 20 Kim (10.1016/j.eswa.2025.128685_bib0011) 2024; 241 Kong (10.1016/j.eswa.2025.128685_bib0012) 2022 Maleh (10.1016/j.eswa.2025.128685_bib0016) 2023; 9 Yue (10.1016/j.eswa.2025.128685_bib0035) 2020; 8 10.1016/j.eswa.2025.128685_bib0021 Pascoal (10.1016/j.eswa.2025.128685_bib0019) 2017 Guo (10.1016/j.eswa.2025.128685_bib0006) 2001 Himanshu (10.1016/j.eswa.2025.128685_bib0007) 2024 Kandula (10.1016/j.eswa.2025.128685_bib0010) 2009 10.1016/j.eswa.2025.128685_bib0018 Indrason (10.1016/j.eswa.2025.128685_bib0008) 2024; 224 10.1016/j.eswa.2025.128685_bib0017 Xu (10.1016/j.eswa.2025.128685_bib0032) 2017 Tang (10.1016/j.eswa.2025.128685_bib0022) 2024; 57 Pascoal (10.1016/j.eswa.2025.128685_bib0020) 2020; 173 Tang (10.1016/j.eswa.2025.128685_bib0030) 2024; 11 Cao (10.1016/j.eswa.2025.128685_bib0002) 2022; 31 Yuan (10.1016/j.eswa.2025.128685_bib0034) 2016; 12 Tang (10.1016/j.eswa.2025.128685_bib0025) 2023; 16 Yao (10.1016/j.eswa.2025.128685_bib0033) 2023; 10 Tang (10.1016/j.eswa.2025.128685_bib0024) 2025; 22 Tang (10.1016/j.eswa.2025.128685_bib0029) 2022; 15 Xie (10.1016/j.eswa.2025.128685_bib0031) 2018; 26 Isyaku (10.1016/j.eswa.2025.128685_bib0009) 2020; 12 Liu (10.1016/j.eswa.2025.128685_bib0014) 2024; 17 Tang (10.1016/j.eswa.2025.128685_bib0023) 2025; 74 Tang (10.1016/j.eswa.2025.128685_bib0027) 2023; 18 |
References_xml | – volume: 17 start-page: 990 year: 2024 end-page: 1000 ident: bib0015 article-title: Incentivizing proportional fairness for multi-task allocation in crowdsensing publication-title: IEEE Transactions on Services Computing – start-page: 17 year: 2017 end-page: 31 ident: bib0019 article-title: Slow TCAM exhaustion DDos attack publication-title: ICT systems security and privacy protection: 32nd ifip tc 11 international conference, sec 2017, Rome, Italy, May 29–31, 2017, proceedings 32 – volume: 17 start-page: 3672 year: 2024 end-page: 3684 ident: bib0014 article-title: Fedup: Bridging fairness and efficiency in cross-silo federated learning publication-title: IEEE Transactions on Services Computing – volume: 74 start-page: 1758 year: 2025 end-page: 1770 ident: bib0023 article-title: A low-rate dos attack miti gation scheme based on port and traffic state in SDN publication-title: IEEE Transactions on Computers – start-page: 4167 year: 2022 end-page: 4172 ident: bib0012 article-title: Tableguard: A novel security mechanism against flow table overflow attacks in SDN publication-title: Globecom 2022–2022 IEEE global communications conference – volume: 12 start-page: 231 year: 2016 end-page: 246 ident: bib0034 article-title: Defending against flow table overloading attack in software-defined networks publication-title: IEEE Transactions on Services Computing – volume: 31 start-page: 1416 year: 2022 end-page: 1431 ident: bib0002 article-title: The loft attack: Overflowing SDN flow tables at a low rate publication-title: IEEE/ACM Transactions on Networking – reference: Mininet (2010). Mininet. – volume: 57 start-page: 1 year: 2024 end-page: 32 ident: bib0022 article-title: When sdn meets low-rate threats: A survey of attacks and countermeasures in programmable networks publication-title: ACM Computing Surveys – volume: 20 start-page: 273 year: 2023 end-page: 287 ident: bib0026 article-title: Akn-fgd: Adaptive kohonen network based fine-grained detection of ldos attacks publication-title: IEEE Transactions on Dependable and Secure Computing – volume: 18 start-page: 3143 year: 2023 end-page: 3157 ident: bib0027 article-title: LtRFT: Mitigate the low-rate data plane DDos attack with learning-to-rank enabled flow tables publication-title: IEEE Transactions on Information Forensics and Security – volume: 173 year: 2020 ident: bib0020 article-title: Slow denial-of-service attacks on software defined networks publication-title: Computer Networks – volume: 22 start-page: 2855 year: 2025 end-page: 2872 ident: bib0024 article-title: Pluto: A robust ldos attack defense system executing at line speed publication-title: IEEE Transactions on Dependable and Secure Computing – reference: Dorogush, A. V., Ershov, V., & Gulin, A. (2018). Catboost: gradient boosting with categorical features support. arXiv preprint arXiv: – volume: 10 start-page: 1863 year: 2023 end-page: 1879 ident: bib0033 article-title: Lightweight per-flow traffic measurement using improved LRU list publication-title: IEEE Transactions on Network Science and Engineering – reference: bigFlows.pcap (2016). bigflows.pcap. – volume: 241 year: 2024 ident: bib0011 article-title: Enhancing security in SDN: Systematizing attacks and defenses from a penetration perspective publication-title: Computer Networks – reference: Openvswitch (2016). Openvswith. – volume: 206 year: 2022 ident: bib0004 article-title: A comprehensive survey of vulnerability and information security in SDN publication-title: Computer Networks – start-page: 180 year: 2001 end-page: 188 ident: bib0006 article-title: The war between mice and elephants publication-title: Proceedings ninth international conference on network protocols. ICNP 2001 – start-page: 1 year: 2017 end-page: 9 ident: bib0032 article-title: Scalable software-defined networking through hybrid switching publication-title: IEEE infocom 2017-IEEE conference on computer communications – start-page: 232 year: 2024 end-page: 241 ident: bib0007 article-title: A network segmentation architecture for flow aggregation and DDos mitigation in SDN using RAPID flow rules publication-title: Proceedings of the 25th international conference on distributed computing and networking – start-page: 202 year: 2009 end-page: 208 ident: bib0010 article-title: The nature of data center traffic: Measurements & analysis publication-title: Proceedings of the 9th ACM SIGCOMM conference on internet measurement – volume: 26 start-page: 1222 year: 2018 end-page: 1235 ident: bib0031 article-title: On-line anomaly detection with high accuracy publication-title: IEEE/ACM Transactions on Networking – volume: 15 start-page: 3471 year: 2022 end-page: 3484 ident: bib0029 article-title: Real-time detection and mitigation of LDos attacks in the SDN using the HGB-FP algorithm publication-title: IEEE Transactions on Services Computing – reference: . – volume: 8 start-page: 104688 year: 2020 end-page: 104700 ident: bib0035 article-title: Detecting dos attacks based on multi-features in SDN publication-title: IEEE Access – start-page: 356 year: 2018 end-page: 376 ident: bib0003 article-title: Disrupting SDN via the data plane: A low-rate flow table overflow attack publication-title: Security and privacy in communication networks: 13th international conference, securecomm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, proceedings 13 – volume: 55 start-page: 1 year: 2023 end-page: 37 ident: bib0013 article-title: Advancing SDN from openflow to P4: A survey publication-title: ACM Computing Surveys – volume: 224 year: 2024 ident: bib0008 article-title: Exploring blockchain-driven security in SDN-based iot networks publication-title: Journal of Network and Computer Applications – volume: 40 start-page: 428 year: 2022 end-page: 444 ident: bib0028 article-title: Performance and features: Mitigating the low-rate TCP-targeted dos attack via SDN publication-title: IEEE Journal on Selected Areas in Communications – volume: 11 start-page: 2524 year: 2024 end-page: 2536 ident: bib0030 article-title: Ftop: An efficient flow table overflow preventing system for switches in sdn publication-title: IEEE Transactions on Network Science and Engineering – volume: 9 start-page: 201 year: 2023 end-page: 239 ident: bib0016 article-title: A comprehensive survey on SDN security: Threats, mitigations, and future directions publication-title: Journal of Reliable Intelligent Environments – volume: 16 start-page: 3373 year: 2023 end-page: 3384 ident: bib0025 article-title: Gasf-ipp: Detection and mitigation of ldos attack in sdn publication-title: IEEE Transactions on Services Computing – reference: Ryu (2010). Ryu. – volume: 12 start-page: 147 year: 2020 ident: bib0009 article-title: Software defined networking flow table management of openflow switches performance and security challenges: A survey publication-title: Future Internet – volume: 224 year: 2024 ident: 10.1016/j.eswa.2025.128685_bib0008 article-title: Exploring blockchain-driven security in SDN-based iot networks publication-title: Journal of Network and Computer Applications doi: 10.1016/j.jnca.2024.103838 – volume: 15 start-page: 3471 issue: 6 year: 2022 ident: 10.1016/j.eswa.2025.128685_bib0029 article-title: Real-time detection and mitigation of LDos attacks in the SDN using the HGB-FP algorithm publication-title: IEEE Transactions on Services Computing doi: 10.1109/TSC.2021.3102046 – start-page: 1 year: 2017 ident: 10.1016/j.eswa.2025.128685_bib0032 article-title: Scalable software-defined networking through hybrid switching – volume: 9 start-page: 201 issue: 2 year: 2023 ident: 10.1016/j.eswa.2025.128685_bib0016 article-title: A comprehensive survey on SDN security: Threats, mitigations, and future directions publication-title: Journal of Reliable Intelligent Environments doi: 10.1007/s40860-022-00171-8 – ident: 10.1016/j.eswa.2025.128685_bib0018 – volume: 20 start-page: 273 issue: 1 year: 2023 ident: 10.1016/j.eswa.2025.128685_bib0026 article-title: Akn-fgd: Adaptive kohonen network based fine-grained detection of ldos attacks publication-title: IEEE Transactions on Dependable and Secure Computing doi: 10.1109/TDSC.2021.3131531 – start-page: 202 year: 2009 ident: 10.1016/j.eswa.2025.128685_bib0010 article-title: The nature of data center traffic: Measurements & analysis – volume: 55 start-page: 1 issue: 9 year: 2023 ident: 10.1016/j.eswa.2025.128685_bib0013 article-title: Advancing SDN from openflow to P4: A survey publication-title: ACM Computing Surveys doi: 10.1145/3556973 – volume: 16 start-page: 3373 issue: 5 year: 2023 ident: 10.1016/j.eswa.2025.128685_bib0025 article-title: Gasf-ipp: Detection and mitigation of ldos attack in sdn publication-title: IEEE Transactions on Services Computing doi: 10.1109/TSC.2023.3266757 – start-page: 4167 year: 2022 ident: 10.1016/j.eswa.2025.128685_bib0012 article-title: Tableguard: A novel security mechanism against flow table overflow attacks in SDN – volume: 17 start-page: 990 issue: 3 year: 2024 ident: 10.1016/j.eswa.2025.128685_bib0015 article-title: Incentivizing proportional fairness for multi-task allocation in crowdsensing publication-title: IEEE Transactions on Services Computing doi: 10.1109/TSC.2023.3325636 – start-page: 356 year: 2018 ident: 10.1016/j.eswa.2025.128685_bib0003 article-title: Disrupting SDN via the data plane: A low-rate flow table overflow attack – ident: 10.1016/j.eswa.2025.128685_bib0021 – volume: 206 year: 2022 ident: 10.1016/j.eswa.2025.128685_bib0004 article-title: A comprehensive survey of vulnerability and information security in SDN publication-title: Computer Networks doi: 10.1016/j.comnet.2022.108802 – volume: 241 year: 2024 ident: 10.1016/j.eswa.2025.128685_bib0011 article-title: Enhancing security in SDN: Systematizing attacks and defenses from a penetration perspective publication-title: Computer Networks doi: 10.1016/j.comnet.2024.110203 – volume: 173 year: 2020 ident: 10.1016/j.eswa.2025.128685_bib0020 article-title: Slow denial-of-service attacks on software defined networks publication-title: Computer Networks doi: 10.1016/j.comnet.2020.107223 – start-page: 232 year: 2024 ident: 10.1016/j.eswa.2025.128685_bib0007 article-title: A network segmentation architecture for flow aggregation and DDos mitigation in SDN using RAPID flow rules – volume: 22 start-page: 2855 issue: 3 year: 2025 ident: 10.1016/j.eswa.2025.128685_bib0024 article-title: Pluto: A robust ldos attack defense system executing at line speed publication-title: IEEE Transactions on Dependable and Secure Computing doi: 10.1109/TDSC.2024.3522104 – volume: 11 start-page: 2524 issue: 3 year: 2024 ident: 10.1016/j.eswa.2025.128685_bib0030 article-title: Ftop: An efficient flow table overflow preventing system for switches in sdn publication-title: IEEE Transactions on Network Science and Engineering doi: 10.1109/TNSE.2023.3297650 – ident: 10.1016/j.eswa.2025.128685_bib0017 – start-page: 180 year: 2001 ident: 10.1016/j.eswa.2025.128685_bib0006 article-title: The war between mice and elephants – start-page: 17 year: 2017 ident: 10.1016/j.eswa.2025.128685_bib0019 article-title: Slow TCAM exhaustion DDos attack – volume: 10 start-page: 1863 issue: 4 year: 2023 ident: 10.1016/j.eswa.2025.128685_bib0033 article-title: Lightweight per-flow traffic measurement using improved LRU list publication-title: IEEE Transactions on Network Science and Engineering doi: 10.1109/TNSE.2023.3236147 – volume: 40 start-page: 428 issue: 1 year: 2022 ident: 10.1016/j.eswa.2025.128685_bib0028 article-title: Performance and features: Mitigating the low-rate TCP-targeted dos attack via SDN publication-title: IEEE Journal on Selected Areas in Communications doi: 10.1109/JSAC.2021.3126053 – volume: 12 start-page: 147 issue: 9 year: 2020 ident: 10.1016/j.eswa.2025.128685_bib0009 article-title: Software defined networking flow table management of openflow switches performance and security challenges: A survey publication-title: Future Internet doi: 10.3390/fi12090147 – volume: 74 start-page: 1758 issue: 5 year: 2025 ident: 10.1016/j.eswa.2025.128685_bib0023 article-title: A low-rate dos attack miti gation scheme based on port and traffic state in SDN publication-title: IEEE Transactions on Computers doi: 10.1109/TC.2025.3541143 – ident: 10.1016/j.eswa.2025.128685_bib0001 – volume: 17 start-page: 3672 issue: 6 year: 2024 ident: 10.1016/j.eswa.2025.128685_bib0014 article-title: Fedup: Bridging fairness and efficiency in cross-silo federated learning publication-title: IEEE Transactions on Services Computing doi: 10.1109/TSC.2024.3489437 – ident: 10.1016/j.eswa.2025.128685_bib0005 – volume: 26 start-page: 1222 issue: 3 year: 2018 ident: 10.1016/j.eswa.2025.128685_bib0031 article-title: On-line anomaly detection with high accuracy publication-title: IEEE/ACM Transactions on Networking doi: 10.1109/TNET.2018.2819507 – volume: 31 start-page: 1416 issue: 3 year: 2022 ident: 10.1016/j.eswa.2025.128685_bib0002 article-title: The loft attack: Overflowing SDN flow tables at a low rate publication-title: IEEE/ACM Transactions on Networking doi: 10.1109/TNET.2022.3225211 – volume: 12 start-page: 231 issue: 2 year: 2016 ident: 10.1016/j.eswa.2025.128685_bib0034 article-title: Defending against flow table overloading attack in software-defined networks publication-title: IEEE Transactions on Services Computing doi: 10.1109/TSC.2016.2602861 – volume: 8 start-page: 104688 year: 2020 ident: 10.1016/j.eswa.2025.128685_bib0035 article-title: Detecting dos attacks based on multi-features in SDN publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2999668 – volume: 57 start-page: 1 issue: 4 year: 2024 ident: 10.1016/j.eswa.2025.128685_bib0022 article-title: When sdn meets low-rate threats: A survey of attacks and countermeasures in programmable networks publication-title: ACM Computing Surveys doi: 10.1145/3704434 – volume: 18 start-page: 3143 year: 2023 ident: 10.1016/j.eswa.2025.128685_bib0027 article-title: LtRFT: Mitigate the low-rate data plane DDos attack with learning-to-rank enabled flow tables publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2023.3275768 |
SSID | ssj0017007 |
Score | 2.475939 |
Snippet | Software-defined networks (SDN) separate traffic management and packet forwarding, allowing for network programmability. SDN has grown more vulnerable to... |
SourceID | crossref elsevier |
SourceType | Index Database Publisher |
StartPage | 128685 |
SubjectTerms | Attack detection and mitigation Flow table Overflow attack Software defined network Two-level threshold |
Title | Low-rate flow table overflow attack defense system based on two-level threshold in software-defined networks |
URI | https://dx.doi.org/10.1016/j.eswa.2025.128685 |
Volume | 293 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09T8MwELVQWVj4RpSPygMbcpvGdpKOCFGVzwUqdYuc-CwVqgTRoGz8du7qBIGEGBgdxVL0zr57Vp7fMXYWhkYqI60wEA2phZkSoyTMhYvAIEHAZb3y7rx_iCZTdTPTszV22d6FIVllk_t9Tl9l6-bJoEFz8DqfDx6RHGA5xKOdJh4tyXZbqZhWef_jS-ZB9nOx99uLBb3dXJzxGi9Y1uQ9FOo-pumI-in_Vpy-FZzxNttsmCK_8B-zw9ag2GVbbRcG3mzKPba4K2tBhg_cLcqaV3QXipMwczU0VWXyF27B4XkVuDdu5lS7LC8LXtWlWJBuiFcY1CX9i-Lzgi8xOdfmDQTOQxpqeeHV4st9Nh1fPV1ORNNDQeShlhViHuZ5pHSgcpu5YJglQQiGeHWg85F24KRLDJ5GwcAogcw5GScRRLg1VYABkwesU5QFHDLuYggiazIpAzKhMxjhJLTKOJ1ZUDLrsvMWvPTVW2WkrYbsOSWoU4I69VB3mW7xTX8EPMVc_se8o3_OO2YbNPJKlBPWqd7e4RT5RJX1Vgumx9Yvrm8nD5_doMwQ |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV07T9xAEB4RKJIm7yiEkGwRKrSc2df5ihQRCTrgoAlIdM7anpWOnGyEHVlp-FP5g5m5tVGQIgokSttaa_fzaB7yN98AfFLKa-N1KT26XR5hZuQkVYUMDj0lCGTWS-3O4xM3PTOH5_Z8Bf4MvTBMq-x9f_TpS2_d3xn1aI4u5_PRd0oOKBxSaWc5j9auZ1Ye4e-O6rbm88FX-shbSu1_O92byn60gCyU1S1tRRWFMzYxRZmHZDdPE4We083EFhMbMOiQeirS0OMkxTwEPU4dOrJYk9A5NL33EawZchc8NmHn-oZXwnp34yjwN5a8vb5TJ5LKsOlY7EjZHYoLjgc4_y8a_hPh9p_D0z41FV_i6V_AClYv4dkw9kH0XuAVLGZ1J1lhQoRF3YmWm68EM0GXl75tffFTlBioQEYRlaIFB8tS1JVou1oumKgkWrKihn9-iXklGooGnb9CSeso7y1FFenpzWs4exBk38BqVVf4FkQYY-JKn2udsOqdJ5NKVWl8sHmJRufrsD2Al11GbY5sIK1dZAx1xlBnEep1sAO-2S0Lyyh43LHu3T3XfYTH09PjWTY7ODnagCf8JNJg3sNqe_ULNymZafMPS-MR8OOhrfUvDVsIUw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Low-rate+flow+table+overflow+attack+defense+system+based+on+two-level+threshold+in+software-defined+networks&rft.jtitle=Expert+systems+with+applications&rft.au=Tang%2C+Dan&rft.au=Zuo%2C+Chenguang&rft.au=Li%2C+Xinmeng&rft.au=Tan%2C+Pei&rft.date=2025-12-01&rft.pub=Elsevier+Ltd&rft.issn=0957-4174&rft.volume=293&rft_id=info:doi/10.1016%2Fj.eswa.2025.128685&rft.externalDocID=S0957417425023036 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0957-4174&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0957-4174&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0957-4174&client=summon |