The primary objective of this project is to detect and mitigate various network attacks using new and effective modern day technologies. 1) Software Defined Networking (SDN) is one of the start of art technology that will be used in this project to mitigate the attacks like Denial of Service attacks. 2) It will also help in controlling the data and control plane of the networking devices, which will enable more options to enhance the security. Implementation of security measures in SDN can free a network from several network attacks like Denial of Service (DoS) attacks. Another point to be noted is that, if an administrator had to upgrade the security measures in a traditional network, he would have to configure all the networking equipment separately with the required security measures. If the administrator needs to make any future changes to the network, he would have to again have to update on each and every device separately. This method demands a lot of resources and time. But the implementation of these security measures in a SDN controller can lead to updating all the devices in the network at one go. This leads to mitigating different kinds of network attacks at one go. This is the objective of this project. 1.4 Literature Survey: A. Software Defined Networking (SDN): The implementation of this project makes use of a lot of modern technologies. However, the state of art technology in this project is Software Defined Networking [1]. In the Networking community, SDN
amid this configuration we tend to look for guidance from them as data, control, and application planes. At base, the data plane is included system segments, whose SDN Data ways uncover their abilities through the Control-Data-Plane Interface (CDPI) Agent. On top, SDN Applications exist inside of the application plane, and impart their needs by means of northward Interface (NBI) Drivers. inside of the centre, the SDN Controller interprets these needs and applies low-level administration over the SDN Data ways, while giving pertinent data up to the SDN
In this report I will be describing the ways in which networks can be attacked, also be giving real life example of each of the below.
6. Describe (in plain English) at least one type of ruleset you would want to add to a high level security network and why?
Electronic technology is growing at a rapid rate; more devices are made mobile and wireless, but with those improvement and developments come flaws and malicious opportunities. Cyber attacks are on the rise and no system or device is immune. Many organizations employ multiple layers of firewalls but that doesn’t completely eliminate the threat. Attacks against firewalls and virtual private networks or VPNs are constantly being exploited with new methods everyday, but they are yet another obstacle that a cyber criminal must overcome.
Today, security devices such as Firewall, IDS are used on the many organization's networks for preventing security attacks. But, these devices can only diagnose illegitimate traffic and prevent it. They cannot prevent attacks which are as a result of the network devices vulnerabilities in the switches, routers, and etc. A malicious user who is within the network can implement many attacks by using these vulnerabilities. This paper explains the kind of existing vulnerabilities in Cisco switches and methods of preventing these attacks from
Before going further on this document, first we need discuss some basics of networking, so that it would be easy to understand the topics easily.
Serving in the Military for 17 years, it has taught me many skills to be successful in life and when attending online schools or traditional learning in classroom environments. Of those skills are leadership, organization, reasoning, problem solving, oral communications, planning, and adaptive skills. Some of these skills I try to use during school such as organization, planning, and being adaptive. These skills are what I would say that I bring to the program and that they will continue to help me throughout my academic journey. Being able to be organized is key to ensuring that our coursework flows smoothly along with our everyday life styles. If we are unorganized then it can become very chaotic and unproductive to completing school work
The world is becoming more interconnected with the advent of the Internet and new networking technology. There is a large amount of personal, commercial, military, and government information on networking infrastructures worldwide. Network security is becoming of great importance because of intellectual property that can be easily acquired through the internet. When considering network security, it must be emphasized that the whole network is secure. Network security does not only concern the security in the computers at each end of the communication chain. When transmitting data the communication channel should not be vulnerable to attack.
Network security has been instrumental in providing security to different types of networks. There are various types of networks like LAN, WAN and MAN for which the security is provided in order to protect them from various unethical activities. The network security has also grown with the recent advances in technologies. It is also very flexible in terms of providing security to advance and new platforms like cloud environment, virtual environment, wireless environment.
According to Kizza (2013), the rapid growth of networking has led to increased security risks. Many of these risks are as result of hacking, improper uses of network resources and network device vulnerabilities. Awareness of the various weaknesses and vulnerabilities is vital to the success of current networks (Kizza, 2013).
With cyber-attacks on organizations becoming more frequent, and with the need to keep organizations secure, counter-measures must be taken. While firewalls can help to prevent attacks, simply dropping packets and declining services is becoming an inefficient message to send to attackers. Taking existing perimeter defense techniques, like firewalls, and amplifying them to create a new style of device that will respond to attacks is the next step in firewall technology. With these Offensive Perimeter Devices (OPDs), organizations can fight back. Imagine being able to replicate the attack that is in progress and use it against the attackers. The OPD will help to eliminate Denial of Service attacks and ultimately keep an organization up
We design a service in the P4 Controller, that can detect and prevent a DOS attack using a multi-layer firewall approach and the packet counters available inside the P4 firewall. This service is also leveraged to enable a Honeypot intrusion detection-prevention system.
Over the past two decades, as well the scale as the complexity of Internet of Things (IoT) networks has been dynamically growing. The popularization of mobile internet-connected devices and IoT-based business solutions has additionally contributed to the growth of distributed computing. With the ever more common deployment of heterogeneous IoT networks, often integrating elements of mobile ad-hoc network (MANET) architecture, increasingly sophisticated software-defined networking (SDN) solutions \cite{c3} represent an important area of development.
We use Networks for file sharing, printer or peripheral sharing, Internet telephone service, multi-player games and many more. But, Normal networks are more complex. Configuring network devices requires a lot of effort and generally has to be done manually by devoted admin. If a network file server promotes a fault, then many users may not be able to run application programs and get entry to shared data [2]. Users can lose data because of a fault on the network. It is hard to make the system secure from hackers, fresher or industrial spying. The larger the network, the more difficult it is to manage.
Denial of Service attacks are characterized as an explicit attempt by a hacker so as to prevent a user from getting or using the desired resources. Examples of such an attack are: