DDoS Defense Strategy Based on Blockchain and Unsupervised Learning Techniques in SDN
Shengmin Peng,
Jialin Tian,
Xiangyu Zheng,
Shuwu Chen and
Zhaogang Shu ()
Additional contact information
Shengmin Peng: School of Intelligent Engineering, Fuzhou Polytechnic, Fuzhou 350108, China
Jialin Tian: Computer and Information College, Fujian Agriculture and Forestry University, Fuzhou 350002, China
Xiangyu Zheng: Computer and Information College, Fujian Agriculture and Forestry University, Fuzhou 350002, China
Shuwu Chen: Computer and Information College, Fujian Agriculture and Forestry University, Fuzhou 350002, China
Zhaogang Shu: Computer and Information College, Fujian Agriculture and Forestry University, Fuzhou 350002, China
Future Internet, 2025, vol. 17, issue 8, 1-29
Abstract:
With the rapid development of technologies such as cloud computing, big data, and the Internet of Things (IoT), Software-Defined Networking (SDN) is emerging as a new network architecture for the modern Internet. SDN separates the control plane from the data plane, allowing a central controller, the SDN controller, to quickly direct the routing devices within the topology to forward data packets, thus providing flexible traffic management for communication between information sources. However, traditional Distributed Denial of Service (DDoS) attacks still significantly impact SDN systems. This paper proposes a novel dual-layer strategy capable of detecting and mitigating DDoS attacks in an SDN network environment. The first layer of the strategy enhances security by using blockchain technology to replace the SDN flow table storage container in the northbound interface of the SDN controller. Smart contracts are then used to process the stored flow table information. We employ the time window algorithm and the token bucket algorithm to construct the first layer strategy to defend against obvious DDoS attacks. To detect and mitigate less obvious DDoS attacks, we design a second-layer strategy that uses a composite data feature correlation coefficient calculation method and the Isolation Forest algorithm from unsupervised learning techniques to perform binary classification, thereby identifying abnormal traffic. We conduct experimental validation using the publicly available DDoS dataset CIC-DDoS2019. The results show that using this strategy in the SDN network reduces the average deviation of round-trip time (RTT) by approximately 38.86% compared with the original SDN network without this strategy. Furthermore, the accuracy of DDoS attack detection reaches 97.66% and an F1 score of 92.2%. Compared with other similar methods, under comparable detection accuracy, the deployment of our strategy in small-scale SDN network topologies provides faster detection speeds for DDoS attacks and exhibits less fluctuation in detection time. This indicates that implementing this strategy can effectively identify DDoS attacks without affecting the stability of data transmission in the SDN network environment.
Keywords: software-defined networks; distributed denial of service; blockchain; unsupervised learning (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/1999-5903/17/8/367/pdf (application/pdf)
https://www.mdpi.com/1999-5903/17/8/367/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:17:y:2025:i:8:p:367-:d:1723479
Access Statistics for this article
Future Internet is currently edited by Ms. Grace You
More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().