From Replay to Regeneration: Recovery of UDP Flood Network Attack Scenario Based on SDN
Yichuan Wang,
Junxia Ding,
Tong Zhang (),
Yeqiu Xiao and
Xinhong Hei
Additional contact information
Yichuan Wang: School of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, China
Junxia Ding: School of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, China
Tong Zhang: School of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, China
Yeqiu Xiao: School of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, China
Xinhong Hei: School of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, China
Mathematics, 2023, vol. 11, issue 8, 1-22
Abstract:
In recent years, various network attacks have emerged. These attacks are often recorded in the form of Pcap data, which contains many attack details and characteristics that cannot be analyzed through traditional methods alone. Therefore, restoring the network attack scenario through scene reconstruction to achieve data regeneration has become an important entry point for detecting and defending against network attacks. However, current network attack scenarios mainly reproduce the attacker’s attack steps by building a sequence collection of attack scenarios, constructing an attack behavior diagram, or simply replaying the captured network traffic. These methods still have shortcomings in terms of traffic regeneration. To address this limitation, this paper proposes an SDN-based network attack scenario recovery method. By parsing Pcap data and utilizing network topology reconstruction, probability, and packet sequence models, network traffic data can be regenerated. The experimental results show that the proposed method is closer to the real network, with a higher similarity between the reconstructed and actual attack scenarios. Additionally, this method allows for adjusting the intensity of the network attack and the generated topology nodes, which helps network defenders better understand the attackers’ posture and analyze and formulate corresponding security strategies.
Keywords: SDN; network attack; scenario reconfiguration; probabilistic model; topology reconfiguration model (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2227-7390/11/8/1897/pdf (application/pdf)
https://www.mdpi.com/2227-7390/11/8/1897/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:11:y:2023:i:8:p:1897-:d:1125492
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().