Please use this identifier to cite or link to this item:
http://hdl.handle.net/1843/JCES-AVPGMC
Type: | Dissertação de Mestrado |
Title: | Mitigating Denial of Service Attacks in Software Defined Vehicular Networks |
Authors: | Gabriel de Biasi |
First Advisor: | Luiz Filipe Menezes Vieira |
First Co-advisor: | Antonio Alfredo Ferreira Loureiro |
First Referee: | Antonio Alfredo Ferreira Loureiro |
Second Referee: | Italo Fernando Scota Cunha |
Third Referee: | Leandro Aparecido Villas |
Abstract: | Software Defined Vehicular Network (SDVN) is a new network architecture inspired by the well-known Vehicular Ad Hoc Network (VANET), applying the concepts of Software Defined Network (SDN). The SDVN proposes a complete data flow management by a module that controls the routing actions. However, it is necessary to verify that the security requirements are still satisfied. We presented two SDVN architecture proposals: (1) Centralized mode, where there is only one controller and the vehicles use LTE and WAVE as interfaces communication and (2) distributed mode, where there are several controllers installed in RSUs and uses only WAVE communication. This work presents the Sentinel, a new defense mechanism in order to detect flooding attack by time series analysis of packet flow and mitigate the attack creating a flow tree to find out the source of spoofed packets. We divided the results between the detection rate of victim vehicles and the efficiency of mitigation method. The algorithm was able to mitigate the attack flow in different scenarios and parameters. However, the speed of vehicles might decrease the efficiency due to the fast change of attack flow. Furthermore, we also propose some improvements to future approaches |
Abstract: | Software Defined Vehicular Network (SDVN) is a new network architecture inspired by the well-known Vehicular Ad Hoc Network (VANET), applying the concepts of Software Defined Network (SDN). The SDVN proposes a complete data flow management by a module that controls the routing actions. However, it is necessary to verify that the security requirements are still satisfied. We presented two SDVN architecture proposals: (1) Centralized mode, where there is only one controller and the vehicles use LTE and WAVE as interfaces communication and (2) distributed mode, where there are several controllers installed in RSUs and uses only WAVE communication. This work presents the Sentinel, a new defense mechanism in order to detect flooding attack by time series analysis of packet flow and mitigate the attack creating a flow tree to find out the source of spoofed packets. We divided the results between the detection rate of victim vehicles and the efficiency of mitigation method. The algorithm was able to mitigate the attack flow in different scenarios and parameters. However, the speed of vehicles might decrease the efficiency due to the fast change of attack flow. Furthermore, we also propose some improvements to future approaches. |
Subject: | Redes veiculares Computação Redes de computadores |
language: | Inglês |
Publisher: | Universidade Federal de Minas Gerais |
Publisher Initials: | UFMG |
Rights: | Acesso Aberto |
URI: | http://hdl.handle.net/1843/JCES-AVPGMC |
Issue Date: | 1-Nov-2017 |
Appears in Collections: | Dissertações de Mestrado |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
gabrieldebiasi.pdf | 10.76 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.