Mitigating Denial of Service Attacks in Software Defined Vehicular Networks
| Ano de defesa: | 2017 |
|---|---|
| Autor(a) principal: | |
| Orientador(a): | |
| Banca de defesa: | |
| Tipo de documento: | Dissertação |
| Tipo de acesso: | Acesso aberto |
| Idioma: | eng |
| Instituição de defesa: |
Universidade Federal de Minas Gerais
|
| Programa de Pós-Graduação: |
Não Informado pela instituição
|
| Departamento: |
Não Informado pela instituição
|
| País: |
Não Informado pela instituição
|
| Palavras-chave em Português: | |
| Link de acesso: | https://hdl.handle.net/1843/JCES-AVPGMC |
Resumo: | Software Defined Vehicular Network (SDVN) is a new network architecture inspired by the well-known Vehicular Ad Hoc Network (VANET), applying the concepts of Software Defined Network (SDN). The SDVN proposes a complete data flow management by a module that controls the routing actions. However, it is necessary to verify that the security requirements are still satisfied. We presented two SDVN architecture proposals: (1) Centralized mode, where there is only one controller and the vehicles use LTE and WAVE as interfaces communication and (2) distributed mode, where there are several controllers installed in RSUs and uses only WAVE communication. This work presents the Sentinel, a new defense mechanism in order to detect flooding attack by time series analysis of packet flow and mitigate the attack creating a flow tree to find out the source of spoofed packets. We divided the results between the detection rate of victim vehicles and the efficiency of mitigation method. The algorithm was able to mitigate the attack flow in different scenarios and parameters. However, the speed of vehicles might decrease the efficiency due to the fast change of attack flow. Furthermore, we also propose some improvements to future approaches. |
| id |
UFMG_bcbed5b1b1fd4bb47cd0d69f7653b7ed |
|---|---|
| oai_identifier_str |
oai:repositorio.ufmg.br:1843/JCES-AVPGMC |
| network_acronym_str |
UFMG |
| network_name_str |
Repositório Institucional da UFMG |
| repository_id_str |
|
| spelling |
2019-08-10T22:44:53Z2025-09-08T22:54:31Z2019-08-10T22:44:53Z2017-11-01https://hdl.handle.net/1843/JCES-AVPGMCSoftware Defined Vehicular Network (SDVN) is a new network architecture inspired by the well-known Vehicular Ad Hoc Network (VANET), applying the concepts of Software Defined Network (SDN). The SDVN proposes a complete data flow management by a module that controls the routing actions. However, it is necessary to verify that the security requirements are still satisfied. We presented two SDVN architecture proposals: (1) Centralized mode, where there is only one controller and the vehicles use LTE and WAVE as interfaces communication and (2) distributed mode, where there are several controllers installed in RSUs and uses only WAVE communication. This work presents the Sentinel, a new defense mechanism in order to detect flooding attack by time series analysis of packet flow and mitigate the attack creating a flow tree to find out the source of spoofed packets. We divided the results between the detection rate of victim vehicles and the efficiency of mitigation method. The algorithm was able to mitigate the attack flow in different scenarios and parameters. However, the speed of vehicles might decrease the efficiency due to the fast change of attack flow. Furthermore, we also propose some improvements to future approaches.Universidade Federal de Minas GeraisNetworkVehiclesSDVNRedes veicularesComputaçãoRedes de computadoresMitigating Denial of Service Attacks in Software Defined Vehicular Networksinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesisGabriel de Biasiinfo:eu-repo/semantics/openAccessengreponame:Repositório Institucional da UFMGinstname:Universidade Federal de Minas Gerais (UFMG)instacron:UFMGLuiz Filipe Menezes VieiraAntonio Alfredo Ferreira LoureiroAntonio Alfredo Ferreira LoureiroItalo Fernando Scota CunhaLeandro Aparecido VillasSoftware Defined Vehicular Network (SDVN) is a new network architecture inspired by the well-known Vehicular Ad Hoc Network (VANET), applying the concepts of Software Defined Network (SDN). The SDVN proposes a complete data flow management by a module that controls the routing actions. However, it is necessary to verify that the security requirements are still satisfied. We presented two SDVN architecture proposals: (1) Centralized mode, where there is only one controller and the vehicles use LTE and WAVE as interfaces communication and (2) distributed mode, where there are several controllers installed in RSUs and uses only WAVE communication. This work presents the Sentinel, a new defense mechanism in order to detect flooding attack by time series analysis of packet flow and mitigate the attack creating a flow tree to find out the source of spoofed packets. We divided the results between the detection rate of victim vehicles and the efficiency of mitigation method. The algorithm was able to mitigate the attack flow in different scenarios and parameters. However, the speed of vehicles might decrease the efficiency due to the fast change of attack flow. Furthermore, we also propose some improvements to future approachesUFMGORIGINALgabrieldebiasi.pdfapplication/pdf11015107https://repositorio.ufmg.br//bitstreams/3ebeb1ea-762a-4e90-bd17-677d3b01d92e/download3eb52216b4a14939705c85eff388b1d1MD51trueAnonymousREADTEXTgabrieldebiasi.pdf.txttext/plain113508https://repositorio.ufmg.br//bitstreams/2a35ce06-f4df-4934-833c-de027987e090/download19301128efa06c3df675e1004cae33f1MD52falseAnonymousREAD1843/JCES-AVPGMC2025-09-08 19:54:31.171open.accessoai:repositorio.ufmg.br:1843/JCES-AVPGMChttps://repositorio.ufmg.br/Repositório InstitucionalPUBhttps://repositorio.ufmg.br/oairepositorio@ufmg.bropendoar:2025-09-08T22:54:31Repositório Institucional da UFMG - Universidade Federal de Minas Gerais (UFMG)false |
| dc.title.none.fl_str_mv |
Mitigating Denial of Service Attacks in Software Defined Vehicular Networks |
| title |
Mitigating Denial of Service Attacks in Software Defined Vehicular Networks |
| spellingShingle |
Mitigating Denial of Service Attacks in Software Defined Vehicular Networks Gabriel de Biasi Redes veiculares Computação Redes de computadores Network Vehicles SDVN |
| title_short |
Mitigating Denial of Service Attacks in Software Defined Vehicular Networks |
| title_full |
Mitigating Denial of Service Attacks in Software Defined Vehicular Networks |
| title_fullStr |
Mitigating Denial of Service Attacks in Software Defined Vehicular Networks |
| title_full_unstemmed |
Mitigating Denial of Service Attacks in Software Defined Vehicular Networks |
| title_sort |
Mitigating Denial of Service Attacks in Software Defined Vehicular Networks |
| author |
Gabriel de Biasi |
| author_facet |
Gabriel de Biasi |
| author_role |
author |
| dc.contributor.author.fl_str_mv |
Gabriel de Biasi |
| dc.subject.por.fl_str_mv |
Redes veiculares Computação Redes de computadores |
| topic |
Redes veiculares Computação Redes de computadores Network Vehicles SDVN |
| dc.subject.other.none.fl_str_mv |
Network Vehicles SDVN |
| description |
Software Defined Vehicular Network (SDVN) is a new network architecture inspired by the well-known Vehicular Ad Hoc Network (VANET), applying the concepts of Software Defined Network (SDN). The SDVN proposes a complete data flow management by a module that controls the routing actions. However, it is necessary to verify that the security requirements are still satisfied. We presented two SDVN architecture proposals: (1) Centralized mode, where there is only one controller and the vehicles use LTE and WAVE as interfaces communication and (2) distributed mode, where there are several controllers installed in RSUs and uses only WAVE communication. This work presents the Sentinel, a new defense mechanism in order to detect flooding attack by time series analysis of packet flow and mitigate the attack creating a flow tree to find out the source of spoofed packets. We divided the results between the detection rate of victim vehicles and the efficiency of mitigation method. The algorithm was able to mitigate the attack flow in different scenarios and parameters. However, the speed of vehicles might decrease the efficiency due to the fast change of attack flow. Furthermore, we also propose some improvements to future approaches. |
| publishDate |
2017 |
| dc.date.issued.fl_str_mv |
2017-11-01 |
| dc.date.accessioned.fl_str_mv |
2019-08-10T22:44:53Z 2025-09-08T22:54:31Z |
| dc.date.available.fl_str_mv |
2019-08-10T22:44:53Z |
| dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
| dc.type.driver.fl_str_mv |
info:eu-repo/semantics/masterThesis |
| format |
masterThesis |
| status_str |
publishedVersion |
| dc.identifier.uri.fl_str_mv |
https://hdl.handle.net/1843/JCES-AVPGMC |
| url |
https://hdl.handle.net/1843/JCES-AVPGMC |
| dc.language.iso.fl_str_mv |
eng |
| language |
eng |
| dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
| eu_rights_str_mv |
openAccess |
| dc.publisher.none.fl_str_mv |
Universidade Federal de Minas Gerais |
| publisher.none.fl_str_mv |
Universidade Federal de Minas Gerais |
| dc.source.none.fl_str_mv |
reponame:Repositório Institucional da UFMG instname:Universidade Federal de Minas Gerais (UFMG) instacron:UFMG |
| instname_str |
Universidade Federal de Minas Gerais (UFMG) |
| instacron_str |
UFMG |
| institution |
UFMG |
| reponame_str |
Repositório Institucional da UFMG |
| collection |
Repositório Institucional da UFMG |
| bitstream.url.fl_str_mv |
https://repositorio.ufmg.br//bitstreams/3ebeb1ea-762a-4e90-bd17-677d3b01d92e/download https://repositorio.ufmg.br//bitstreams/2a35ce06-f4df-4934-833c-de027987e090/download |
| bitstream.checksum.fl_str_mv |
3eb52216b4a14939705c85eff388b1d1 19301128efa06c3df675e1004cae33f1 |
| bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 |
| repository.name.fl_str_mv |
Repositório Institucional da UFMG - Universidade Federal de Minas Gerais (UFMG) |
| repository.mail.fl_str_mv |
repositorio@ufmg.br |
| _version_ |
1862105891149447168 |