Mitigating Denial of Service Attacks in Software Defined Vehicular Networks

Detalhes bibliográficos
Ano de defesa: 2017
Autor(a) principal: Gabriel de Biasi
Orientador(a): Não Informado pela instituição
Banca de defesa: Não Informado pela instituição
Tipo de documento: Dissertação
Tipo de acesso: Acesso aberto
Idioma: eng
Instituição de defesa: Universidade Federal de Minas Gerais
Programa de Pós-Graduação: Não Informado pela instituição
Departamento: Não Informado pela instituição
País: Não Informado pela instituição
Palavras-chave em Português:
Link de acesso: https://hdl.handle.net/1843/JCES-AVPGMC
Resumo: Software Defined Vehicular Network (SDVN) is a new network architecture inspired by the well-known Vehicular Ad Hoc Network (VANET), applying the concepts of Software Defined Network (SDN). The SDVN proposes a complete data flow management by a module that controls the routing actions. However, it is necessary to verify that the security requirements are still satisfied. We presented two SDVN architecture proposals: (1) Centralized mode, where there is only one controller and the vehicles use LTE and WAVE as interfaces communication and (2) distributed mode, where there are several controllers installed in RSUs and uses only WAVE communication. This work presents the Sentinel, a new defense mechanism in order to detect flooding attack by time series analysis of packet flow and mitigate the attack creating a flow tree to find out the source of spoofed packets. We divided the results between the detection rate of victim vehicles and the efficiency of mitigation method. The algorithm was able to mitigate the attack flow in different scenarios and parameters. However, the speed of vehicles might decrease the efficiency due to the fast change of attack flow. Furthermore, we also propose some improvements to future approaches.
id UFMG_bcbed5b1b1fd4bb47cd0d69f7653b7ed
oai_identifier_str oai:repositorio.ufmg.br:1843/JCES-AVPGMC
network_acronym_str UFMG
network_name_str Repositório Institucional da UFMG
repository_id_str
spelling 2019-08-10T22:44:53Z2025-09-08T22:54:31Z2019-08-10T22:44:53Z2017-11-01https://hdl.handle.net/1843/JCES-AVPGMCSoftware Defined Vehicular Network (SDVN) is a new network architecture inspired by the well-known Vehicular Ad Hoc Network (VANET), applying the concepts of Software Defined Network (SDN). The SDVN proposes a complete data flow management by a module that controls the routing actions. However, it is necessary to verify that the security requirements are still satisfied. We presented two SDVN architecture proposals: (1) Centralized mode, where there is only one controller and the vehicles use LTE and WAVE as interfaces communication and (2) distributed mode, where there are several controllers installed in RSUs and uses only WAVE communication. This work presents the Sentinel, a new defense mechanism in order to detect flooding attack by time series analysis of packet flow and mitigate the attack creating a flow tree to find out the source of spoofed packets. We divided the results between the detection rate of victim vehicles and the efficiency of mitigation method. The algorithm was able to mitigate the attack flow in different scenarios and parameters. However, the speed of vehicles might decrease the efficiency due to the fast change of attack flow. Furthermore, we also propose some improvements to future approaches.Universidade Federal de Minas GeraisNetworkVehiclesSDVNRedes veicularesComputaçãoRedes de computadoresMitigating Denial of Service Attacks in Software Defined Vehicular Networksinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesisGabriel de Biasiinfo:eu-repo/semantics/openAccessengreponame:Repositório Institucional da UFMGinstname:Universidade Federal de Minas Gerais (UFMG)instacron:UFMGLuiz Filipe Menezes VieiraAntonio Alfredo Ferreira LoureiroAntonio Alfredo Ferreira LoureiroItalo Fernando Scota CunhaLeandro Aparecido VillasSoftware Defined Vehicular Network (SDVN) is a new network architecture inspired by the well-known Vehicular Ad Hoc Network (VANET), applying the concepts of Software Defined Network (SDN). The SDVN proposes a complete data flow management by a module that controls the routing actions. However, it is necessary to verify that the security requirements are still satisfied. We presented two SDVN architecture proposals: (1) Centralized mode, where there is only one controller and the vehicles use LTE and WAVE as interfaces communication and (2) distributed mode, where there are several controllers installed in RSUs and uses only WAVE communication. This work presents the Sentinel, a new defense mechanism in order to detect flooding attack by time series analysis of packet flow and mitigate the attack creating a flow tree to find out the source of spoofed packets. We divided the results between the detection rate of victim vehicles and the efficiency of mitigation method. The algorithm was able to mitigate the attack flow in different scenarios and parameters. However, the speed of vehicles might decrease the efficiency due to the fast change of attack flow. Furthermore, we also propose some improvements to future approachesUFMGORIGINALgabrieldebiasi.pdfapplication/pdf11015107https://repositorio.ufmg.br//bitstreams/3ebeb1ea-762a-4e90-bd17-677d3b01d92e/download3eb52216b4a14939705c85eff388b1d1MD51trueAnonymousREADTEXTgabrieldebiasi.pdf.txttext/plain113508https://repositorio.ufmg.br//bitstreams/2a35ce06-f4df-4934-833c-de027987e090/download19301128efa06c3df675e1004cae33f1MD52falseAnonymousREAD1843/JCES-AVPGMC2025-09-08 19:54:31.171open.accessoai:repositorio.ufmg.br:1843/JCES-AVPGMChttps://repositorio.ufmg.br/Repositório InstitucionalPUBhttps://repositorio.ufmg.br/oairepositorio@ufmg.bropendoar:2025-09-08T22:54:31Repositório Institucional da UFMG - Universidade Federal de Minas Gerais (UFMG)false
dc.title.none.fl_str_mv Mitigating Denial of Service Attacks in Software Defined Vehicular Networks
title Mitigating Denial of Service Attacks in Software Defined Vehicular Networks
spellingShingle Mitigating Denial of Service Attacks in Software Defined Vehicular Networks
Gabriel de Biasi
Redes veiculares
Computação
Redes de computadores
Network
Vehicles
SDVN
title_short Mitigating Denial of Service Attacks in Software Defined Vehicular Networks
title_full Mitigating Denial of Service Attacks in Software Defined Vehicular Networks
title_fullStr Mitigating Denial of Service Attacks in Software Defined Vehicular Networks
title_full_unstemmed Mitigating Denial of Service Attacks in Software Defined Vehicular Networks
title_sort Mitigating Denial of Service Attacks in Software Defined Vehicular Networks
author Gabriel de Biasi
author_facet Gabriel de Biasi
author_role author
dc.contributor.author.fl_str_mv Gabriel de Biasi
dc.subject.por.fl_str_mv Redes veiculares
Computação
Redes de computadores
topic Redes veiculares
Computação
Redes de computadores
Network
Vehicles
SDVN
dc.subject.other.none.fl_str_mv Network
Vehicles
SDVN
description Software Defined Vehicular Network (SDVN) is a new network architecture inspired by the well-known Vehicular Ad Hoc Network (VANET), applying the concepts of Software Defined Network (SDN). The SDVN proposes a complete data flow management by a module that controls the routing actions. However, it is necessary to verify that the security requirements are still satisfied. We presented two SDVN architecture proposals: (1) Centralized mode, where there is only one controller and the vehicles use LTE and WAVE as interfaces communication and (2) distributed mode, where there are several controllers installed in RSUs and uses only WAVE communication. This work presents the Sentinel, a new defense mechanism in order to detect flooding attack by time series analysis of packet flow and mitigate the attack creating a flow tree to find out the source of spoofed packets. We divided the results between the detection rate of victim vehicles and the efficiency of mitigation method. The algorithm was able to mitigate the attack flow in different scenarios and parameters. However, the speed of vehicles might decrease the efficiency due to the fast change of attack flow. Furthermore, we also propose some improvements to future approaches.
publishDate 2017
dc.date.issued.fl_str_mv 2017-11-01
dc.date.accessioned.fl_str_mv 2019-08-10T22:44:53Z
2025-09-08T22:54:31Z
dc.date.available.fl_str_mv 2019-08-10T22:44:53Z
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/masterThesis
format masterThesis
status_str publishedVersion
dc.identifier.uri.fl_str_mv https://hdl.handle.net/1843/JCES-AVPGMC
url https://hdl.handle.net/1843/JCES-AVPGMC
dc.language.iso.fl_str_mv eng
language eng
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.publisher.none.fl_str_mv Universidade Federal de Minas Gerais
publisher.none.fl_str_mv Universidade Federal de Minas Gerais
dc.source.none.fl_str_mv reponame:Repositório Institucional da UFMG
instname:Universidade Federal de Minas Gerais (UFMG)
instacron:UFMG
instname_str Universidade Federal de Minas Gerais (UFMG)
instacron_str UFMG
institution UFMG
reponame_str Repositório Institucional da UFMG
collection Repositório Institucional da UFMG
bitstream.url.fl_str_mv https://repositorio.ufmg.br//bitstreams/3ebeb1ea-762a-4e90-bd17-677d3b01d92e/download
https://repositorio.ufmg.br//bitstreams/2a35ce06-f4df-4934-833c-de027987e090/download
bitstream.checksum.fl_str_mv 3eb52216b4a14939705c85eff388b1d1
19301128efa06c3df675e1004cae33f1
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
repository.name.fl_str_mv Repositório Institucional da UFMG - Universidade Federal de Minas Gerais (UFMG)
repository.mail.fl_str_mv repositorio@ufmg.br
_version_ 1862105891149447168