Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks

Software-Defined Networking (SDN) offers significant advantages for modern networks, including flexibility, centralized control, and reduced dependency on vendor-specific hardware. However, these benefits introduce security vulnerabilities, particularly from Distributed Denial-of-Service (DDoS) atta...

Full description

Saved in:
Bibliographic Details
Main Authors: Abdinasir Hirsi, Mohammed A. Alhartomi, Lukman Audah, Adeb Salh, Nan Mad Sahar, Salman Ahmed, Godwin Okon Ansa, Abdullahi Farah
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10857272/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1825207019078942720
author Abdinasir Hirsi
Mohammed A. Alhartomi
Lukman Audah
Adeb Salh
Nan Mad Sahar
Salman Ahmed
Godwin Okon Ansa
Abdullahi Farah
author_facet Abdinasir Hirsi
Mohammed A. Alhartomi
Lukman Audah
Adeb Salh
Nan Mad Sahar
Salman Ahmed
Godwin Okon Ansa
Abdullahi Farah
author_sort Abdinasir Hirsi
collection DOAJ
description Software-Defined Networking (SDN) offers significant advantages for modern networks, including flexibility, centralized control, and reduced dependency on vendor-specific hardware. However, these benefits introduce security vulnerabilities, particularly from Distributed Denial-of-Service (DDoS) attacks, which represent some of the most disruptive threats to SDN environments. A review of the literature shows that while various techniques have been proposed to counteract DDoS threats, many studies have focused on single detection methods, with only a few utilizing multiple approaches. This fragmented focus limits a comprehensive approach to addressing DDoS threats across the SDN layers. To bridge this gap, this paper presents the first comprehensive review of DDoS anomaly detection in SDN, examining over 165 primary research articles published between 2020 and 2024. A novel taxonomy of DDoS attacks is introduced, categorizing them by distinct characteristics, and mapping each attack type to relevant detection methods within specific SDN layers. The survey provides a layer-by-layer analysis of DDoS detection techniques, covering the application, control, and infrastructure layers, and offers a structured overview that clarifies the applicability and effectiveness of each method. The paper concludes by synthesizing key findings, identifying unresolved challenges, and outlining future research directions to advance DDoS detection mechanisms in SDN. This roadmap is designed to guide researchers in addressing security vulnerabilities and enhancing SDN resilience against evolving DDoS threats.
format Article
id doaj-art-5785739d218c4318b4464cb66b25a95a
institution Kabale University
issn 2169-3536
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-5785739d218c4318b4464cb66b25a95a2025-02-07T00:01:32ZengIEEEIEEE Access2169-35362025-01-0113230132307110.1109/ACCESS.2025.353594310857272Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined NetworksAbdinasir Hirsi0https://orcid.org/0000-0001-8543-6134Mohammed A. Alhartomi1https://orcid.org/0000-0002-5955-8864Lukman Audah2https://orcid.org/0000-0002-0958-4474Adeb Salh3https://orcid.org/0000-0003-0905-2635Nan Mad Sahar4https://orcid.org/0000-0002-7861-8148Salman Ahmed5https://orcid.org/0009-0003-7129-7892Godwin Okon Ansa6https://orcid.org/0000-0003-1107-5959Abdullahi Farah7Advanced Telecommunication Research Center, Faculty of Electrical and Electronic Engineering, Universiti Tun Hussein Onn Malaysia, Parit Raja, MalaysiaDepartment of Electrical Engineering, University of Tabuk, Tabuk, Saudi ArabiaAdvanced Telecommunication Research Center, Faculty of Electrical and Electronic Engineering, Universiti Tun Hussein Onn Malaysia, Parit Raja, MalaysiaFaculty of Information and Communication Technology, University Tunku Abdul Rahman (UTAR), Kampar, MalaysiaInnovation and Entrepreneurship Centre (IEC), University of Tabuk, Tabuk, Saudi ArabiaVLSI and Embedded Technology (VEST) Focus Group, Faculty of Electrical and Electronic Engineering, Universiti Tun Hussein Onn Malaysia, Parit Raja, MalaysiaDepartment of Computer Science, Faculty of Physical Sciences, Akwa Ibom State University, Akwa Ibom, NigeriaEngineering Department, Somtel Telecommunication Company, Bosaso, Bari, SomaliaSoftware-Defined Networking (SDN) offers significant advantages for modern networks, including flexibility, centralized control, and reduced dependency on vendor-specific hardware. However, these benefits introduce security vulnerabilities, particularly from Distributed Denial-of-Service (DDoS) attacks, which represent some of the most disruptive threats to SDN environments. A review of the literature shows that while various techniques have been proposed to counteract DDoS threats, many studies have focused on single detection methods, with only a few utilizing multiple approaches. This fragmented focus limits a comprehensive approach to addressing DDoS threats across the SDN layers. To bridge this gap, this paper presents the first comprehensive review of DDoS anomaly detection in SDN, examining over 165 primary research articles published between 2020 and 2024. A novel taxonomy of DDoS attacks is introduced, categorizing them by distinct characteristics, and mapping each attack type to relevant detection methods within specific SDN layers. The survey provides a layer-by-layer analysis of DDoS detection techniques, covering the application, control, and infrastructure layers, and offers a structured overview that clarifies the applicability and effectiveness of each method. The paper concludes by synthesizing key findings, identifying unresolved challenges, and outlining future research directions to advance DDoS detection mechanisms in SDN. This roadmap is designed to guide researchers in addressing security vulnerabilities and enhancing SDN resilience against evolving DDoS threats.https://ieeexplore.ieee.org/document/10857272/Amplification attacksanomaly detectionbotnet attacksDDoS detectionflooding attacksprotocol attacks
spellingShingle Abdinasir Hirsi
Mohammed A. Alhartomi
Lukman Audah
Adeb Salh
Nan Mad Sahar
Salman Ahmed
Godwin Okon Ansa
Abdullahi Farah
Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
IEEE Access
Amplification attacks
anomaly detection
botnet attacks
DDoS detection
flooding attacks
protocol attacks
title Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
title_full Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
title_fullStr Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
title_full_unstemmed Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
title_short Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
title_sort comprehensive analysis of ddos anomaly detection in software defined networks
topic Amplification attacks
anomaly detection
botnet attacks
DDoS detection
flooding attacks
protocol attacks
url https://ieeexplore.ieee.org/document/10857272/
work_keys_str_mv AT abdinasirhirsi comprehensiveanalysisofddosanomalydetectioninsoftwaredefinednetworks
AT mohammedaalhartomi comprehensiveanalysisofddosanomalydetectioninsoftwaredefinednetworks
AT lukmanaudah comprehensiveanalysisofddosanomalydetectioninsoftwaredefinednetworks
AT adebsalh comprehensiveanalysisofddosanomalydetectioninsoftwaredefinednetworks
AT nanmadsahar comprehensiveanalysisofddosanomalydetectioninsoftwaredefinednetworks
AT salmanahmed comprehensiveanalysisofddosanomalydetectioninsoftwaredefinednetworks
AT godwinokonansa comprehensiveanalysisofddosanomalydetectioninsoftwaredefinednetworks
AT abdullahifarah comprehensiveanalysisofddosanomalydetectioninsoftwaredefinednetworks