Table 1 Startegy used and limitation of existing defense mechanism based on their categories: traffic management and access control.

From: An efficient three-tier defense mechanism for mitigation of DDoS attack with port connection analysis in SDN

Category

Approach

Description

Key limitations

Traffic Management

Connection Management (Shin et al.3)

utilized connection management and trigger activation to prevent unauthorized access ahead of time.

Their method does not differentiate between individual switch levels, which causes legitimate traffic to be unnecessarily blocked.

FloodGuard (Wang et al.4)

presented FloodGuard that includes proactive flow rule installation and packet migration for dynamic traffic control.

Although this technique is effective, it applies rate-limited packet processing indiscriminately and could thus degrade service quality to legitimate users due to huge volumes of traffic.

FlowFense (Piedrahita et al.5)

proposed FlowFense which constrains bandwidth upon detection of congestion.

This method has the potential to penalize any traffic passing through affected pathways, even legitimate traffic.

SDN-Guard (Dridi et al.6)

proposed SDN-Guard, which dynamically reroutes traffic and adjusts flow timeouts to mitigate threats.

However, it lacks detailed flow-specific analysis, causing unnecessary rerouting in unaffected network segments.

Access Control

Flow Tracking (Wang et al.7)

focused on stringent access controls and network flow tracking to enhance security.

Though, their approach requires frequent updates and can delay legitimate traffic.

Peer Support (Yuan et al.8)

utilized a peer support strategy to redistribute processing loads and manage flow table resources.

But, this technique overlooks the attack’s origin, leading to potential inefficiencies in resource distribution.

ArOMA (Sahay et al.9)

proposed ArOMA, which facilitates automated mitigation actions between customers and ISP controllers.

However, this centralized policy generation can lead to delays and create a single point of failure.

C2C Protocols (Hameed et al.10)

advocated for Controller-to-Controller communication protocols to expedite attack information distribution for swift, collaborative defense.

However, this method may neglect the detailed data provided by individual switch flow tables, potentially causing inefficiencies in response times and mitigation efforts.

SGS Framework (Wang et al.11)

introduced the SGS framework for workload distribution and targeted traffic management.

But, it could potentially simplify DDoS threat responses by not fully utilizing flow table data.