IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v11y2023i8p1897-d1125492.html
   My bibliography  Save this article

From Replay to Regeneration: Recovery of UDP Flood Network Attack Scenario Based on SDN

Author

Listed:
  • Yichuan Wang

    (School of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, China
    Shaanxi Key Laboratory for Network Computing and Security Technology, Xi’an 710048, China)

  • Junxia Ding

    (School of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, China)

  • Tong Zhang

    (School of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, China)

  • Yeqiu Xiao

    (School of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, China)

  • Xinhong Hei

    (School of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, China
    Shaanxi Key Laboratory for Network Computing and Security Technology, Xi’an 710048, China)

Abstract

In recent years, various network attacks have emerged. These attacks are often recorded in the form of Pcap data, which contains many attack details and characteristics that cannot be analyzed through traditional methods alone. Therefore, restoring the network attack scenario through scene reconstruction to achieve data regeneration has become an important entry point for detecting and defending against network attacks. However, current network attack scenarios mainly reproduce the attacker’s attack steps by building a sequence collection of attack scenarios, constructing an attack behavior diagram, or simply replaying the captured network traffic. These methods still have shortcomings in terms of traffic regeneration. To address this limitation, this paper proposes an SDN-based network attack scenario recovery method. By parsing Pcap data and utilizing network topology reconstruction, probability, and packet sequence models, network traffic data can be regenerated. The experimental results show that the proposed method is closer to the real network, with a higher similarity between the reconstructed and actual attack scenarios. Additionally, this method allows for adjusting the intensity of the network attack and the generated topology nodes, which helps network defenders better understand the attackers’ posture and analyze and formulate corresponding security strategies.

Suggested Citation

  • Yichuan Wang & Junxia Ding & Tong Zhang & Yeqiu Xiao & Xinhong Hei, 2023. "From Replay to Regeneration: Recovery of UDP Flood Network Attack Scenario Based on SDN," Mathematics, MDPI, vol. 11(8), pages 1-22, April.
  • Handle: RePEc:gam:jmathe:v:11:y:2023:i:8:p:1897-:d:1125492
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/11/8/1897/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/11/8/1897/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:11:y:2023:i:8:p:1897-:d:1125492. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.