Software Defined Networking “DDoS mitigation with SDN” (Bachelor thesis)

Αλίτσκας, Μάριος


Traditional networks nowadays have become too complex, proprietary, difficult to manage, and closed. In a world driven by applications and services, on the network level it is difficult to innovate and follow the agile methodologies used for the creation of new services within a data centre, on interconnected data centres, or within enterprises, and most important in some cases the network can become a barrier to the continued growth of the internet traffic. SDN is a new emerging paradigm of networking and is about to change the way a network is, built and operated, in order to achieve agility. The network is evolving and will no longer be proprietary, closed and difficult to program, but elastic, flexible and agile. SDN is transforming networks towards an open and programmable era. SDN gives more power and control over the infrastructure, allowing customization, optimization, and it is reducing the overall capital and operational costs for a business, allowing them to explore new opportunities and methodologies. With the introduction of SDN, new security capabilities are expected to be identified and explored within the next years to come. Security is one of the areas that SDN can add value, alongside with the development and standardization efforts that are driving the concept of the SDN.
Institution and School/Department of submitter: Σχολή Τεχνολογικών Εφαρμογών/Τμήμα Μηχανικών Πληροφορικής
Subject classification: Software-defined networking (Computer network technology)
Δικτύωση καθορισμένη από λογισμικό (Τεχνολογία δικτύου υπολογιστή)
Τεχνολογία λογισμικού
Software engineering
Keywords: Software Defined Networking;DDoS;SDN
Description: Πτυχιακή εργασία--Σχολή Τεχνολογικών Εφαρμογών--Τμήμα Μηχανικών Πληροφορικής,2015--7050
URI: http://195.251.240.227/jspui/handle/123456789/12726
Table of contents: Contents Table of Figures..................................................................................................................................1 Abstract ................................................................................................................................................4 1. Introduction .................................................................................................................................5 2. What is SDN? ..............................................................................................................................7 2.1 Definition..............................................................................................................................7 2.2 Architecture.........................................................................................................................8 2.2.1 Infrastructure Layer...................................................................................................9 2.2.2 Control Layer...............................................................................................................9 2.2.3 Application Layer.....................................................................................................10 2.2.4 Northbound Interface..............................................................................................10 2.2.5 Southbound Interface .............................................................................................11 2.3 SDN Deployment Models ...............................................................................................11 2.3.1 Underlay Model.............................................................................................................11 2.3.2 Overlay Model ...............................................................................................................12 2.4 Research Challenges: Scalability & Performance...................................................12 3. Related Technologies .............................................................................................................15 3.1 OpenFlow ...........................................................................................................................15 3.1.1 Intro to OpenFlow ........................................................................................................15 3.1.2 How OpenFlow works .................................................................................................15 3.2 NFV.......................................................................................................................................17 3.2.1 Intro to NFV....................................................................................................................17 3.2.2 NFV components..........................................................................................................18 3.2.3 NFV architecture...........................................................................................................19 4 Standardization Efforts...........................................................................................................21 5 IMPLEMENTATION...................................................................................................................24 5.1 Tools....................................................................................................................................24 5.1.1 VirtualBox...................................................................................................................24 5.1.2 Mininet.........................................................................................................................26 5.1.3 ODL SDN controller.................................................................................................29 5.1.4 sFlow analytics.........................................................................................................31 5.1.5 POSTMAN...................................................................................................................32 5.1.6 Hyperglance.....................................................................................................................32 5.2 Implementation Explained.............................................................................................34 Πτυχιακή εργασία του φοιτητή Μάριου Αλίτσκα Page 3 of 75 6 USE CASES ...............................................................................................................................48 6.1 Dynamic Service Chaining ............................................................................................48 6.1.1 TRADITIONAL SERVICE CHAINING ....................................................................48 6.1.2 Dynamic Service Chaining ....................................................................................49 6.1.3 Benefits.......................................................................................................................51 6.2 vCPE....................................................................................................................................51 6.2.1 Traditional CPE.........................................................................................................52 6.2.2 Virtual Customer Premises Equipment (vCPE)................................................53 6.2.3 VCPE potential approaches ..................................................................................55 6.2.4 Benefits.......................................................................................................................5 6 6.3 Software Defined Security.............................................................................................58 6.3.1 Traditional Security Architecture.........................................................................58 6.3.2 Software Defined Security Architecture.............................................................60 6.3.3 Solutions ....................................................................................................................62 6.3.4 Benefits.......................................................................................................................63 6.4 Telco over Cloud (ToC)...................................................................................................64 6.4.1 Traditional Mobile Architecture (Telco)..............................................................65 6.4.2 Next generation Telco - Telco over Cloud.........................................................66 6.4.3 Benefits.......................................................................................................................67 7Conclusion.................................................................................................................................68 REFERENCES:..................................................................................................................................70
Appears in Collections:Πτυχιακές Εργασίες

Files in This Item:
There are no files associated with this item.



 Please use this identifier to cite or link to this item:
http://195.251.240.227/jspui/handle/123456789/12726
  This item is a favorite for 0 people.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.