Software Defined Networking “DDoS mitigation with SDN” (Bachelor thesis)

Αλίτσκας, Μάριος


Full metadata record
DC FieldValueLanguage
dc.contributor.authorΑλίτσκας, Μάριοςel
dc.date.accessioned2020-12-15T19:20:36Z-
dc.date.available2020-12-15T19:20:36Z-
dc.identifier.urihttp://195.251.240.227/jspui/handle/123456789/12726-
dc.descriptionΠτυχιακή εργασία--Σχολή Τεχνολογικών Εφαρμογών--Τμήμα Μηχανικών Πληροφορικής,2015--7050el
dc.rightsDefault License-
dc.subjectSoftware Defined Networkingen
dc.subjectDDoSen
dc.subjectSDNen
dc.titleSoftware Defined Networking “DDoS mitigation with SDN”en
heal.typebachelorThesis-
heal.type.enBachelor thesisen
heal.generalDescriptionΠτυχιακήel
heal.classificationSoftware-defined networking (Computer network technology)en
heal.classificationΔικτύωση καθορισμένη από λογισμικό (Τεχνολογία δικτύου υπολογιστή)el
heal.classificationΤεχνολογία λογισμικούel
heal.classificationSoftware engineeringen
heal.identifier.secondary7050-
heal.languageen-
heal.accessaccount-
heal.recordProviderΣχολή Τεχνολογικών Εφαρμογών/Τμήμα Μηχανικών Πληροφορικήςel
heal.publicationDate2015-10-02-
heal.bibliographicCitation<<Μάριος Αλίτσκας>>, <<Software Defined Networking “DDoS mitigation with SDN”>>, <<Σχολή Τεχνολογικών Εφαρμογών/Τμήμα Μηχανικών Πληροφορικής>>,<<Σχολή Τεχνολογικών Εφαρμογών/Τμήμα Μηχανικών Πληροφορικής>>, <<Τ.Ε.Ι. Θεσσαλονίκης>>, <<2015>>el
heal.abstractTraditional networks nowadays have become too complex, proprietary, difficult to manage, and closed. In a world driven by applications and services, on the network level it is difficult to innovate and follow the agile methodologies used for the creation of new services within a data centre, on interconnected data centres, or within enterprises, and most important in some cases the network can become a barrier to the continued growth of the internet traffic. SDN is a new emerging paradigm of networking and is about to change the way a network is, built and operated, in order to achieve agility. The network is evolving and will no longer be proprietary, closed and difficult to program, but elastic, flexible and agile. SDN is transforming networks towards an open and programmable era. SDN gives more power and control over the infrastructure, allowing customization, optimization, and it is reducing the overall capital and operational costs for a business, allowing them to explore new opportunities and methodologies. With the introduction of SDN, new security capabilities are expected to be identified and explored within the next years to come. Security is one of the areas that SDN can add value, alongside with the development and standardization efforts that are driving the concept of the SDN.en
heal.tableOfContentsContents Table of Figures..................................................................................................................................1 Abstract ................................................................................................................................................4 1. Introduction .................................................................................................................................5 2. What is SDN? ..............................................................................................................................7 2.1 Definition..............................................................................................................................7 2.2 Architecture.........................................................................................................................8 2.2.1 Infrastructure Layer...................................................................................................9 2.2.2 Control Layer...............................................................................................................9 2.2.3 Application Layer.....................................................................................................10 2.2.4 Northbound Interface..............................................................................................10 2.2.5 Southbound Interface .............................................................................................11 2.3 SDN Deployment Models ...............................................................................................11 2.3.1 Underlay Model.............................................................................................................11 2.3.2 Overlay Model ...............................................................................................................12 2.4 Research Challenges: Scalability & Performance...................................................12 3. Related Technologies .............................................................................................................15 3.1 OpenFlow ...........................................................................................................................15 3.1.1 Intro to OpenFlow ........................................................................................................15 3.1.2 How OpenFlow works .................................................................................................15 3.2 NFV.......................................................................................................................................17 3.2.1 Intro to NFV....................................................................................................................17 3.2.2 NFV components..........................................................................................................18 3.2.3 NFV architecture...........................................................................................................19 4 Standardization Efforts...........................................................................................................21 5 IMPLEMENTATION...................................................................................................................24 5.1 Tools....................................................................................................................................24 5.1.1 VirtualBox...................................................................................................................24 5.1.2 Mininet.........................................................................................................................26 5.1.3 ODL SDN controller.................................................................................................29 5.1.4 sFlow analytics.........................................................................................................31 5.1.5 POSTMAN...................................................................................................................32 5.1.6 Hyperglance.....................................................................................................................32 5.2 Implementation Explained.............................................................................................34 Πτυχιακή εργασία του φοιτητή Μάριου Αλίτσκα Page 3 of 75 6 USE CASES ...............................................................................................................................48 6.1 Dynamic Service Chaining ............................................................................................48 6.1.1 TRADITIONAL SERVICE CHAINING ....................................................................48 6.1.2 Dynamic Service Chaining ....................................................................................49 6.1.3 Benefits.......................................................................................................................51 6.2 vCPE....................................................................................................................................51 6.2.1 Traditional CPE.........................................................................................................52 6.2.2 Virtual Customer Premises Equipment (vCPE)................................................53 6.2.3 VCPE potential approaches ..................................................................................55 6.2.4 Benefits.......................................................................................................................5 6 6.3 Software Defined Security.............................................................................................58 6.3.1 Traditional Security Architecture.........................................................................58 6.3.2 Software Defined Security Architecture.............................................................60 6.3.3 Solutions ....................................................................................................................62 6.3.4 Benefits.......................................................................................................................63 6.4 Telco over Cloud (ToC)...................................................................................................64 6.4.1 Traditional Mobile Architecture (Telco)..............................................................65 6.4.2 Next generation Telco - Telco over Cloud.........................................................66 6.4.3 Benefits.......................................................................................................................67 7Conclusion.................................................................................................................................68 REFERENCES:..................................................................................................................................70en
heal.advisorNameΧατζημίσιος , Περικλήςel
heal.committeeMemberNameΧατζημίσιος, Περικλής-
heal.academicPublisherΣχολή Τεχνολογικών Εφαρμογών/Τμήμα Μηχανικών Πληροφορικήςel
heal.academicPublisherIDteithe-
heal.numberOfPages75-
heal.fullTextAvailabilityfalse-
heal.type.elΠροπτυχιακή/Διπλωματική εργασίαel
Appears in Collections:Πτυχιακές Εργασίες

Files in This Item:
There are no files associated with this item.



 Please use this identifier to cite or link to this item:
http://195.251.240.227/jspui/handle/123456789/12726
  This item is a favorite for 0 people.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.