Network Security against DDoS attacks using the Floodlight controller

Authors

Keywords:

DDos attack, Floodlight, Cyber attack, Simulation

Abstract

Nowadays, the Internet is perhaps one of the most important means to carry out movements and transactions worldwide, which determines the importance of the demanding protection of the computer systems that control all these movements, which are vulnerable to cyber threats. Among the most common attacks that exist, which make systems more vulnerable and difficult to solve, are the Distributed Denial of Service or DDos, which seeks to interrupt the operation of a service, network or website, causing the flooding of the target with a large number of malicious traffic, exhausting the resources of the affected application and without the possibility of responding to legitimate requests. The way in which this type of attacks can be faced is by performing simulations that help us to identify and analyze the vulnerability of our services with respect to DDoS attacks, in order to generate early detection and mitigation strategies. This study analyzes the implementation of a service with the Floodlight controller to prevent cyber attacks.

Author Biographies

Jorge Gómez Gómez, Universidad de Córdoba

Research professor at the Faculty of Systems Engineering.

Eylin Ortega Buelvas, Universidad de Córdoba

Robotics and programming teacher.

Carlos Martínez Guerra, Universidad de Córdoba

Systems Engineer, Backend developer specialized in RESTful APIs with Laravel and Spring Boot, frontend with Vue.js.

References

Cortés, J. P. (2016). Defensa proactiva y reactiva ante ataques DDoS en un entorno simulado de redes definidas por software.

Clavo Tafur, C. J. (2022). Análisis comparativo de técnicas de mitigación de ataque de DDOS en Cloud Computing.

Evaluación de ataques de Denegación de servicio DoS y DDoS, y mecanismos de protección. (2016). GEEKS DECC-REPORTS, 2(1). https://doi.org/10.24133/gdr.v2i1.249

Gómez, P. P. Estudio de ataques DDoS basados en DNS.

Guanoluisa Jaramillo, E. D. (2019). Diseño de la arquitectura de una red SDN mediante el protocolo Openflow con si-mulación en el software mininet para la infraestructura de una PYMES (Bachelor's thesis, Quito: Universidad de las Américas, 2019).

Melendres Del Pezo, S. M. (2023). Propuesta de implementación de una red SDN por medio del controlador Floodlight y MiniNet para la institución unidad educativa Americano (Bachelor's thesis, La Libertad: Universidad Estatal Península de Santa Elena, 2023.).

Molina, L., Cevallos, Y., Machado, G., & Furfaro, A. El enemigo moderno: Ataques DDoS en la capa de red y de aplicacion.

Ruipérez Cuesta, J. (2021). Seguridad en Redes definidas por software (SDN) (Doctoral dissertation, Universitat Politècnica de València).

Downloads

Published

2025-10-24

How to Cite

Gómez Gómez, J., Ortega Buelvas, E., & Martínez Guerra, C. (2025). Network Security against DDoS attacks using the Floodlight controller. OnBoard Knowledge Journal, 1(02), 1–11. Retrieved from https://revistasescuelanaval.com/obk/article/view/63

Issue

Section

Articles