Published: 20 March 2020| Version 1 | DOI: 10.17632/hkjbp67rsc.1
Oxicusa Gugi Housman,
Hafida Isnaini,
Fauzi Sumadi


Data consist of DDoS attacks in SDN which include the ICMP, TCP, and UDP flood. The attack was generated in Mininet Emulator using the Scapy and TCPReplay. The topology used was : sudo mn --topo tree,depth=3,fanout=2 --mac --controller remote,ip= performed by H1 to H4


Steps to reproduce

1) The *.pcap file was produced from packet generation process using scapy library. Each of the malicious packet consist of randomly generated IP source address which was targeted to H4. 2) On the next stage, the RYU controller was extended to have a capability for storing the attack information in *.csv file which extracted from packet's header information (IPv4, TCP, UDP, and ICMP) added with the port statistic data based on the incoming packet's information.


Universitas Muhammadiyah Malang


Computer Security