OnBoard Knowledge Journal 2025, 1, 1
2 of 12
la administración dinámica del tráfico y la identificación de patrones anómalos. Se realizaron pruebas controladas de
ataques simulados para observar el comportamiento del sistema y medir su capacidad de respuesta. Los resultados
evidenciaron que la integración del controlador Floodlight permite mejorar significativamente la detección y respuesta
ante eventos de saturación de tráfico, reduciendo la probabilidad de interrupciones críticas. En conclusión, la utilización
de entornos SDN constituye una alternativa eficaz para fortalecer la ciberseguridad en infraestruc-turas de red, brindando
un marco adaptable para el monitoreo, la prevención y la mitigación de ataques DDoS.
Palabras clave: Ataque cibernético; Ataque DDoS; Floodlight; Simulación.
1. Introduction
In the current context, the Internet has become a key platform for transactions and service delivery at
a global scale, which highlights the importance of protecting computer systems against cyber threats such
as Distributed Denial of Service (DDoS) attacks. These attacks aim to saturate the resources of networks or
applications through massive volumes of malicious traffic, thereby affecting the availability and performance
of legitimate services [6].
Software-Defined Networking (SDN) has emerged as an effective approach to mitigate such attacks by
centralizing traffic management and enabling rapid responses to anomalous behavior [2]. Controllers such as
Floodlight are particularly relevant due to their ability to monitor network traffic, enforce dynamic rules, and
filter malicious flows, thus enhancing overall network security. Additionally, the use of simulation tools such
as Mininet is essential for testing mitigation strategies in controlled environments, allowing vulnerabilities to
be identified and system behavior to be evaluated under realistic attack scenarios.
Numerous studies have addressed DDoS attack mitigation in SDN environments from different per-
spectives. According to [4], SDN represents a paradigm shift in communication networks by separating the
control and data planes and relying on a centralized controller that enables flexible and adaptive network
management. That work proposes a defense mechanism against HTTP flooding attacks based on a dual strat-
egy combining proactive and reactive techniques, implemented in a Mininet-based simulated environment.
The experimental results demonstrate that such mechanisms can provide an additional layer of security while
preserving quality of service.
From a broader perspective, the use of SDN controllers has become a fundamental strategy for pro-
tection against DDoS attacks, particularly in scenarios involving Internet of Things (IoT) devices. In this
context, controllers centralize network intelligence and allow precise traffic monitoring, facilitating the
rapid identification of abnormal patterns associated with DDoS attacks and the application of immediate
countermeasures, such as blocking suspicious IP addresses or limiting bandwidth. This approach has been
shown to improve detection and response capabilities in controlled environments, thereby minimizing the
impact of attacks on affected servers.
According to [8], effective mitigation of DDoS attacks requires centralized network administration and
the application of real-time defense strategies. By implementing a centralized SDN controller, it becomes
possible to continuously monitor traffic, detect attack patterns, and make rapid decisions to isolate malicious
connections while maintaining service availability for legitimate users. Recent studies further demonstrate
that SDN-based approaches optimize network resource utilization and reduce response times through the
use of simulated attack scenarios in controlled environments, as achieved with tools such as NeSSi2.
Similarly, [1] propose effective DDoS mitigation solutions based on robust firewall configurations and
software modules such as IPTables and MOD_EVASIVE. When integrated into SDN control systems, these
mechanisms can significantly reduce the load of malicious packets on servers by automatically blocking
suspicious sources and enforcing request-limiting policies. Such strategies have been reported to reduce the
impact of DDoS attacks on network infrastructure by up to 80%.
In this context, the present study focuses on the implementation of the Floodlight controller within
simulated environments to strengthen detection and response strategies against DDoS attacks. Emphasis is