Attack detection analysis in software-defined networks using various machine learning method

Wang, Y. and Wang, X. and Ariffin, M.M. and Abolfathi, M. and Alqhatani, A. and Almutairi, L. (2023) Attack detection analysis in software-defined networks using various machine learning method. Computers and Electrical Engineering, 108. ISSN 00457906

Full text not available from this repository.
Official URL: https://www.scopus.com/inward/record.uri?eid=2-s2....

Abstract

The Software-Defined Network (SDN) provides a more flexible and effectively managed network design for next-generation networking. Network managers can easily manage and regulate the entire network using its programmable central controller architecture. This central controller serves as the focal point for numerous attack vectors due to its centralized structure. However, Distributed Denial of Service (DDoS) attacks against the SDN is the most prominent. The goal of this project is to use a machine learning method to categorize SDN traffic as either attack or normal traffic. Next, the Feature Selection method, such as the Filter-based Fisher score method, Wrapper-based method, and analysis of variables (ANOVA) f-test, is used for finely-granulated detection. Then, a rule-based detection method using the Renyi joint entropy algorithm is employed to detect DDoS attacks on SDN controllers. We manage a public "DDoS attack SDN Dataset" with 23 attributes overall. The dataset includes normal and attack traffic for the Internet Control Message Protocol (ICMP), User Datagram Protocol (UDP), and Transmission Control Protocol (TCP). Except for attributes that specify the target and source machines, the dataset, which contains more than 100,000 recordings, has statistical features such as byte count, duration sec, packet rate, and packet per flow. In the classification process, many classifiers such as Artificial Neural Network (ANN), XGBoost (XGB), Support Vector Machine (SVM), and k-Nearest Neighbor (k-NN) were used. The test results demonstrated the efficacy and efficiency of the suggested strategy using the analysis of variables (ANOVA), which performed better than competing methods across a range of evaluation parameters. © 2023

Item Type: Article
Additional Information: cited By 8
Uncontrolled Keywords: Analysis of variance (ANOVA); Deep learning; Denial-of-service attack; Entropy; Feature Selection; Learning algorithms; Learning systems; Nearest neighbor search; Neural networks; Next generation networks; Support vector machines; Transmission control protocol, Attack detection; Deep learning; Distributed denial of service; Entropy algorithms; Features selection; Joint entropy; Machine-learning; Renyi joint entropy algorithm; Software denied networking; Software-defined networks, Controllers
Depositing User: Mr Ahmad Suhairi UTP
Date Deposited: 04 Jun 2024 14:10
Last Modified: 04 Jun 2024 14:10
URI: https://khub.utp.edu.my/scholars/id/eprint/18592

Actions (login required)

View Item
View Item