Proposed approach to detect distributed denial of service attacks in software defined network using machine learning algorithms
Keywords:Software Defined Network, Distributed Deninal-of-Service Attack, Machine Learning Algorithm.
SDN (Software Defined Network) is rapidly gaining importance of â€˜programmable networkâ€™ infrastructure. The SDN architecture separates the Data plane (forwarding devices) and Control plane (controller of the SDN). This makes it easy to deploy new versions to the infrastructure and provides straightforward network virtualization. Distributed Denial-of-Service attack is a major cyber security threat to the SDN. It is equally vulnerable to both data plane and control plane. In this paper, machine learning algorithms such as NaÃ¯ve Bayesian, KNN, K Means, K-Medoids, Linear Regression, use to classify the incoming traffic as usual or unusual. Above mentioned algorithms are measured using the two metrics: accuracy and detection rate. The best fit algorithm is applied to implement the signature IDS which forms the module 1 of the proposed IDS. Second Module uses open connections to state the exact node which is an attacker and to block that particular IP address by placing it in Access Control List (ACL), thus increasing the processing speed of SDN as a whole.
 Peng Zhang, Huanzhao Wang, Chengchen Hu, and Chuang Lin, â€œOn Denial of Service Attacks in Software Defined Networksâ€, Network Forensics and Surveillance for Emerging Networks IEEE Network, Nov-Dec, 2016.
 Moreno Ambrosin, Mauro Conti, Fabio De, Nishanth Devarajan, â€œAmpliï¬ed Distributed Denial of Service Attack in Software Defined Networkingâ€, IEEE 2016.
 Lohit Barki, Amrit Shidling, Nisharani Meti, Narayan D G and Mohammed Moin Mulla, â€œDetection of Distributed Denial of Service Attacks in Software Defined Networksâ€, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Jaipur, India, Sept. 21-24, 2016.
 Raphael Durner, Claas Lorenz, Michael Wiedemann, Wolfgang Kellere, â€œDetecting and Mitigating Denial of Service Attacks against the Data Plane in Software Defined Networksâ€, IEEE 2017.
 Damian Jankowski, and Marek Amanowicz, â€œOn Efficiency of Selected Machine Learning Algorithms for Intrusion Detection in Software Defined Networksâ€, International Journal of Electronics and Telecommunications, 2016.
 Saurav Nanda, Faheem Zafari, Casimer DeCusatis, Eric Wedaa and Baijian Yan, â€œPredicting Network Attack Patterns in SDN using Machine Learning Approachâ€, IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016.
 S. Umarani, D. Sharmila, â€œPredicting Application Layer DDoS Attacks Using Machine Learning Algorithmsâ€, World Academy of Science, Engineering and Technology, IJCEACIE, Vol. 8, No.10, 2014.
 Mohammad Reza Parsaei, Mohammad Javad Sobouti, Seyed Raouf khayami, and Reza Javidan, â€œNetwork Traffic Classification using Machine Learning Techniques over Software Defined Networksâ€ IJACSA, Vol. 8, No.7, 2017.
 LongTail, â€œLongTail Log Analysis Dashboardâ€. http://longtail.it.marist. edu/honey/dashboard.shtml. [Online; accessed 22-April-2016].
 T. Padmapriya, V.Saminadan, â€œPerformance Improvement in long term Evolution-advanced network using multiple imput multiple output techniqueâ€, Journal of Advanced Research in Dynamical and Control Systems, Vol. 9, Sp-6, pp: 990-1010, 2017.
 S.V.Manikanthan and V.Ramaâ€œOptimal Performance Of Key Predistribution Protocol In Wireless Sensor Networksâ€ International Innovative Research Journal of Engineering and Technology ,ISSN NO: 2456-1983,Vol-2,Issue â€“Special â€“March 2017.
 Harikishore Kakarla, Madhavi Latha M and Habibulla Khan, â€œTransition Optimization in Fault Free Memory Application Using Bus-Align Modeâ€, European Journal of Scientific Research, Vol.112, No.2, pp.237-245, ISSN: 1450-216x135 /1450-202x, October 2013.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).