ISSN E 2409-2770
ISSN P 2521-2419

Intrusion Detection System for SDN based IoT Devices using Deep Neural Network


 


Vol. 7, Issue 09, PP. 293-297, September 2020

DOI

Keywords: Internet of Things, Software-defined networking, anomoly detection, machine learning

Download PDF


One of the emerging technologies in the field of networking is the Software Defined Networking (SDN). Since it is a centrally controlled networks, it provides us with a better control to improve the security within our network against the potential threats. In this work we are using Deep Neural Network (DNN) model to detect the flow-based anomaly within the network. The model was trained on NSL-KDD dataset and out of forty-one features only six of the most relevant features of NSL-KDD were used. The results show that Deep Learning approach shows some promising results in detecting the anomaly in the SDN environment.


  1. Naqib Ullah , , Abasyn University, Peshawar, Pakistan.
  2. Abdus Salam , , Abasyn University, Peshawar, Pakistan.

Naqib Ullah Dr. Abdus Salam Intrusion Detection System for SDN based IoT Devices using Deep Neural Network International Journal of Engineering Works Vol. 7 Issue 09 PP. 293-297 September 2020 https://doi.org/10.34259/ijew.20.709293297.


[1]      “Software Defined Networking Definition,” Available:https://www.opennetworking.org/sdn-resources/sdn-definition,[Accessed 04 Jul. 2016].

[2]     N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson,J. Rexford, S. Shenker, and J. Turner, “Openflow: enabling innovation in campus networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, 2008

[3]     S. Jain, A. Kumar, S. Mandal, J. Ong, L. Poutievski, A. Singh,

S. Venkata, J. Wanderer, J. Zhou, M. Zhu et al., “B4: Experience witha globally-deployed software defined wan,” ACM SIGCOMM Computer Communication Review, vol. 43, no. 4, pp. 3–14, 2013.

[4]     C. T. Huawei Press Centre and H. unveil world’s first commercial

deployment of SDN in carrier networks, “[online]. available: pr.huawei.com/en/news/hw-332209-sdn.htm.”

[5]     N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker, “Nox: towards an operating system for networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 3, pp. 105– 110, 2008.

[6]     “Ryu,” Available: http://http://osrg.github.io/ryu/.

[7]     “Floodlight,” Available: http://www.projectfloodlight.org/.

[8]     D. Kreutz, F. Ramos, and P. Verissimo, “Towards secure and dependable software-defined networks,” in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking.ACM, 2013, pp. 55–60.

[9]     R. Sommer and V. Paxson, “Outside the closed world: On using machinelearning for network intrusion detection,” in 2010 IEEE symposium onsecurity and privacy. IEEE, 2010, pp. 305–316.

[10]  M. Tavallaee, E. Bagheri, W. Lu, and A.-A. Ghorbani, “A detailed

analysis of the kdd cup 99 data set,” in Proceedings of the Second IEEE

Symposium on Computational Intelligence for Security and Defence

Applications, 2009.

[11]  Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and M. Sheikhan,“Flow-based anomaly detection using neural network optimized with gsa algorithm,” in 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops, 2013, pp. 76–81.

[12]  P. Winter, E. Hermann, and M. Zeilinger, “Inductive intrusion detection in flow-based network data using one-class support vector machines,”in New Technologies, Mobility and Security (NTMS), 2011 4th IFIPInternational Conference on. IEEE, 2011, pp. 1–5.

[13]  S. A. Mehdi, J. Khalid, and S. A. Khayam, “Revisiting traffic anomaly detection using software defined networking,” in International Workshop on Recent Advances in Intrusion Detection. Springer, 2011, pp. 161–180.

[14]  “Q1 2016 State of the Internet / Security Report,” Available: https://content.akamai.com/PG6301-SOTI-Security.html, [Accessed 07Jul. 2016].

[15]  R. Braga, E. Mota, and A. Passito, “Lightweight ddos flooding attackdetection using nox/openflow,” in Local Computer Networks (LCN),2010 IEEE 35th Conference on. IEEE, 2010, pp. 408–415.

[16]  K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, and V. Maglaris, “Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on sdn environments,” Computer Networks, vol. 62, pp. 122–136, 2014.

[17]  P. Van Trung, T. T. Huong, D. Van Tuyen, D. M. Duc, N. H. Thanh, and A. Marshall, “A multi-criteria-based ddos-attack prevention solution using software defined networking,” in Advanced Technologies forCommunications (ATC), 2015 International Conference on. IEEE,2015, pp. 308–313.

[18]  “KDD Cup 1999,” Available: http://kdd.ics.uci.edu/databases/kddcup99/,[Accessed 04 Jul. 2016]