One of the emerging technologies in the field of networking is the Software Defined Networking (SDN). Since it is a centrally controlled networks, it provides us with a better control to improve the security within our network against the potential threats. In this work we are using Deep Neural Network (DNN) model to detect the flow-based anomaly within the network. The model was trained on NSL-KDD dataset and out of forty-one features only six of the most relevant features of NSL-KDD were used. The results show that Deep Learning approach shows some promising results in detecting the anomaly in the SDN environment.
Naqib Ullah Dr. Abdus Salam Intrusion Detection System for SDN based IoT Devices using Deep Neural Network International Journal of Engineering Works Vol. 7 Issue 09 PP. 293-297 September 2020 https://doi.org/10.34259/ijew.20.709293297.
[1] “Software Defined Networking Definition,” Available:https://www.opennetworking.org/sdn-resources/sdn-definition,[Accessed 04 Jul. 2016].
[2] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson,J. Rexford, S. Shenker, and J. Turner, “Openflow: enabling innovation in campus networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, 2008
[3] S. Jain, A. Kumar, S. Mandal, J. Ong, L. Poutievski, A. Singh,
S. Venkata, J. Wanderer, J. Zhou, M. Zhu et al., “B4: Experience witha globally-deployed software defined wan,” ACM SIGCOMM Computer Communication Review, vol. 43, no. 4, pp. 3–14, 2013.
[4] C. T. Huawei Press Centre and H. unveil world’s first commercial
deployment of SDN in carrier networks, “[online]. available: pr.huawei.com/en/news/hw-332209-sdn.htm.”
[5] N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker, “Nox: towards an operating system for networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 3, pp. 105– 110, 2008.
[6] “Ryu,” Available: http://http://osrg.github.io/ryu/.
[7] “Floodlight,” Available: http://www.projectfloodlight.org/.
[8] D. Kreutz, F. Ramos, and P. Verissimo, “Towards secure and dependable software-defined networks,” in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking.ACM, 2013, pp. 55–60.
[9] R. Sommer and V. Paxson, “Outside the closed world: On using machinelearning for network intrusion detection,” in 2010 IEEE symposium onsecurity and privacy. IEEE, 2010, pp. 305–316.
[10] M. Tavallaee, E. Bagheri, W. Lu, and A.-A. Ghorbani, “A detailed
analysis of the kdd cup 99 data set,” in Proceedings of the Second IEEE
Symposium on Computational Intelligence for Security and Defence
Applications, 2009.
[11] Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and M. Sheikhan,“Flow-based anomaly detection using neural network optimized with gsa algorithm,” in 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops, 2013, pp. 76–81.
[12] P. Winter, E. Hermann, and M. Zeilinger, “Inductive intrusion detection in flow-based network data using one-class support vector machines,”in New Technologies, Mobility and Security (NTMS), 2011 4th IFIPInternational Conference on. IEEE, 2011, pp. 1–5.
[13] S. A. Mehdi, J. Khalid, and S. A. Khayam, “Revisiting traffic anomaly detection using software defined networking,” in International Workshop on Recent Advances in Intrusion Detection. Springer, 2011, pp. 161–180.
[14] “Q1 2016 State of the Internet / Security Report,” Available: https://content.akamai.com/PG6301-SOTI-Security.html, [Accessed 07Jul. 2016].
[15] R. Braga, E. Mota, and A. Passito, “Lightweight ddos flooding attackdetection using nox/openflow,” in Local Computer Networks (LCN),2010 IEEE 35th Conference on. IEEE, 2010, pp. 408–415.
[16] K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, and V. Maglaris, “Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on sdn environments,” Computer Networks, vol. 62, pp. 122–136, 2014.
[17] P. Van Trung, T. T. Huong, D. Van Tuyen, D. M. Duc, N. H. Thanh, and A. Marshall, “A multi-criteria-based ddos-attack prevention solution using software defined networking,” in Advanced Technologies forCommunications (ATC), 2015 International Conference on. IEEE,2015, pp. 308–313.
[18] “KDD Cup 1999,” Available: http://kdd.ics.uci.edu/databases/kddcup99/,[Accessed 04 Jul. 2016]