Novel Three-Tier Intrusion Detection and Prevention System in Software Defined Network

被引:14
|
作者
Ali, Amir [1 ,2 ]
Yousaf, Muhammad Murtaza [1 ]
机构
[1] Univ Punjab, Punjab Univ Coll Informat Technol, Lahore 54000, Pakistan
[2] UVAS, Dept Stat & Comp Sci, Lahore 54000, Pakistan
来源
IEEE ACCESS | 2020年 / 8卷
关键词
Feature extraction; Intrusion detection; Software defined networking; Machine learning algorithms; Support vector machines; Computer architecture; SDN security; IoT; intrusion prevention system; RFID; packet classification; ATTACKS; FLOW;
D O I
10.1109/ACCESS.2020.3002333
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software Defined Network (SDN) is a flexible paradigm that provides support for a variety of data-intensive applications with real-world smart Internet of Things (IoT) devices. This emerging architecture updates with the managing ability and network control. Still, the benefits are challenging to achieve due to the presence of intruder flow into the network. The research topic of intrusion detection and prevention system (IDPS) has grasped the attention to reduce the effect of intruders. Distributed Denial of Service (DDoS) is a targeted attack that develops malicious traffic is flooded into a particular network device. These intruders also involve even with legitimate network devices, the authenticated device will be compromised to inject malicious traffic. In this paper, we investigate the involvement of intruders in three-Tier IDPS with regard to user validation, packet validation and flow validation. Not all the authentication users can be legitimate, since they are compromised, so that the major contribution is to identify all the compromised devices by knee analysis of the packets. Routers are the edge devices employed in first tier which is responsible to validate the IoT user with RFID tag and encrypted signature. Then the authenticated user & x2019;s packets are submitted into second tier with switches that validates the packets using type-II fuzzy filtering. Then the key features are extracted from packets and they are classified into normal, suspicious and malicious. The mismatched packets are analyzed in controllers which maintain two queues as suspicious and normal. Then suspicious queue packets are classified and predicted using deep learning method. The proposed work is experimented in OMNeT & x002B;& x002B; environment and the performances are evaluated in terms of intruder Detection Rate, Failure Rate, Delay, Throughput and Traffic Load.
引用
收藏
页码:109662 / 109676
页数:15
相关论文
共 50 条
  • [1] The three-tier system
    Deagle, G
    [J]. CANADIAN FAMILY PHYSICIAN, 1999, 45 : 247 - 249
  • [2] Intrusion Detection System based on Software Defined Network Firewall
    Sayeed, Mohd Abuzar
    Sayeed, Mohd Asim
    Saxena, Sharad
    [J]. 2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 379 - 382
  • [3] Flexible Network-based Intrusion Detection and Prevention System on Software-defined Networks
    An Le
    Phuong Dinh
    Hoa Le
    Ngoc Cuong Tran
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP), 2015, : 106 - 111
  • [4] Intrusion Detection and Prevention in Software Defined Networking
    Goyal, Abhilash
    Gupta, Divyansh
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2018,
  • [5] An adaptive multistage intrusion detection and prevention system in software defined networking environment
    Maheswaran, N.
    Bose, S.
    Natarajan, Buvaneswari
    [J]. AUTOMATIKA, 2024, 65 (04) : 1364 - 1378
  • [6] A Novel Three-Tier SQLi Detection and Mitigation Scheme for Cloud Environments
    Rajeh, Wahid
    Abed, Alshreef
    [J]. 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (ICECOS), 2017, : 33 - 37
  • [7] A Recommendation System Based on Regression Model of Three-Tier Network Architecture
    Wang Bailing
    Huang Junheng
    Zhu Dongjie
    Hou Xilu
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016,
  • [8] Active software replication through a three-tier approach
    Baldoni, R
    Marchetti, C
    Termini, A
    [J]. 21ST IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2002, : 109 - 118
  • [9] Fully distributed three-tier active software replication
    Marchetti, Carlo
    Baldoni, Roberto
    Tucci-Piergiovanni, Sara
    Virgillito, Antonino
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2006, 17 (07) : 633 - 645
  • [10] Deployment of Intrusion Prevention System Based on Software Defined Networking
    Zhang, Lei
    Shou, Guochu
    Hu, Yihong
    Guo, Zhigang
    [J]. 2013 15TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2013, : 26 - 31