An Efficient Intrusion Detection Framework in Software-Defined Networking for Cybersecurity Applications

被引:10
|
作者
Alshammri, Ghalib H. [1 ,2 ]
Samha, Amani K. [3 ]
Hemdan, Ezz El-Din [4 ]
Amoon, Mohammed [1 ,4 ]
El-Shafai, Walid [5 ,6 ]
机构
[1] King Saud Univ, Community Coll, Dept Comp Sci, Riyadh 28095, Saudi Arabia
[2] Saudi Elect Univ, Sci Res, Riyadh, Saudi Arabia
[3] King Saud Univ, Coll Business Adm, Management Informat Syst Dept, Riyadh 28095, Saudi Arabia
[4] Menoufia Univ, Fac Elect Engn, Dept Comp Sci & Engn, Menoufia 32952, Egypt
[5] Prince Sultan Univ, Comp Sci Dept, Secur Engn Lab, Riyadh 11586, Saudi Arabia
[6] Menoufia Univ, Fac Elect Engn, Elect & Elect Commun Engn Dept, Menoufia 32952, Egypt
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 72卷 / 02期
关键词
Deep neural network; DL; WEKA; network traffic; intrusion and anomaly detection; SDN; clustering and classification; KDD dataset; CONTROL PLANE; SECURITY; QOS; SDN;
D O I
10.32604/cmc.2022.025262
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network management and multimedia data mining techniques have a great interest in analyzing and improving the network traffic process. In recent times, the most complex task in Software Defined Network (SDN) is security, which is based on a centralized, programmable controller. Therefore, monitoring network traffic is significant for identifying and revealing intrusion abnormalities in the SDN environment. Consequently, this paper provides an extensive analysis and investigation of the NSL-KDD dataset using five different clustering algorithms: K-means, Farthest First, Canopy, Density-based algorithm, and Exception-maximization (EM), using the Waikato Environment for Knowledge Analysis (WEKA) software to compare extensively between these five algorithms. Furthermore, this paper presents an SDN-based intrusion detection system using a deep learning (DL) model with the KDD (Knowledge Discovery in Databases) dataset. First, the utilized dataset is clustered into normal and four major attack categories via the clustering process. Then, a deep learning method is projected for building an efficient SDN-based intrusion detection system. The results provide a comprehensive analysis and a flawless reasonable study of different kinds of attacks incorporated in the KDD dataset. Similarly, the outcomes reveal that the proposed deep learning method provides efficient intrusion detection performance compared to existing techniques. For example, the proposed method achieves a detection accuracy of 94.21% for the examined dataset.
引用
收藏
页码:3529 / 3548
页数:20
相关论文
共 50 条
  • [1] Building a Platform for Software-Defined Networking Cybersecurity Applications
    Song, Chongya
    Perez-Pons, Alexander
    Yen, Kang K.
    2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), 2016, : 482 - 487
  • [2] Survey: Intrusion Detection System in Software-Defined Networking
    Janabi, Ahmed H.
    Kanakis, Triantafyllos
    Johnson, Mark
    IEEE ACCESS, 2024, 12 : 164097 - 164120
  • [3] An optimization-inspired intrusion detection model for software-defined networking
    Xu, Hui
    Bai, Longtan
    Huang, Wei
    ELECTRONIC RESEARCH ARCHIVE, 2025, 33 (01): : 231 - 254
  • [4] Applying Transfer Learning Approaches for Intrusion Detection in Software-Defined Networking
    Chuang, Hsiu-Min
    Ye, Li-Jyun
    SUSTAINABILITY, 2023, 15 (12)
  • [5] Verification Framework for Software-Defined Networking
    Kang, Miyoung
    Cho, Jong Jin
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 518 - 523
  • [6] Challenge-based collaborative intrusion detection in software-defined networking: an evaluation
    Li, Wenjuan
    Wang, Yu
    Jin, Zhiping
    Yu, Keping
    Li, Jin
    Xiang, Yang
    DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (02) : 257 - 263
  • [7] Challenge-based collaborative intrusion detection in software-defined networking: An evaluation
    Wenjuan Li
    Yu Wang
    Zhiping Jin
    Keping Yu
    Jin Li
    Yang Xiang
    Digital Communications and Networks, 2021, 7 (02) : 257 - 263
  • [8] Applying modified golden jackal optimization to intrusion detection for Software-Defined Networking
    Qiu, Feng
    Xu, Hui
    Li, Fukui
    ELECTRONIC RESEARCH ARCHIVE, 2024, 32 (01): : 418 - 444
  • [9] Software-defined networking
    Greene, Kate
    Technology Review, 2009, 112 (02)
  • [10] Software-Defined Networking
    Kirkpatrick, Keith
    COMMUNICATIONS OF THE ACM, 2013, 56 (09) : 16 - 19