An Efficient Intrusion Detection Framework in Software-Defined Networking for Cybersecurity Applications

被引:10
|
作者
Alshammri, Ghalib H. [1 ,2 ]
Samha, Amani K. [3 ]
Hemdan, Ezz El-Din [4 ]
Amoon, Mohammed [1 ,4 ]
El-Shafai, Walid [5 ,6 ]
机构
[1] King Saud Univ, Community Coll, Dept Comp Sci, Riyadh 28095, Saudi Arabia
[2] Saudi Elect Univ, Sci Res, Riyadh, Saudi Arabia
[3] King Saud Univ, Coll Business Adm, Management Informat Syst Dept, Riyadh 28095, Saudi Arabia
[4] Menoufia Univ, Fac Elect Engn, Dept Comp Sci & Engn, Menoufia 32952, Egypt
[5] Prince Sultan Univ, Comp Sci Dept, Secur Engn Lab, Riyadh 11586, Saudi Arabia
[6] Menoufia Univ, Fac Elect Engn, Elect & Elect Commun Engn Dept, Menoufia 32952, Egypt
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 72卷 / 02期
关键词
Deep neural network; DL; WEKA; network traffic; intrusion and anomaly detection; SDN; clustering and classification; KDD dataset; CONTROL PLANE; SECURITY; QOS; SDN;
D O I
10.32604/cmc.2022.025262
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network management and multimedia data mining techniques have a great interest in analyzing and improving the network traffic process. In recent times, the most complex task in Software Defined Network (SDN) is security, which is based on a centralized, programmable controller. Therefore, monitoring network traffic is significant for identifying and revealing intrusion abnormalities in the SDN environment. Consequently, this paper provides an extensive analysis and investigation of the NSL-KDD dataset using five different clustering algorithms: K-means, Farthest First, Canopy, Density-based algorithm, and Exception-maximization (EM), using the Waikato Environment for Knowledge Analysis (WEKA) software to compare extensively between these five algorithms. Furthermore, this paper presents an SDN-based intrusion detection system using a deep learning (DL) model with the KDD (Knowledge Discovery in Databases) dataset. First, the utilized dataset is clustered into normal and four major attack categories via the clustering process. Then, a deep learning method is projected for building an efficient SDN-based intrusion detection system. The results provide a comprehensive analysis and a flawless reasonable study of different kinds of attacks incorporated in the KDD dataset. Similarly, the outcomes reveal that the proposed deep learning method provides efficient intrusion detection performance compared to existing techniques. For example, the proposed method achieves a detection accuracy of 94.21% for the examined dataset.
引用
收藏
页码:3529 / 3548
页数:20
相关论文
共 50 条
  • [31] Software-Defined Networking: A survey
    Farhady, Hamid
    Lee, HyunYong
    Nakao, Akihiro
    COMPUTER NETWORKS, 2015, 81 : 79 - 95
  • [32] On Scalability of Software-Defined Networking
    Yeganeh, Soheil Hassas
    Tootoonchian, Amin
    Ganjali, Yashar
    IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (02) : 136 - 141
  • [33] Towards an Integrated Framework for Managing Software-Defined Networking Models
    Barlowe, Scott
    Stanley, Miles
    Lowry, Noah
    Tipton, Cade
    Cruz, Gatlin
    SOUTHEASTCON 2023, 2023, : 23 - 30
  • [34] A security and trust framework for virtualized networks and software-defined networking
    Yan, Zheng
    Zhang, Peng
    Vasilakos, Athanasios V.
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3059 - 3069
  • [35] The KISS Principle in Software-Defined Networking: A Framework for Secure Communications
    Kreutz, Diego
    Yu, Jiangshan
    Esteves-Verissimo, Paulo
    Magalhaes, Catia
    Ramos, Fernando M., V
    IEEE SECURITY & PRIVACY, 2018, 16 (05) : 60 - 70
  • [36] Microgrid Power Sharing Framework for Software Defined Networking and Cybersecurity Analysis
    Perez Guzman, Ricardo E.
    Rivera, Marco
    Wheeler, Patrick W.
    Mirzaeva, Galina
    Espinosa, Eduardo E.
    Rohten, Jaime A.
    IEEE ACCESS, 2022, 10 : 111389 - 111405
  • [37] Efficient routing for middlebox policy enforcement in software-defined networking
    Li, Xin
    Wu, Haotian
    Gruenbacher, Don
    Scoglio, Caterina
    Anjali, Tricha
    COMPUTER NETWORKS, 2016, 110 : 243 - 252
  • [38] An efficient flow classification algorithm in Software-Defined Networking.
    Ju, Seungbum
    Lee, Kyoungtaek
    Kim, Jonghun
    Lee, Jaiyong
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 227 - 232
  • [39] Efficient TCAM Rules Distribution Algorithms in Software-Defined Networking
    Sheu, Jang-Ping
    Lin, Woan-Tyng
    Chang, Guey-Yun
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2018, 15 (02): : 854 - 865
  • [40] SDNIPS: Enabling Software-Defined Networking Based Intrusion Prevention System in Clouds
    Xing, Tianyi
    Xiong, Zhengyang
    Huang, Dijiang
    Medhi, Deep
    2014 10TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2014, : 308 - 311