Anomaly Detection Technique for Intrusion Detection in SDN Environment using Continuous Data Stream Machine Learning Algorithms

被引:8
|
作者
Lima Ribeiro, Admilson de Ribamar [1 ]
Carvalho Santos, Reneilson Yves [1 ]
Alves Nascimento, Anderson Clayton [2 ]
机构
[1] Univ Fed Sergipe, Sao Cristovao, UFS, Sao Cristovao, Brazil
[2] Univ Washington, Inst Technol, Tacoma, WA USA
关键词
Operational Security; SDN; DDoS; Machine Learning; Data Stream;
D O I
10.1109/SysCon48628.2021.9447092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software Defined Networks (SDN) present some security weakness due to the separation between control and data planes. Thus, some operational security mechanisms have been designed to deal with malicious code in SDN. However, most of those approaches require a signature basis and present the inability to anticipate novel malicious activity. Other anomaly based approaches are inefficient due to the possibility of an attacker simulates legitimate traffic, which causes lots of false alarms. Thus, in this paper, we present an anomaly based approaches that uses machine learning algorithms over continuous data stream for intrusion detection in a SDN environment. Our approach is to overcome the main challenges that happen when developing an anomaly based system using machine learning algorithms. For characterising the anomalies, we have analysed a type of DDoS attack classified as infrastructure attack that considers the impact of both bandwidth and resource depletions. This type of attack imposes a high affect to the whole SDN. In fact, there are two types of attacks. The bandwidth depletion attack targets the channel between the switches and the controller through either UDP or HTTP flooding. Another way to exhaust outgoing and ingoing bandwidths is through ICMP flooding. The resource depletion attack attempts to exhaust the flow table of switches through SYN flooding. From experiments, we notice that the solution obtains 97.83% accuracy, 99% recall, 80% precision and 2.3% FPR for 10% DDoS attacks on the normal traffic. These results show the effectiveness of the proposed technique.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Network Intrusion Detection Using Machine Learning Anomaly Detection Algorithms
    Hanifi, Khadija
    Bank, Hasan
    Karsligil, M. Elif
    Yavuz, A. Gokhan
    Guvensan, M. Amac
    [J]. 2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
  • [2] An Intrusion Detection System for SDN Using Machine Learning
    Logeswari, G.
    Bose, S.
    Anitha, T.
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (01): : 867 - 880
  • [3] Network intrusion detection using oversampling technique and machine learning algorithms
    Ahmed, Hafiza Anisa
    Hameed, Anum
    Bawany, Narmeen Zakaria
    [J]. PEERJ COMPUTER SCIENCE, 2022, 8 : 1 - 19
  • [4] Network intrusion detection using oversampling technique and machine learning algorithms
    Ahmed, Hafiza Anisa
    Hameed, Anum
    Bawany, Narmeen Zakaria
    [J]. PeerJ Computer Science, 2022, 8
  • [5] Machine Learning Algorithms for Enhancing Intrusion Detection Within SDN/NFV
    Sahbi, Amina
    Jaidi, Faouzi
    Bouhoula, Adel
    [J]. 2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 602 - 607
  • [6] Into the Unknown: Unsupervised Machine Learning Algorithms for Anomaly-Based Intrusion Detection
    Zoppi, Tommaso
    Ceccarelli, Andrea
    Bondavalli, Andrea
    [J]. 2020 50TH ANNUAL IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME (DSN-S), 2020, : 81 - 81
  • [7] Intrusion detection model using machine learning algorithm on Big Data environment
    Othman, Suad Mohammed
    Ba-Alwi, Fadl Mutaher
    Alsohybe, Nabeel T.
    Al-Hashida, Amal Y.
    [J]. JOURNAL OF BIG DATA, 2018, 5 (01)
  • [8] Anomaly intrusion detection based on clustering a data stream
    Oh, Sang-Hyun
    Kang, Jin-Suk
    Bytin, Yung-Cheol
    Jeong, Taikyeong T.
    Lee, Won-Suk
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 415 - 426
  • [9] Anomaly detection in IoT environment using machine learning
    Bilakanti, Harini
    Pasam, Sreevani
    Palakollu, Varshini
    Utukuru, Sairam
    [J]. SECURITY AND PRIVACY, 2024, 7 (03)
  • [10] A Survey on Intrusion Detection System Using Machine Learning Algorithms
    Gulghane, Shital
    Shingate, Vishal
    Bondgulwar, Shivani
    Awari, Gaurav
    Sagar, Parth
    [J]. INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 670 - 675