Anomaly Detection Technique for Intrusion Detection in SDN Environment using Continuous Data Stream Machine Learning Algorithms

被引:8
|
作者
Lima Ribeiro, Admilson de Ribamar [1 ]
Carvalho Santos, Reneilson Yves [1 ]
Alves Nascimento, Anderson Clayton [2 ]
机构
[1] Univ Fed Sergipe, Sao Cristovao, UFS, Sao Cristovao, Brazil
[2] Univ Washington, Inst Technol, Tacoma, WA USA
关键词
Operational Security; SDN; DDoS; Machine Learning; Data Stream;
D O I
10.1109/SysCon48628.2021.9447092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software Defined Networks (SDN) present some security weakness due to the separation between control and data planes. Thus, some operational security mechanisms have been designed to deal with malicious code in SDN. However, most of those approaches require a signature basis and present the inability to anticipate novel malicious activity. Other anomaly based approaches are inefficient due to the possibility of an attacker simulates legitimate traffic, which causes lots of false alarms. Thus, in this paper, we present an anomaly based approaches that uses machine learning algorithms over continuous data stream for intrusion detection in a SDN environment. Our approach is to overcome the main challenges that happen when developing an anomaly based system using machine learning algorithms. For characterising the anomalies, we have analysed a type of DDoS attack classified as infrastructure attack that considers the impact of both bandwidth and resource depletions. This type of attack imposes a high affect to the whole SDN. In fact, there are two types of attacks. The bandwidth depletion attack targets the channel between the switches and the controller through either UDP or HTTP flooding. Another way to exhaust outgoing and ingoing bandwidths is through ICMP flooding. The resource depletion attack attempts to exhaust the flow table of switches through SYN flooding. From experiments, we notice that the solution obtains 97.83% accuracy, 99% recall, 80% precision and 2.3% FPR for 10% DDoS attacks on the normal traffic. These results show the effectiveness of the proposed technique.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] PAREEKSHA - A Machine Learning Approach for Intrusion and Anomaly Detection
    Nagaraja, Arun
    Aljawarneh, Shadi
    Prabhakara, H. S.
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE, E-LEARNING AND INFORMATION SYSTEMS 2018 (DATA'18), 2018,
  • [22] Anomaly Based Intrusion Detection for IoT with Machine Learning
    Shaver, Addison
    Liu, Zhipeng
    Thapa, Niraj
    Roy, Kaushik
    Gokaraju, Balakrishna
    Yuan, Xiaohon
    2020 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR): TRUSTED COMPUTING, PRIVACY, AND SECURING MULTIMEDIA, 2020,
  • [23] Fast Anomaly Detection based on Data Stream in Network Intrusion Detection System
    Yang, Yihong
    Xu, Xiaolong
    Wang, Lina
    Zhong, Weiyi
    Yan, Chao
    Qi, Lianyong
    PROCEEDINGS OF ACM TURING AWARD CELEBRATION CONFERENCE, ACM TURC 2021, 2021, : 87 - 91
  • [24] Anomaly Intrusion Detection for Evolving Data Stream Based on Semi-supervised Learning
    Yu, Yan
    Guo, Shanqing
    Lan, Shaohua
    Ban, Tao
    ADVANCES IN NEURO-INFORMATION PROCESSING, PT I, 2009, 5506 : 571 - +
  • [25] Feature Selection and Intrusion Detection in Cloud Environment based on Machine Learning Algorithms
    Javadpour, Amir
    Abharian, Sanaz Kazemi
    Wang, Guojun
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 1417 - 1421
  • [26] Anomaly Detection with Machine Learning Algorithms and Big Data in Electricity Consumption
    Oprea, Simona-Vasilica
    Bara, Adela
    Puican, Florina Camelia
    Radu, Ioan Cosmin
    SUSTAINABILITY, 2021, 13 (19)
  • [27] Enhancing Network Intrusion Detection Model Using Machine Learning Algorithms
    Awad, Nancy Awadallah
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (01): : 979 - 990
  • [28] Intrusion Detection Using Rule-Based Machine Learning Algorithms
    Kshirsagar, Deepak
    Shaikh, Jahed Momin
    2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2019,
  • [29] Intrusion Detection System Based On Flows Using Machine Learning Algorithms
    Kakihata, E. M.
    Sapia, H. M.
    Oikawa, R. T.
    Pereira, D. R.
    Papa, J. P.
    Alburquerque, V. H. C.
    Silva, F. A.
    IEEE LATIN AMERICA TRANSACTIONS, 2017, 15 (10) : 1988 - 1993
  • [30] An Ensemble Approach for Intrusion Detection System Using Machine Learning Algorithms
    Gautam, Rohit Kumar Singh
    Doegar, Er Amit
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 61 - 64