Detecting DDoS based on attention mechanism for Software-Defined Networks

被引:1
作者
Yoon, Namkyung [1 ]
Kim, Hwangnam [1 ]
机构
[1] Korea Univ, Sch Elect Engn, Seoul, 02841, South Korea
关键词
SDN; DDoS; Deep learning; Attention mechanism; NEURAL-NETWORK; ATTACKS;
D O I
10.1016/j.jnca.2024.103928
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a deep learning model based on a novel Divide and Conquer Attention (DCA) mechanism, for efficient detection of Distributed Denial of Service (DDoS) attacks in a virtual Software Defined Networking(SDN) environment. DDoS is a cyber-attack that depletes the resources of the target victim through excessive traffic attacks, preventing users from using the server normally. As network infrastructure evolves, the threat of cyber-attacks such as DDoS is increasing, and DDoS attack methods are also becoming very diverse. DDoS attacks are more dangerous in SDN because a failure occurring in the SDN controller paralyzes the entire network managed by the controller and has recently received a lot of attention. Therefore, our proposed DCA based detection model learns complex attack patterns and network traffic, providing enhanced detection. The DCA based detection model that focuses on various functions of network traffic based on importance provides a better understanding of abnormal behavior patterns. Our results obtained from virtual network attack scenario experiments with Open Network Operating System (ONOS) SDN controller and Mininet network simulator show that DCA based model outperforms traditional machine learning methods and other deep learning models. Then, we conduct performance evaluations against various recent deep learning -based network analysis studies to provide various advantages for the utilization of DCA based detection model.
引用
收藏
页数:15
相关论文
共 74 条
[1]   Towards DDoS attack detection using deep learning approach [J].
Aktar, Sharmin ;
Nur, Abdullah Yasin .
COMPUTERS & SECURITY, 2023, 129
[2]   Migrating From Legacy to Software Defined Networks: A Network Reliability Perspective [J].
Al Mtawa, Yaser ;
Haque, Anwar ;
Lutfiyya, Hanan .
IEEE TRANSACTIONS ON RELIABILITY, 2021, 70 (04) :1525-1541
[3]   Intrusion Detection Using Attention-Based CNN-LSTM Model [J].
Al-Omar, Ban ;
Trabelsi, Zouheir .
ARTIFICIAL INTELLIGENCE APPLICATIONS AND INNOVATIONS, AIAI 2023, PT I, 2023, 675 :515-526
[4]   A Comparison of Unidirectional and Bidirectional LSTM Networks for Human Activity Recognition [J].
Alawneh, Luay ;
Mohsen, Belal ;
Al-Zinati, Mohammad ;
Shatnawi, Ahmed ;
Al-Ayyoub, Mahmoud .
2020 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2020,
[5]  
Alharbi T, 2017, 2017 27TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P384, DOI 10.1109/ATNAC.2017.8215424
[6]   Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review [J].
Ali, Tariq Emad ;
Chong, Yung-Wey ;
Manickam, Selvakumar .
APPLIED SCIENCES-BASEL, 2023, 13 (05)
[7]   Toward Adaptive and Scalable OpenFlow-SDN Flow Control: A Survey [J].
Alsaeedi, Mohammed ;
Mohamad, Mohd Murtadha ;
Al-Roubaiey, Anas A. .
IEEE ACCESS, 2019, 7 :107346-107379
[8]  
[Anonymous], 2010, A network in a laptop, DOI [DOI 10.1145/1868447.1868466, 10.1145/1868447.1868466]
[9]  
[Anonymous], 2014, P 3 WORKSH HOT TOP S
[10]  
Arshi M., 2020, E3S Web of Conferences, V184, DOI 10.1051/e3sconf/202018401052