A Comparative Study for SDN Security Based on Machine Learning

被引:1
作者
Alheeti K.M.A. [1 ]
Alzahrani A. [2 ]
Alamri M. [2 ]
Kareem A.K. [3 ]
Al Dosary D. [1 ]
机构
[1] Computer Networking Systems Department, University of Anbar, Anbar
[2] Faculty of Computer Science and Information Technology, Al Baha University, Al Baha
[3] Department of Heet Education General Directorate of Education in Anbar, Ministry of Education, Anbar
关键词
Deep Neural Network (DNN); Machine Learning (ML); NSL-KDD; Software Defined Network (SDN);
D O I
10.3991/ijim.v17i11.39065
中图分类号
学科分类号
摘要
In the past decade, traditional networks have been utilized to transfer data between more than one node. The primary problem related to formal networks is their stable essence, which makes them incapable of meeting the requirements of nodes recently inserted into the network. Thus, formal networks are substituted by a Software Defined Network (SDN). The latter can be utilized to construct a structure for intensive data applications like big data. In this paper, a comparative investigation of Deep Neural Network (DNN) and Machine Learning (ML) techniques that uses various feature selection techniques is undertaken. The ML techniques employed in this approach are decision tree (DT), Naïve Bayes (NB), Support Vector Machine (SVM). The proposed approach is tested experimentally and evaluated using an available NSL–KDD dataset. This dataset includes 41 features and 148,517 samples. To evaluate the techniques, several estimation measurements are calculated. The results prove that DT is the most accurate and effective approach. Furthermore, the evaluation measurements indicate the efficacy of the presented approach compared to earlier studies. © 2023, International Journal of Interactive Mobile Technologies. All Rights Reserved.
引用
收藏
页码:131 / 140
页数:9
相关论文
共 34 条
  • [1] Haseeb K., Abbas N., Saleem M. Q., Sheta O. E., Awan K., Et al., RCER: Reliable Clusterbased Energy-aware Routing protocol for heterogeneous Wireless Sensor Networks, PLoS One, 17, 9, (2019)
  • [2] Ahmad M., Li T., Khan Z., Khurshid F., Ahmad M., A Novel Connectivity-Based LEACH-MEEC Routing Protocol for Mobile Wireless Sensor Network, Sensors, 18, 12, (2018)
  • [3] Feng Q., He D., Zeadally S., Khan M. K., Kumar N., A survey on privacy protection in blockchain system, Journal of Network & Computer Applications, 126, pp. 45-58, (2019)
  • [4] Mittal M., Iwendi C., A Survey on Energy-Aware Wireless Sensor Routing Protocols, EAI Endorsed Transactions on Energy Web, 6, 24, (2019)
  • [5] Awad A., German R., Dressler F., Exploiting Virtual Coordinates for Improved Routing Performance in Sensor Networks, IEEE Transactions on Mobile Computing, 10, 9, pp. 1214-1226, (2011)
  • [6] Chen H., Gao F., Martins M., Huang P., Liang J., Accurate and Efficient Node Localization for Mobile Sensor Networks, Mobile Networks & Applications, 18, 1, pp. 141-147, (2013)
  • [7] Intanagonwiwat C., Govindan R., Estrin D., Direct Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks, Proc. ACM (Mobi-Com), pp. 56-67, (2007)
  • [8] Kasongo S. M., Sun Y., Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW-NB15 Dataset, Journal of Big Data, 7, 1, (2020)
  • [9] Ghanem W.A.H., Jantan A., Ghaleb S.A.A., Nasser A.B., An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons, IEEE Access, 8, pp. 130452-130475, (2020)
  • [10] Zamani M., Movahedi M., Machine learning techniques for intrusion detection, (2015)