Comparative Study of AI-Enabled DDoS Detection Technologies in SDN

被引:6
作者
Ko, Kwang-Man [1 ]
Baek, Jong-Min [1 ]
Seo, Byung-Suk [1 ]
Lee, Wan-Bum [2 ]
机构
[1] Sangji Univ, Dept Comp Engn, Wonju 26339, South Korea
[2] Wonkwang Univ, Dept Comp & Software Engn, Iksan 54538, South Korea
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 17期
关键词
SDN; DDoS attacks; deep learning; machine learning; permutation importance; random forest;
D O I
10.3390/app13179488
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Software-defined networking (SDN) is becoming the standard for the management of networks due to its scalability and flexibility to program the network. SDN provides many advantages but it also involves some specific security problems; for example, the controller can be taken down using cyber attacks, which can result in the whole network shutting down, creating a single point of failure. In this paper, DDoS attacks in SDN are detected using AI-enabled machine and deep learning models with some specific features for a dataset under normal DDoS traffic. In our approach, the initial dataset is collected from 84 features on Kaggle and then the 20 top features are selected using a permutation importance algorithm. The dataset is learned and tested with five AI-enabled models. Our experimental results show that the use of a machine learning-based random forest model achieves the highest accuracy rate of 99.97% in DDoS attack detection in SDN. Our contributions through this study are, firstly, that we found the top 20 features that contributed to DDoS attacks. Secondly, we reduce the time and cost of comparing various learning models and their performance in determining a learning model suitable for DDoS detection. Finally, various experimental methods to evaluate the performance of the learning model are presented so that related researchers can utilize them.
引用
收藏
页数:15
相关论文
共 38 条
[1]   Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity [J].
Aldhyani, Theyazn H. H. ;
Alkahtani, Hasan .
SENSORS, 2022, 22 (01)
[2]   Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems [J].
Alkahtani, Hasan ;
Aldhyani, Theyazn H. H. .
ELECTRONICS, 2022, 11 (11)
[3]  
Asadollahi S, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ADVANCED COMPUTING (ICCTAC)
[4]  
Ashraf J, 2014, 2014 NATIONAL SOFTWARE ENGINEERING CONFERENCE (NSEC - 2014), P55, DOI 10.1109/NSEC.2014.6998241
[5]   Real-Time DDoS Attack Detection System Using Big Data Approach [J].
Awan, Mazhar Javed ;
Farooq, Umar ;
Babar, Hafiz Muhammad Aqeel ;
Yasin, Awais ;
Nobanee, Haitham ;
Hussain, Muzammil ;
Hakeem, Owais ;
Zain, Azlan Mohd .
SUSTAINABILITY, 2021, 13 (19)
[6]  
Braga R, 2010, C LOCAL COMPUT NETW, P408, DOI 10.1109/LCN.2010.5735752
[7]   A Mobility Management Using Follow-Me Cloud-Cloudlet in Fog-Computing-Based RANs for Smart Cities [J].
Chen, Yuh-Shyan ;
Tsai, Yi-Ting .
SENSORS, 2018, 18 (02)
[8]  
Devendra, DDoS DatasetKaggle
[9]  
Dharma NIG, 2015, ASIA-PAC NETW OPER M, P550, DOI 10.1109/APNOMS.2015.7275389
[10]  
Douligeris C, 2003, PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, P190