ML-IDSDN: Machine learning based intrusion detection system for software-defined network

被引:24
作者
Alzahrani, Abdulsalam O. [1 ]
Alenazi, Mohammed J. F. [1 ]
机构
[1] King Saud Univ, Dept Comp Engn, CCIS, Riyadh, Saudi Arabia
关键词
DDoS; machine learning; Mininet; network management; performance analysis; probe; Ryu controller; software-defined networking;
D O I
10.1002/cpe.7438
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software-defined networking (SDN) has been developed to separate network control plane from forwarding plane which can decrease operational costs and the time it takes to deploy new services compared to traditional networks. Despite these advantages, this technology brings threats and vulnerabilities. Consequently, developing high-performance real-time intrusion detection systems (IDSs) to classify malicious activities is a vital part of SDN architecture. This article introduces two created datasets generated from SDN using Mininet and Ryu controller with different feature extraction tools that contain normal traffic and different types of attacks (Fin flood, UDP flood, ICMP flood, OS probe scan, port probe scan, TCP bandwidth flood, and TCP syn flood) that is used for training a number of supervised binary classification machine learning algorithms such as k-nearest neighbor, AdaBoost, decision tree (DT), random forest, naive Bayes, multilayer perceptron, support vector machine, and XGBoost. The DT algorithm has achieved high scores to fit a real-time application achieving F1 score on attack class of 0.9995, F1 score on normal class of 0.9983, and throughput score of 6,737,147.275 samples per second with a total number of three features. In addition, using data preprocessing to reduce the model complexity, thereby increasing the overall throughput to fit a real-time system.
引用
收藏
页数:19
相关论文
共 41 条
[1]  
Ajaeiya GA, 2017, IEEE SYMP COMP COMMU, P787, DOI 10.1109/ISCC.2017.8024623
[2]  
[Anonymous], 2013, SVM kernel functions for classification
[3]  
[Anonymous], 2013, Empirical Inference, DOI [DOI 10.1007/978-3-642-41136-65, 10.1007/978-3-642-41136-6_5, DOI 10.1007/978-3-642-41136-6_5]
[4]  
Asadollahi S, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ADVANCED COMPUTING (ICCTAC)
[5]  
Bisong E., 2019, BUILDING MACHINE LEA
[6]   XGBoost: A Scalable Tree Boosting System [J].
Chen, Tianqi ;
Guestrin, Carlos .
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, :785-794
[7]   Security in SDN: A comprehensive survey [J].
Correa Chica, Juan Camilo ;
Cuatindioy Imbachi, Jenny ;
Botero Vega, Juan Felipe .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 159
[8]   Application of MLP networks to bond rating and house pricing [J].
Daniels, H ;
Kamp, B .
NEURAL COMPUTING & APPLICATIONS, 1999, 8 (03) :226-234
[9]  
Ding B, 2018, CHIN CONT DECIS CONF, P1836, DOI 10.1109/CCDC.2018.8407425
[10]   On the optimality of the simple Bayesian classifier under zero-one loss [J].
Domingos, P ;
Pazzani, M .
MACHINE LEARNING, 1997, 29 (2-3) :103-130