Deep Learning Approach for SDN-Enabled Intrusion Detection System in IoT Networks

被引:39
作者
Chaganti, Rajasekhar [1 ]
Suliman, Wael [2 ]
Ravi, Vinayakumar [2 ]
Dua, Amit [3 ]
机构
[1] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
[2] Prince Mohammad Bin Fahd Univ, Ctr Artificial Intelligence, Khobar 34754, Saudi Arabia
[3] Silesian Tech Univ, Dept Algorithm & Software, PL-44100 Gliwice, Poland
关键词
intrusion detection; software defined networks; Internet of Things; deep learning; LSTM; support vector machine; denial of service; network attacks; CHALLENGES;
D O I
10.3390/info14010041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Owing to the prevalence of the Internet of things (IoT) devices connected to the Internet, the number of IoT-based attacks has been growing yearly. The existing solutions may not effectively mitigate IoT attacks. In particular, the advanced network-based attack detection solutions using traditional Intrusion detection systems are challenging when the network environment supports traditional as well as IoT protocols and uses a centralized network architecture such as a software defined network (SDN). In this paper, we propose a long short-term memory (LSTM) based approach to detect network attacks using SDN supported intrusion detection system in IoT networks. We present an extensive performance evaluation of the machine learning (ML) and deep learning (DL) model in two SDNIoT-focused datasets. We also propose an LSTM-based architecture for the effective multiclass classification of network attacks in IoT networks. Our evaluation of the proposed model shows that our model effectively identifies the attacks and classifies the attack types with an accuracy of 0.971. In addition, various visualization methods are shown to understand the dataset's characteristics and visualize the embedding features.
引用
收藏
页数:21
相关论文
共 46 条
  • [1] Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks
    Abusnaina, Ahmed
    Khormali, Aminollah
    Nyang, DaeHun
    Yuksel, Murat
    Mohaisen, Aziz
    [J]. 2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2019, : 17 - 24
  • [2] Review Federated Learning for intrusion detection system: Concepts, challenges and future directions
    Agrawal, Shaashwat
    Sarkar, Sagnik
    Aouedi, Ons
    Yenduri, Gokul
    Piamrat, Kandaraj
    Alazab, Mamoun
    Bhattacharya, Sweta
    Maddikunta, Praveen Kumar Reddy
    Gadekallu, Thippa Reddy
    [J]. COMPUTER COMMUNICATIONS, 2022, 195 : 346 - 361
  • [3] Genetic CFL: Hyperparameter Optimization in Clustered Federated Learning
    Agrawal, Shaashwat
    Sarkar, Sagnik
    Alazab, Mamoun
    Maddikunta, Praveen Kumar Reddy
    Gadekallu, Thippa Reddy
    Quoc-Viet Pham
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2021, 2021
  • [4] Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs
    Aiken, James
    Scott-Hayward, Sandra
    [J]. 2019 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (IEEE NFV-SDN), 2019,
  • [5] Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks
    Alzahrani, Abdulsalam O.
    Alenazi, Mohammed J. E.
    [J]. FUTURE INTERNET, 2021, 13 (05)
  • [6] Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks
    Birkinshaw, Celyn
    Rouka, Elpida
    Vassilakis, Vassilios G.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 136 : 71 - 85
  • [7] Boppana R. V., 2019, NATL CYBER SUMMIT, P169
  • [8] Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification
    Chaganti, Rajasekhar
    Ravi, Vinayakumar
    Pham, Tuan D.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 69
  • [9] Deep learning based cross architecture internet of things malware detection and classification
    Chaganti, Rajasekhar
    Ravi, Vinayakumar
    Pham, Tuan D.
    [J]. COMPUTERS & SECURITY, 2022, 120
  • [10] Dey S.K., 2020, P INT JOINT C COMP I, P483, DOI DOI 10.1007/978-981-13-7564-441