Signature and flow statistics based anomaly detection system in software-defined networking for 6G internet of things network

被引:5
|
作者
Nazar, Muhammad Junaid [1 ]
Alhudhaif, Adi [2 ]
Qureshi, Kashif Naseer [3 ]
Iqbal, Saleem [1 ]
Jeon, Gwanggil [4 ]
机构
[1] Arid Agr Univ, PMAS, Univ Inst Informat Technol UIIT, Rawalpindi, Pakistan
[2] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Dept Comp Sci, Al Kharj 11942, Saudi Arabia
[3] Bahria Univ, Dept Comp Sci, Islamabad, Pakistan
[4] Incheon Natl Univ, Dept Embedded Syst Engn, Incheon, South Korea
关键词
Software-defined networking (SDN); OpenFlow (OF); Flow table; Misrouting; Anomaly detection; Security; Link failure; Fast failover; Malicious behavior; 6G; IoT;
D O I
10.1007/s13198-021-01162-3
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The classical networks are vertically integrated into which control and data plane are connected which makes it more difficult to manage. Software-Defined Networking (SDN) is an emerging technology that broke this vertical integration and separates the data plane from the control plane. The entire network control is (logically) centralized that maintains a view of the network. However, the centralized controller brings a lot of security challenges. Traffic flowing through an SDN is vulnerable to disruptions caused by some of the SDN switches. In this paper, the malicious behavior on SDN switches is identified that causes disturbance in a network. The proposed system is based on attack signatures and is also capable to detect such misbehaving switches that drop and swap packets due to their malign intent rather than link failure. Every attack has some signature, and these attacks are identified by predefined signatures and their different behavior. The identification of three different attacks is demonstrated: (1) DDoS attack, (2) port scanning, and iii) traffic diversion attack to assess the network performance. The pool of attack signature is established in a database and update the system supplied pool of signature. Lastly, the conclusion is made by demonstrating the anomaly detection and evaluating the performance of the network by presenting experimental results. The experimental results demonstrate the effectiveness of the proposed work and illustrate the detection mechanism that can detect attacks, achieve high detection accuracy with a low false-positive rate, and discussing some future work.
引用
收藏
页码:87 / 97
页数:11
相关论文
共 50 条
  • [21] Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A Review
    Sood, Keshav
    Yu, Shui
    Xiang, Yong
    IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (04): : 453 - 463
  • [22] Combining Software-Defined Networking with Internet of Things: Survey on Security and Performance Aspects
    Yassein, Muneer Bani
    Abuein, Qusai
    Abu Alasal, Sanaa
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2017,
  • [23] A DDoS attack detection based on deep learning in software-defined Internet of things
    Wang, Jiushuang
    Liu, Ying
    Su, Wei
    Feng, Huifen
    2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [24] The Global Flow Table Based on The Software-Defined Networking
    Ren, Qiuzheng
    Qiu, Xiaofeng
    Chen, Pengcheng
    Liang, XiaoDong
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION PROBLEM-SOLVING (ICCP), 2015, : 264 - 267
  • [25] Survey: Intrusion Detection System in Software-Defined Networking
    Janabi, Ahmed H.
    Kanakis, Triantafyllos
    Johnson, Mark
    IEEE ACCESS, 2024, 12 : 164097 - 164120
  • [26] Internet of Things Management Based on Software Defined Networking: A Survey
    Wiem Bekri
    Rihab Jmal
    Lamia Chaari Fourati
    International Journal of Wireless Information Networks, 2020, 27 : 385 - 410
  • [27] A Mobility Management Algorithm in the Internet of Things (IoT) for Smart Objects based on Software-Defined Networking (SDN)
    Pei, Lili
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (11) : 82 - 91
  • [28] An empirical study for the traffic flow rate prediction-based anomaly detection in software-defined networking: a challenging overview
    Raja, Nirav M.
    Vegad, Sudhir
    SOCIAL NETWORK ANALYSIS AND MINING, 2023, 13 (01)
  • [29] An empirical study for the traffic flow rate prediction-based anomaly detection in software-defined networking: a challenging overview
    Nirav M Raja
    Sudhir Vegad
    Social Network Analysis and Mining, 13
  • [30] A Blockchain-based Cyber Attack Detection Scheme for Decentralized Internet of Things using Software-Defined Network
    Guha Roy, Deepsubhra
    Srirama, Satish Narayana
    SOFTWARE-PRACTICE & EXPERIENCE, 2021, 51 (07) : 1540 - 1556