A deep learning technique to detect distributed denial of service attacks in software-defined networks

被引:17
作者
Gadallah, Waheed G. [1 ,2 ]
Ibrahim, Hosny M. [1 ]
Omar, Nagwa M. [1 ]
机构
[1] Assiut Univ, Fac Comp & Informat, Informat Technol, Assiut 71515, Egypt
[2] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Clear Water Bay, Hong Kong, Peoples R China
关键词
Software-defined networking; Distributed denial of service; Deep learning; Autoencoder; Bidirectional gated recurrent unit; Trust value; AUTOENCODER; SDN; PERFORMANCE;
D O I
10.1016/j.cose.2023.103588
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-Defined Network (SDN) is an established networking paradigm that separates the control plane from the data plane. It has central network control, and programmability facilities, therefore SDN can improve network flexibility, management, performance, and scalability. The programmability and control centralization of SDN have improved network functions but also exposed it to security challenges such as Distributed Denial of Service (DDoS) attacks that target both control and data planes. This paper proposes an effective detection technique against DDoS attack in SDN control plane and data plane. For the control plane, the technique detects DDoS attacks through a Deep Learning (DL) model using new features extracted from traffic statistics. A DL method (AE-BGRU) for DDoS detection uses Autoencoder (AE) with Bidirectional Gated Recurrent Unit (BGRU). The proposed features for the control plane include unknown IP destination address, packets inter-arrival time, Transport layer protocol (TLP) header, and Type of service (ToS) header. For the data plane, the technique tracks the switch's average arrival bit rate with an unknown destination address in the data plane. Then, the technique detects DDoS attacks through a DL-based model which also uses AE with BGRU. The proposed features in the data plane include the switch's stored capacity, the average rate of packets with unknown destination addresses, the IP Options header, and the average number of flows. The dataset is generated from feature extraction and computations from normal and attack packets and used with the classifier. Also, additional Machine Learning (ML) methods are used to enhance the detection process. If the model detects an attack, the technique mitigates DDoS effects by updating the user's trust value and blocking suspicious senders based on the trust value. The experimental results proved that compared to related techniques, the suggested method had a higher accuracy and lower false alarm rate.
引用
收藏
页数:12
相关论文
共 75 条
[1]  
Abadi M., 2016, TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems, DOI DOI 10.48550/ARXIV.1603.04467
[2]  
Abdallah A., 2020, P 6 INT C ENG MIS 20, P1
[3]  
Abdallah A, 2024, Arxiv, DOI arXiv:2309.09800
[4]  
Abdallah A, 2024, Arxiv, DOI arXiv:2307.11278
[5]  
Abdallah A, 2023, Arxiv, DOI arXiv:2304.06623
[6]   TNCR: Table net detection and classification dataset [J].
Abdallah, Abdelrahman ;
Berendeyev, Alexander ;
Nuradin, Islam ;
Nurseitov, Daniyar .
NEUROCOMPUTING, 2022, 473 :79-97
[7]   Attention-Based Fully Gated CNN-BGRU for Russian Handwritten Text [J].
Abdallah, Abdelrahman ;
Hamada, Mohamed ;
Nurseitov, Daniyar .
JOURNAL OF IMAGING, 2020, 6 (12)
[8]  
Abdimanap G, 2023, Arxiv, DOI arXiv:2204.14224
[9]   Comparative Analysis of Control Plane Security of SDN and Conventional Networks [J].
Abdou, AbdelRahman ;
van Oorschot, Paul C. ;
Wan, Tao .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3542-3559
[10]   An information security model for an IoT-enabled Smart Grid in the Saudi energy sector [J].
Akkad, Abeer ;
Wills, Gary ;
Rezazadeh, Abdolbaghi .
COMPUTERS & ELECTRICAL ENGINEERING, 2023, 105