ONOS DDoS Defender: A Comparative Analysis of Existing DDoS Attack Datasets using Ensemble Approach

被引:2
作者
Aslam, Naziya [1 ]
Srivastava, Shashank [1 ]
Gore, M. M. [1 ]
机构
[1] Motilal Nehru Natl Inst Technol Allahabad, Dept Comp Sci & Engn, Prayagraj 211004, India
关键词
SDN; Mininet; DDoS Attack; ONOS; Machine Learning; MACHINE;
D O I
10.1007/s11277-023-10848-9
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Software-Defined Networking (SDN) outperforms conventional networks in terms of programmability, management, flexibility, and efficiency. This is because SDN separates the control and data planes. The centralised control of devices aids in the prevention of Distributed Denial of Service (DDoS) attacks. The controller has a larger network perspective and has the ability to filter network traffic in order to detect harmful flows. The separation of the control and data planes provided benefits, but it is vulnerable to DDoS attacks. DDoS assaults are difficult to detect and resist in real-time. This is only possible if appropriate features for attack detection are chosen. We intend to employ feature selection methods such as BORUTA, IRelief, Random Forest, Information Gain and Chi-Square Test to obtain the most relevant features for DDoS detection. Moreover, we have devised a strategy to detect and mitigate DDoS attack using tracebacking approach through ONOS Flood Defender (OFD) Application. The application effectively detects different DDoS attack traffic using XGBoost and Multilayer Perceptron algorithms with 99% accuracy and least testing times without adding unnecessary load to the system and mitigates the attack in approximately 3.2 s using tracebacking approach. We have performed our experiment on four benchmark datasets CIC-DoS 2017, CIC-DDoS 2019, CIC-IDS 2018 and InSDN. We have evaluated the trade-off between detection accuracy and testing time in order to determine the most effective detection model for addressing DDoS attacks on SDN networks.
引用
收藏
页码:1805 / 1827
页数:23
相关论文
共 38 条
  • [1] On Minimizing Synchronization Cost in NFV-based Environments
    Alomari, Zakaria
    Zhani, Mohamed Faten
    Aloqaily, Moayad
    Bouachir, Ouns
    [J]. 2020 16TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2020,
  • [2] Survival Classification in Heart Failure Patients by Neural Network-Based Crocodile and Egyptian Plover (CEP) Optimization Algorithm
    Akalin, Fatma
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) : 3897 - 3914
  • [3] ONOS Flood Defender: An Intelligent Approach to Mitigate DDoS Attack in SDN
    Aslam, Naziya
    Srivastava, Shashank
    Gore, M. M.
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (09)
  • [4] A GRU deep learning system against attacks in software defined networks
    Assis, Marcos V. O.
    Carvalho, Luiz F.
    Lloret, Jaime
    Proenca, Mario L.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 177
  • [5] Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset
    Bindra, Naveen
    Sood, Manu
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (05) : 419 - 428
  • [6] A tool for the generation of realistic network workload for emerging networking scenarios
    Botta, Alessio
    Dainotti, Alberto
    Pescape, Antonio
    [J]. COMPUTER NETWORKS, 2012, 56 (15) : 3531 - 3547
  • [7] Intelligent VNF Placement to Mitigate DDoS Attacks on Industrial IoT
    de Oliveira, Guilherme Werneck
    Nogueira, Michele
    dos Santos, Aldri Luiz
    Batista, Daniel Macedo
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (02): : 1319 - 1331
  • [8] Dotfighter, 2021, Torshammer
  • [9] Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
  • [10] A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs
    El Sayed, Mahmoud Said
    Le-Khac, Nhien-An
    Azer, Marianne A.
    Jurcut, Anca D.
    [J]. IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2022, 8 (04) : 1862 - 1880