TD-RA policy-enforcement framework for an SDN-based IoT architecture

被引:5
作者
Lahlou, Sara [1 ]
Moukafih, Youness [1 ,2 ]
Sebbar, Anass [1 ]
Zkik, Karim [3 ]
Boulmalf, Mohammed [1 ]
Ghogho, Mounir [1 ]
机构
[1] Int Univ Rabat, TICLab, Rabat, Morocco
[2] Univ Lorraine, LORIA INRIA Lorraine, Lorraine, France
[3] ESAIP Grad Sch Engn, Angers, France
关键词
SDN-based IoT; Security; Machine learning; Threat detection; Policy enforcement; SOFTWARE-DEFINED NETWORKS; ATTACK; SECURITY; INTERNET;
D O I
10.1016/j.jnca.2022.103390
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) has been suffering from increasing security threats since many years which compromise the whole network security. Automating the management of IoT devices helps in implementing security measures within communication systems. Software Defined Networking (SDN) has been introduced as a new networking approach that enables this automation. Many approaches were developed to mitigate IoT attacks in SDN-based IoT networks. Some studies investigated the prevention of flooding attacks, while others tried to cover broader attack surfaces. However, their proposed methods are time consuming and resource-exhausting as they use complex algorithms. In this paper, we propose a lightweight secure Threat Detection (TD) and Rule Automation (RA) framework namely "TD-RA'' to effectively detect and mitigate different cyber-security threats in an SDN-based IoT environment. The proposed solution is composed of a Binary and Multi-class Classification Modules (BCM/MCM) for IoT threat detection and a Policy-Enforcement Module (PEM) for attack mitigation. Different machine learning methods have been implemented and compared to solve the classification problems. It is shown that for binary classification, the Decision Tree method achieves the highest accuracy which is around 98.7%, while for multi-class classification, Random Forest achieves the highest accuracy which is around 91.1%. The experimental results show that the proposed framework can successfully detect abnormal traffic and prevent IoT threats through SDN with smaller network overhead and high performance. Moreover, the overall processing time of our security modules is significantly smaller than that of existing solutions by reaching a mean value of 6 ms. This paper also introduces a large-scale architecture that comprises clusters of controllers to maintain high availability of network services. Such an integrated security approach, including detection and mitigation techniques, provides IT industries with reliable security measures that can be implemented to increase SDN-based IoT system responsiveness to different IoT attacks.
引用
收藏
页数:20
相关论文
共 52 条
[1]   A novel mechanism to handle address spoofing attacks in SDN based IoT [J].
Aldabbas, Hamza ;
Amin, Rashid .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04) :3011-3026
[2]  
Amangele Perekebode., 2019, PROC INT C INF TECHN, P1, DOI 10.1109/infotech.2019.8860878
[3]   A Machine Learning Security Framework for Iot Systems [J].
Bagaa, Miloud ;
Taleb, Tarik ;
Bernabe, Jorge Bernal ;
Skarmeta, Antonio .
IEEE ACCESS, 2020, 8 :114066-114077
[4]   5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges [J].
Barakabitze, Alcardo Alex ;
Ahmad, Arslan ;
Mijumbi, Rashid ;
Hines, Andrew .
COMPUTER NETWORKS, 2020, 167
[5]  
Bhunia SS, 2017, 2017 27TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P84
[6]   A survey on feature selection methods [J].
Chandrashekar, Girish ;
Sahin, Ferat .
COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (01) :16-28
[7]   Security in SDN: A comprehensive survey [J].
Correa Chica, Juan Camilo ;
Cuatindioy Imbachi, Jenny ;
Botero Vega, Juan Felipe .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 159
[8]   Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security [J].
Derhab, Abdelouahid ;
Guerroumi, Mohamed ;
Gumaei, Abdu ;
Maglaras, Leandros ;
Ferrag, Mohamed Amine ;
Mukherjee, Mithun ;
Khan, Farrukh Aslam .
SENSORS, 2019, 19 (14)
[9]   Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication [J].
Diro, Abebe ;
Reda, Haftu ;
Chilamkurti, Naveen ;
Mahmood, Abdun ;
Zaman, Noor ;
Nam, Yunyoung .
IEEE ACCESS, 2020, 8 :60539-60551
[10]   A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems [J].
Farris, Ivan ;
Taleb, Tarik ;
Khettab, Yacine ;
Song, Jaeseung .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01) :812-837