Wavelet against random forest for anomaly mitigation in software-defined networking

被引:9
作者
Zerbini, Cinara Brenda [1 ]
Carvalho, Luiz Fernando [1 ]
Abrao, Taufik [2 ]
Proenca Jr, Mario Lemes [1 ]
机构
[1] Univ Estadual Londrina, Comp Sci Dept, BR-86057970 Londrina, Brazil
[2] Univ Estadual Londrina, Dept Elect Engn, BR-86057970 Londrina, Brazil
关键词
Software-defined networking; Anomaly detection; Wavelet; Random forest; TRANSFORM; SECURITY; SYSTEM; DECOMPOSITION; FRAMEWORK; INTERNET; SDN;
D O I
10.1016/j.asoc.2019.02.046
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security and availability of computer networks remain critical issues even with the constant evolution of communication technologies. In this core, traffic anomaly detection mechanisms need to be flexible to detect the growing spectrum of anomalies that may hinder proper network operation. In this paper, we argue that Software-defined Networking (SDN) provides a suitable environment for the design and implementation of more robust and comprehensive anomaly detection approaches. Aiming towards automated management to detect and prevent potential problems, we present an anomaly identification mechanism based on Discrete Wavelet Transform (DWT) and compare it with another detection model based on Random Forest. These methods generate a normal traffic profile, which is compared with actual real network traffic to recognize abnormal events. After a threat is detected, mitigation measures are activated so that the harmful effects of the malicious event are contained. We assess the effectiveness of the proposed anomaly detection methods and mitigation schemes using Distributed Denial of Service (DDoS) and port scan attacks. Our results confirm the effectiveness of both methods as well as the mitigation routines. In particular, the correspondence between the detection rates confirms that both methods enhance the detection of anomalous behavior by maintaining a satisfactory false-alarm rate. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:138 / 153
页数:16
相关论文
共 54 条
[21]  
Fernandes G., 2018, COMPREHENSIVE SURVEY, DOI [10.1007/s11235-018-0475-8, DOI 10.1007/S11235-018-0475-8]
[22]   Network anomaly detection using IP flows with Principal Component Analysis and Ant Colony Optimization [J].
Fernandes, Gilberto, Jr. ;
Carvalho, Luiz F. ;
Rodrigues, Joel J. P. C. ;
Proenca, Mario Lemes, Jr. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 64 :1-11
[23]   Autonomous profile-based anomaly detection system using principal component analysis and flow analysis [J].
Fernandes, Gilberto, Jr. ;
Rodrigues, Joel J. P. C. ;
Proenca, Mario Lemes, Jr. .
APPLIED SOFT COMPUTING, 2015, 34 :513-525
[24]  
Gao J., 2006, 2006 Asia-Pacific Conference on Communications, P1
[25]   Network Anomaly Detection System using Genetic Algorithm and Fuzzy Logic [J].
Hamamoto, Anderson Hiroshi ;
Carvalho, Luiz Fernando ;
Hiera Sampaio, Lucas Dias ;
Abrao, Taufik ;
Proenca, Mario Lemes, Jr. .
EXPERT SYSTEMS WITH APPLICATIONS, 2018, 92 :390-402
[26]  
Hyun D, 2017, I C INF COMM TECH CO, P834, DOI 10.1109/ICTC.2017.8190794
[27]  
Jafarpour Sina, 2009, 2009 17th European Signal Processing Conference (EUSIPCO 2009), P1220
[28]  
Jordan S., 2014, 68 95 99 7 RULE NORM
[29]   Anomaly detection in time series data using a combination of wavelets, neural networks and Hilbert transform [J].
Kanarachos, S. ;
Mathew, J. ;
Chroneos, A. ;
Fitzpatrick, M. .
2015 6TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA), 2015,
[30]   A self-organising multi-agent system for decentralised forensic investigations [J].
Kendrick, Phillip ;
Criado, Natalia ;
Hussain, Abir ;
Randles, Martin .
EXPERT SYSTEMS WITH APPLICATIONS, 2018, 102 :12-26