Detection of Flow Based Anomaly in OpenFlow Controller: Machine Learning Approach in Software Defined Networking

被引:0
作者
Dey, Samrat Kumar [1 ]
Rahman, Md Mahbubur [1 ]
Uddin, Md Raihan [2 ]
机构
[1] Mil Inst Sci & Technol, Dept CSE, Dhaka, Bangladesh
[2] Daffodil Int Univ Dhaka, Dept EEE, Dhaka, Bangladesh
来源
2018 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION & COMMUNICATION TECHNOLOGY (ICEEICT) | 2018年
关键词
software defined networking; OpenFlow; machine learning; NSL-KDD dataset; feature selection; intrusion detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software Defined Networking (SDN) has come to prominence in recent years and demonstrates an enormous potential in shaping the future of networking by separating control plane from data plane. OpenFlow is the first and most widely used protocol that makes this separation possible in the first place. As a newly emerged technology, SDN has its inherent security threats that can be eliminated or at least mitigated by securing the OpenFlow controller that manages flow control in SDN. SDN provides us a chance to strengthen our network security by decoupling its control plane and data plane. At this level, there also exists some certain risk, which is associated with this technology. In this research, a flow based anomaly detection method in OpenFlow controller have been approached by using machine-learning algorithms in SDN architecture. In order to improve the classifier performance, some feature selection methods namely Info Gain, Gain Ratio, CFS Subset Evaluator, Symmetric Uncertainty, and Chi-square test have been applied as a processing of dataset. A full dataset of 41 features and a reduced dataset has experimented. A dataset with feature selection ensures the highest accuracy of nearly 82% with Random Forest classifier using Gain Ratio feature selection Evaluator. Experimental results ratify that machine-learning approach with feature selection method indices strong potential for the detection of flow based anomaly in OpenFlow controller.
引用
收藏
页码:416 / 421
页数:6
相关论文
共 20 条
[1]  
Abubakar A, 2017, 2017 SEVENTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), P138, DOI 10.1109/EST.2017.8090413
[2]   A Survey of Securing Networks Using Software Defined Networking [J].
Ali, Syed Taha ;
Sivaraman, Vijay ;
Radford, Adam ;
Jha, Sanjay .
IEEE TRANSACTIONS ON RELIABILITY, 2015, 64 (03) :1086-1097
[3]  
[Anonymous], 2015, Int. J. Adv. Res. Comput. Commun. Eng.
[4]  
[Anonymous], UNV WORLDS 1 COMM DE
[5]  
[Anonymous], 2009, S COMP INT SEC DEF A
[6]  
Ashraf J, 2014, 2014 NATIONAL SOFTWARE ENGINEERING CONFERENCE (NSEC - 2014), P55, DOI 10.1109/NSEC.2014.6998241
[7]  
Frank E, 2016, The WEKA workbench
[8]   NOX: Towards an operating system for networks [J].
Gude, Natasha ;
Koponen, Teemu ;
Pettit, Justin ;
Pfaff, Ben ;
Casado, Martin ;
McKeown, Nick ;
Shenker, Scott .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2008, 38 (03) :105-110
[9]  
Ingre B, 2015, 2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION ENGINEERING SYSTEMS (SPACES), P92, DOI 10.1109/SPACES.2015.7058223
[10]   Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm [J].
Jadidi, Zahra ;
Muthukkumarasamy, Vallipuram ;
Sithirasenan, Elankayer ;
Sheikhan, Mansour .
2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, :76-81