Intelligent SDN Architecture With Fuzzy Neural Network and Blockchain for Monitoring Critical Events

被引:8
作者
Finogeev, Alexey [1 ]
Deev, Michael [1 ]
Parygin, Danila [2 ]
Finogeev, Anton [1 ]
机构
[1] Penza State Univ, CAD Dept, 40 Krasnay St, Penza 440025, Russia
[2] Volgograd State Tech Univ, CAD Dept, Volgograd, Russia
基金
俄罗斯科学基金会;
关键词
SECURITY; IOT; INTERNET; THINGS; ATTACKS; SYSTEM; ROAD;
D O I
10.1080/08839514.2022.2145634
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The article deals with the creation of an intelligent architecture of the Internet of Things transport environment based on software-defined network (SDN) and blockchain for detecting threats and attacks. The transport environment is created for the monitoring system of critical events in the road transport infrastructure. Blockchain technology is used to authenticate network nodes, store sensor data in a distributed ledger. The network packet clustering method based on a fuzzy neural network is used to detect packets with possible malicious content. The intelligent SDN architecture is a hierarchy of four layers with six levels and includes: a) edge computing layer (sensor nodes and routers level, SDN switches data level), b) fog computing layer (zone server level, control level in SDN controllers), c) a cloud computing layer with data center servers, d) a layer for presenting monitoring results on user devices and applications. Detection of threats and attacks is implemented by validating network nodes and analyzing header fields of IP packets and TCP segments. The intrusion detection system includes a parser and analyzer of data packets, a module for filtering traffic by type, port numbers and other characteristics of packets, a module for synthesizing digital signatures of trusted nodes and their validation, a module for analyzing and clustering packets based on fuzzy logic and a neural network, modules for logging procedures. The probability function of packets belonging to clusters is tuned through deep learning of a five-layer neural network. The conclusion about belonging and degree of similarity with malicious packages is formed using the fuzzy logic apparatus. To train the neural network, the previously synthesized rules of the flow tables and the identified signs of atypical data packets are used. The functionality and effectiveness of the SDN architecture with an intrusion detection system is validated by simulating procedures in the NS3 Simulator system, evaluating authenticity, latency, throughput, response time, and accuracy in detecting atypical data packets.
引用
收藏
页数:31
相关论文
共 58 条
[1]   A Survey of Network Virtualization Techniques for Internet of Things Using SDN and NFV [J].
Alam, Iqbal ;
Sharif, Kashif ;
Li, Fan ;
Latif, Zohaib ;
Karim, M. M. ;
Biswas, Sujit ;
Nour, Boubakr ;
Wang, Yu .
ACM COMPUTING SURVEYS, 2020, 53 (02)
[2]   A Blockchain-Based Federated Forest for SDN-Enabled In-Vehicle Network Intrusion Detection System [J].
Aliyu, Ibrahim ;
Feliciano, Marco Carlo ;
Van Engelenburg, Selinde ;
Kim, Dong Ok ;
Lim, Chang Gyoon .
IEEE ACCESS, 2021, 9 :102593-102608
[3]  
Baker P., 2019, INVESTORS POUNCE IOT
[4]   Blockchain for Increased Cyber-Resiliency of Industrial Edge Environments [J].
Balistri, Eugenio ;
Casellato, Francesco ;
Giannelli, Carlo ;
Stefanelli, Cesare .
2020 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2020, :1-8
[5]   DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions [J].
Bawany, Narmeen Zakaria ;
Shamsi, Jawwad A. ;
Salah, Khaled .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (02) :425-441
[6]   FCM - THE FUZZY C-MEANS CLUSTERING-ALGORITHM [J].
BEZDEK, JC ;
EHRLICH, R ;
FULL, W .
COMPUTERS & GEOSCIENCES, 1984, 10 (2-3) :191-203
[7]   A TSK type fuzzy rule based system for stock price prediction [J].
Chang, Pei-Chann ;
Liu, Chen-Hao .
EXPERT SYSTEMS WITH APPLICATIONS, 2008, 34 (01) :135-144
[8]   Lattice-based linearly homomorphic signatures in the standard model [J].
Chen, Wenbin ;
Lei, Hao ;
Qi, Ke .
THEORETICAL COMPUTER SCIENCE, 2016, 634 :47-54
[9]   A Survey on Industrial Information Integration 2016-2019 [J].
Chen, Yong .
JOURNAL OF INDUSTRIAL INTEGRATION AND MANAGEMENT-INNOVATION AND ENTREPRENEURSHIP, 2020, 5 (01) :33-163
[10]   Internet of Things security and forensics: Challenges and opportunities [J].
Conti, Mauro ;
Dehghantanha, Ali ;
Franke, Katrin ;
Watson, Steve .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :544-546