A novel dynamic framework to detect DDoS in SDN using metaheuristic clustering

被引:26
作者
Shakil, Muhammad [1 ]
Mohammed, Alaelddin Fuad Yousif [1 ]
Arul, Rajakumar [2 ]
Bashir, Ali Kashif [3 ]
Choi, Jun Kyun [1 ]
机构
[1] Korea Adv Inst Sci & Technol KAIST, Daejeon, South Korea
[2] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Comp Sci & Engn, Bengaluru 560035, India
[3] Manchester Metropolitan Univ, Sch Comp Math & Digital Technol, Manchester, Lancs, England
关键词
SOFTWARE-DEFINED NETWORKING; ARCHITECTURE;
D O I
10.1002/ett.3622
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Security is a crucial factor in the continuously evolving programmable networks. With the emergence of programmable networking terminals, the need to protect the networks has become mandatory. Software-defined networks (SDNs) provide programmable switches, thereby isolating the data plane from the control plane. Many security algorithms have been proposed to protect the network; however, they have failed to protect SDNs from attacks such as distributed denial of service (DDoS), jamming, and man-in-the-middle attacks. In this article, we only address the DDoS attack that prevails in SDNs. Isolation of the control plane from the data plane increases the probability of an attack on the data plane. Therefore, a framework that can handle the dynamic traffic and can protect the network from DDoS attacks is required. Our proposed whale optimization algorithm-based clustering for DDoS detection (WOA-DD) avoids the DDoS attacks using a metaheuristic approach by clustering the attack requests. We evaluated this algorithm for robustness in comparison with several existing solutions and found it to be safe under several conditions. The proposed attack request clustering is explored to check its feasibility with various machine learning approaches and found to be stable with the prevailing mechanisms. Analysis of the algorithm under varied conditions reveals that WOA-DD is robust, stable, and efficient against DDoS attacks.
引用
收藏
页数:18
相关论文
共 28 条
[1]   Security in Software Defined Networks: A Survey [J].
Ahmad, Ijaz ;
Namal, Suneth ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2317-2346
[2]  
Ambrosin M, 2016, 2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS)
[3]  
Anbalagan S., 2017, FUTURE GENER COMP SY
[4]   User Path Prediction Based Key Caching and Authentication Mechanism for Broadband Wireless Networks [J].
Arul, Rajakumar ;
Raja, Gunasekaran ;
Kottursamy, Kottilingam ;
Sathiyanarayanan, Pavithra ;
Venkatraman, Swaminathan .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) :2645-2664
[5]  
Bashir AK., 2016, P IEICE GEN C 2016 M
[6]  
Bashir AK, 2015, CLOUD COMPUTING, P46
[7]   Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks [J].
Bashir, Ali Kashif ;
Lim, Se-Jung ;
Hussain, Chauhdary Sajjad ;
Park, Myong-Soon .
SENSORS, 2011, 11 (07) :7004-7021
[8]  
Belyaev M., 2014, 2014 1 INT IEEE SCI
[9]  
Chin T, 2015, IEEE MILIT COMMUN C, P659, DOI 10.1109/MILCOM.2015.7357519
[10]  
Dharma NIG, 2015, ASIA-PAC NETW OPER M, P550, DOI 10.1109/APNOMS.2015.7275389