Attack-Specific Feature Selection for Anomaly Detection in Software-Defined Networks

被引:37
作者
Abbas, Nadine [1 ]
Nasser, Youssef [1 ]
Shehab, Maryam [1 ]
Sharafeddine, Sanaa [1 ]
机构
[1] Lebanese Amer Univ, Beirut, Lebanon
来源
2021 3RD IEEE MIDDLE EAST AND NORTH AFRICA COMMUNICATIONS CONFERENCE (MENACOMM) | 2021年
关键词
Software-Defined Networks; Feature Selection; Machine Learning; Network Security; Anomaly Detection;
D O I
10.1109/MENACOMM50742.2021.9678279
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapid advancement of technologies including the tremendous growth of multimedia content, cloud computing and mobile usage, conventional networks are not able to meet the demands. Software-Defined Networks (SDN) are considered one of the key enabling technologies providing a new powerful network architecture that allows the dynamic operation of different services using a common infrastructure. Despite their notable gains, SDNs may not be secure and are vulnerable to attacks. In this paper, we address the SDN vulnerabilities and present attack-specific feature selection to identify the features that have the most impact on anomaly detection. We first use the InSDN intrusion dataset that considers different attacks including Denial-of-Service (DoS), Distributed-DoS (DDoS), brute force, probe, web and botnet attacks. We then perform data pre-processing and apply univariate feature selection to select the features having the highest impact on the different attacks. These selected features can then be used to train the model which reduces the computational cost of modeling while keeping the high performance of the model. Detailed analysis and simulation results are then presented to show the predominant features and their impact on the different attacks.
引用
收藏
页码:142 / 146
页数:5
相关论文
共 16 条
[1]   Evaluation of Machine Learning Techniques for Security in SDN [J].
Ahmad, Ahnaf ;
Harjula, Erkki ;
Ylianttila, Mika ;
Ahmad, Ijaz .
2020 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2020,
[2]  
Bhardwaj S., 2020, P IEEE INT WOMEN ENG
[3]  
Cisco, 2018, White paper
[4]   Security in SDN: A comprehensive survey [J].
Correa Chica, Juan Camilo ;
Cuatindioy Imbachi, Jenny ;
Botero Vega, Juan Felipe .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 159
[5]   InSDN: A Novel SDN Intrusion Dataset [J].
Elsayed, Mahmoud Said ;
Le-Khac, Nhien-An ;
Jurcut, Anca D. .
IEEE ACCESS, 2020, 8 :165263-165284
[6]  
Jiawei Han, 2012, Journal of Chemical Information and Modeling
[7]  
Khamaiseh SY, 2020, 2020 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (NFV-SDN), P44, DOI [10.1109/nfv-sdn50289.2020.9289908, 10.1109/NFV-SDN50289.2020.9289908]
[8]  
Klymash M., 2020, 2020 IEEE INT C PROB, P609
[9]   Deep Learning enabled Intrusion Detection and Prevention System over SDN Networks [J].
Lee, Tsung-Han ;
Chang, Lin-Huang ;
Syu, Chao-Wei .
2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2020,
[10]  
Melkov D., 2021, P IEEE OPEN C ELECT