Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms

被引:49
作者
Abdulqadder, Ihsan H. [1 ]
Zhou, Shijie [1 ]
Zou, Deqing [2 ,3 ]
Aziz, Israa T. [4 ]
Akber, Syed Muhammad Abrar [5 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Enginerring, Chengdu 610054, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
[3] Shenzhen Huazhong Univ Sci & Technol, Res Inst, Shenzhen 518057, Peoples R China
[4] Univ Mosul, Mosul 41002, Iraq
[5] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
基金
美国国家科学基金会;
关键词
SDN/NFV Cloud of 5G; Multilayered architecture; Intrusion detection and prevention; And artificial intelligence; SOFTWARE-DEFINED NETWORKING; ATTACKS; ARCHITECTURE; MIGRATION;
D O I
10.1016/j.comnet.2020.107364
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Software defined networking (SDN), network function virtualization (NFV), and cloud computing are receiving significant attention in 5G networks. However, this attention creates a new challenge for security provisioning in these integrated technologies. Research in the field of SDN, NFV, cloud computing, and 5G has recently focused on the intrusion detection and prevention system (IDPS). Existing IDPS solutions are inadequate, which could cause large resource wastage and several security threats. To alleviate security issues, timely detection of an attacker is important. Thus, in this paper, we propose a novel approach that is referred to as multilayered intrusion detection and prevention (ML-IDP) in an SDN/NFV-enabled cloud of 5G networks. The proposed approach defends against security attacks using artificial intelligence (AI). In this paper, we employed five layers: data acquisition layer, switches layer, domain controllers (DC) layer, smart controller (SC) layer, and virtualization layer (NFV infrastructure). User authentication is held in the first layer using the Four-Q-Curve algorithm. To address the flow table overloading attack in the switches layer, the game theory approach, which is executed in the IDP agent, is proposed. The involvement of the IDP agent is to completely avoid a flow table overloading attack by a deep reinforcement learning algorithm, and thus, it updates the current state of all switches. In the DC layer, packets are processed and classified into two classes (normal and suspicious) by a Shannon Entropy function. Normal packets are forwarded to the cloud via the SC. Suspicious packets are sent to the VNF using a growing multiple self-organization map (GM-SOM). The proposed ML-IDP system is evaluated using NS3.26 for different security attacks, including IP Spoofing, flow table overloading, DDoS, Control Plane Saturation, and host location hijacking. From the experiment results, we proved that the ML-IDP with AI-based defense mechanisms effectively detects and prevents attacks.
引用
收藏
页数:19
相关论文
共 44 条
[1]   Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment [J].
Abdulqadder, Ihsan H. ;
Zou, Deqing ;
Aziz, Israa T. ;
Yuan, Bin ;
Dai, Weiqi .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) :866-877
[2]   SecSDN-Cloud: Defeating Vulnerable Attacks Through Secure Software-Defined Networks [J].
Abdulqadder, Ihsan H. ;
Zou, Deqing ;
Aziz, Israa T. ;
Yuan, Bin ;
Li, Weiming .
IEEE ACCESS, 2018, 6 :8292-8301
[3]   Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach [J].
AlEroud, Ahmed ;
Alsmadi, Izzat .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 80 :152-164
[4]   Algorithms for Lightweight Key Exchange [J].
Alvarez, Rafael ;
Caballero-Gil, Candido ;
Santonja, Juan ;
Zamora, Antonio .
SENSORS, 2017, 17 (07)
[5]   LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking [J].
Ambrosin, Moreno ;
Conti, Mauro ;
De Gaspari, Fabio ;
Poovendran, Radha .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (02) :1206-1219
[6]   Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment [J].
Bhushan, Kriti ;
Gupta, B. B. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (05) :1985-1997
[7]   CIPA: A collaborative intrusion prevention architecture for programmable network and SDN [J].
Chen, Xiao-Fan ;
Yu, Shun-Zheng .
COMPUTERS & SECURITY, 2016, 58 :1-19
[8]   FourQ: Four-Dimensional Decompositions on a Q-curve over the Mersenne Prime [J].
Costello, Craig ;
Longa, Patrick .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 :214-235
[9]   An improved network security situation assessment approach in software defined networks [J].
Fan, Zhijie ;
Xiao, Ya ;
Nayak, Amiya ;
Tan, Chengxiang .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (02) :295-309
[10]   STAR: Preventing flow-table overflow in software-defined networks [J].
Guo, Zehua ;
Liu, Ruoyan ;
Xu, Yang ;
Gushchin, Andrey ;
Walid, Anwar ;
Chao, H. Jonathan .
COMPUTER NETWORKS, 2017, 125 :15-25