Security of Networks Using Efficient Adaptive Flow Counting for Anomaly Detection in SDN

被引:4
作者
Garg, Gagandeep [1 ]
Garg, Roopali [1 ]
机构
[1] Panjab Univ, UIET, Dept IT, Chandigarh 160014, India
来源
ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2015 | 2016年 / 394卷
关键词
Adaptive flow counting; Anomaly detection; SDN traffic-aggregation; Adaptive traffic monitoring; Network measurement and management;
D O I
10.1007/978-81-322-2656-7_61
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security of network is fundamental requirement due to the rapid growth of utilization of network. SDN is nowadays the most preferred evolving networking technology. It provides higher innovation and more integration of services. Including the rapid innovation, also there lies a threat of intrusion in separate planes. Owing to open interfaces present between different planes, risks of intrusion or anonymous traffic inside the network increases. Therefore, on high-traffic networks, monitoring and measurement of traffic is a main area of concern. Several anomaly detection techniques had already been provided for this cause. But still there is a need of efficient anomaly detection methods so that network can work smoothly and intrusion-free with the proper utilization of networking resources. This paper describes a work towards enhancing the efficiency of anomaly detection method while preserving the performance of our network. Also network overhead, response time, and controller workload must be considered while applying monitoring policies. Focus will be on implementing an efficient adaptive flow counting mechanism so that anomaly can be detected dynamically, but the aggregation rules must be modified accordingly.
引用
收藏
页码:667 / 674
页数:8
相关论文
共 13 条
  • [11] Moshref Masoud., 2013, HOTSDN, P73, DOI DOI 10.1145/2491185.2491196
  • [12] Zhang Y, 2013, PROCEEDINGS OF THE 2013 ACM INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES (CONEXT '13), P25
  • [13] Zseby T, 2008, LECT NOTES COMPUT SC, V4979, P61, DOI 10.1007/978-3-540-79232-1_7