A Probabilistic Data Structures-Based Anomaly Detection Scheme for Software-Defined Internet of Vehicles

被引:14
作者
Garg, Sahil [1 ]
Singh, Amritpal [2 ]
Aujla, Gagangeet Singh [3 ,4 ]
Kaur, Sukhdeep [5 ]
Batra, Shalini [5 ]
Kumar, Neeraj [5 ,6 ,7 ]
机构
[1] Univ Quebec, Elect Engn Dept, Ecole Technol Super, Montreal, PQ H3C 1K3, Canada
[2] Natl Inst Technol, Comp Sci & Engn Dept, Jalandhar 144805, Punjab, India
[3] Newcastle Univ, Sch Comp, Newcastle Upon Tyne NE4 5TG, Tyne & Wear, England
[4] Chandigarh Univ, Comp Sci & Engn Dept, Mohali 140413, India
[5] Thapar Inst Engn & Technol, Patiala 147001, Punjab, India
[6] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[7] King Abdulaziz Univ, Jeddah 21589, Saudi Arabia
关键词
Monitoring; Probabilistic logic; Internet; Control systems; Denial-of-service attack; Anomaly detection; Probabilistic data structures; Software-defined networks; Internet of Vehicles; INTRUSION DETECTION; VEHICULAR NETWORKS; SDN; FRAMEWORK; FLOW; ENVIRONMENT; ATTACKS;
D O I
10.1109/TITS.2020.2988065
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Internet of Vehicles (IoV) has escalated the movement of big data across moving vehicles which create a huge burden on the network infrastructure. In IoV environment, effective handling of streaming data has to face various challenges like; traffic monitoring, flow management, re-configuration and security. Software-defined networks (SDN) provides improved flexibility, and centralized control of the network to overcome (almost) the above-mentioned challenges. However, it can lead to an easy target (node or controller) for malicious agents. So, to detect the anomalous behaviour of the nodes in the IoV environment, a hybrid approach using probabilistic data structures is proposed which works in the following phases. In phase I, a traffic monitoring scheme using Count-Min-Sketch is designed to identify the suspicious nodes. In phase II, to detect an anomaly, a Bloom filter-based control scheme is used for signature verification of suspicious nodes. In phase III, a Quotient filter is used for fast and efficient storage of malicious nodes. In phase IV, to detect the super points (malicious hosts that are connected to a large number of destinations), a Hyperloglog counter is used to measure the cardinality of each flow passing through the switches. The proposed scheme has been evaluated in a simulated environment. The results obtained depict that the proposed scheme is faster, accurate, and efficient concerning detection ratio and false-positive ratio.
引用
收藏
页码:3557 / 3566
页数:10
相关论文
共 35 条
[1]   Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach [J].
AlEroud, Ahmed ;
Alsmadi, Izzat .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 80 :152-164
[2]   LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking [J].
Ambrosin, Moreno ;
Conti, Mauro ;
De Gaspari, Fabio ;
Poovendran, Radha .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (02) :1206-1219
[3]   AdaptFlow: Adaptive Flow Forwarding Scheme for Software-Defined Industrial Networks [J].
Aujla, Gagangeet Singh ;
Singh, Amritpal ;
Kumar, Neeraj .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07) :5843-5851
[4]   EVaaS: Electric vehicle-as-a-service for energy trading in SDN-enabled smart transportation system [J].
Aujla, Gagangeet Singh ;
Jindal, Anish ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2018, 143 :247-262
[5]   Optimal Decision Making for Big Data Processing at Edge-Cloud Environment: An SDN Perspective [J].
Aujla, Gagangeet Singh ;
Kumar, Neeraj ;
Zomaya, Albert Y. ;
Ranjan, Rajiv .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (02) :778-789
[6]   Data Offloading in 5G-Enabled Software-Defined Vehicular Networks: A Stackelberg-Game-Based Approach [J].
Aujla, Gagangeet Singh ;
Chaudhary, Rajat ;
Kumar, Neeraj ;
Rodrigues, Joel J. P. C. ;
Vinel, Alexey .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (08) :100-108
[7]  
Aujla Gagangeet Singh, 2018, IEEE INT C COMMUNICA
[8]   NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems [J].
Chung, Chun-Jen ;
Khatkar, Pankaj ;
Xing, Tianyi ;
Lee, Jeongkeun ;
Huang, Dijiang .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (04) :198-211
[9]   An improved data stream summary: the count-min sketch and its applications [J].
Cormode, G ;
Muthukrishnan, S .
JOURNAL OF ALGORITHMS-COGNITION INFORMATICS AND LOGIC, 2005, 55 (01) :58-75
[10]   SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks [J].
Cui, Yunhe ;
Yan, Lianshan ;
Li, Saifei ;
Xing, Huanlai ;
Pan, Wei ;
Zhu, Jian ;
Zheng, Xiaoyang .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 68 :65-79