VARMAN: Multi-plane security framework for software defined networks

被引:64
作者
Krishnan, Prabhakar [1 ]
Duttagupta, Subhasri [2 ]
Achuthan, Krishnashree [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Ctr Cybersecur Syst & Networks, Amritapuri, India
[2] Amrita Vishwa Vidyapeetham, Dept Comp Sci & Engn, Amritapuri, India
关键词
SDN; NFV; SDNFV; IoT; Cloud; Edge networks; DDoS; Botnet; Malware; Network security; Threat analytics; Security; IDS; IPS; NIDS; Machine learning; Deep learning; CICIDS2017;
D O I
10.1016/j.comcom.2019.09.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the context of future networking technologies, Software-Defined paradigm offers compelling solutions and advantages for traffic orchestration and shaping, flexible and dynamic routing, programmable control and smart application-driven resource management. But the SDN operation has to confront critical issues and technical vulnerabilities, security problems and threats in the enabling technical architecture itself. To address the critical security problems in SDN enabled data centers, we propose a collaborative "Network Security and Intrusion Detection System(NIDS)" scheme called "VARMAN: adVanced multi-plAne secuRity fraMework for softwAre defined Networks'. The SDN security scheme comprises of coarse-grained flow monitoring algorithms on the dataplane for rapid anomaly detection and prediction of network-centric DDoS/botnet attacks. In addition, this is combined with a fine-grained hybrid deep-learning based classifier pipeline on the control plane. It is observed that existing ML-based classifiers improve the accuracy of NIDS, however, at the cost of higher processing power and memory requirement, thus unrealistic for real-time solutions. To address these problems and still achieve accuracy and speed, we designed a hybrid model, combining both deep and shallow learning techniques, that are implemented in an improved SDN stack. The data plane deploys attack prediction and behavioral trigger mechanisms, efficient data filtering, feature selection, and data reduction techniques. To demonstrate the practical feasibility of our security scheme in real modern datacenters, we utilized the popular NSL-KDD dataset, most recent CICIDS2017 dataset, and refined it to a balanced dataset containing a comparable number of normal traffic and malware samples. We further augmented the training by organically generating datasets from lab-simulated and public-network hosted hackathon websites. The results show that VARMAN framework is capable of detecting attacks in real-time with accuracy more than 98% under attack intensities up to 50k packets/second. In a multi-controller interconnected SDN domain, the flow setup time improves by 70% on an average, and controller response time reduces by 40%, without incurring additional latency due to security intelligence processing overhead in SDN stack. The comparisons of VARMAN under similar attack scenarios and test environment, with related recent works that utilized ML-based NIDS, demonstrate that our scheme offers higher accuracy, less than 5% false positive rate for various attack intensities and significant training space/time reduction.
引用
收藏
页码:215 / 239
页数:25
相关论文
共 51 条
[1]   Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection [J].
Abdulhammed, Razan ;
Musafer, Hassan ;
Alessa, Ali ;
Faezipour, Miad ;
Abuzneid, Abdelshakour .
ELECTRONICS, 2019, 8 (03)
[2]   Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment [J].
Abdulqadder, Ihsan H. ;
Zou, Deqing ;
Aziz, Israa T. ;
Yuan, Bin ;
Dai, Weiqi .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) :866-877
[3]  
Ajaeiya GA, 2017, IEEE SYMP COMP COMMU, P787, DOI 10.1109/ISCC.2017.8024623
[4]  
Alrawashdeh K, 2016, 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), P195, DOI [10.1109/ICMLA.2016.0040, 10.1109/ICMLA.2016.167]
[5]  
Anbar M, 2016, ANN CONF PRIV SECUR
[6]  
[Anonymous], 2016, J. Netw. Comput. Appl., V68, pp65
[7]  
[Anonymous], 2017, ITU J. ICT Discov. Spec
[8]  
[Anonymous], 2018, PROC INT C MOBILE WI
[9]  
Barki L, 2016, 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P2576, DOI 10.1109/ICACCI.2016.7732445
[10]  
Bhunia S.S., 2017, 2017 27 INT TELECOMM, P1