Machine learning assisted snort and zeek in detecting DDoS attacks in software-defined networking

被引:10
作者
AbdulRaheem M. [1 ]
Oladipo I.D. [1 ]
Imoize A.L. [2 ,3 ]
Awotunde J.B. [1 ]
Lee C.-C. [4 ,5 ]
Balogun G.B. [1 ]
Adeoti J.O. [1 ]
机构
[1] Department of Computer Science, Faculty of Information and Communication Sciences, University of Ilorin, Ilorin
[2] Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos
[3] Department of Electrical Engineering and Information Technology, Institute of Digital Communication, Ruhr University, Bochum
[4] Research and Development Center for Physical Education, Health, and Information Technology, Department of Library and Information Science, Fu Jen Catholic University, New Taipei City
[5] Department of Computer Science and Information Engineering, Asia University, Taichung City
关键词
Cybersecurity; Distributed denial of service; Intrusion detection systems; Snort; Software-defined networks; Virtual machine; Zeek;
D O I
10.1007/s41870-023-01469-3
中图分类号
学科分类号
摘要
A new network architecture called the Software-Defined Network (SDN) gives next-generation networks a more flexible and efficiently controlled network architecture. Using the programmable central controller design, network supervisors may easily supervise and manage the entire infrastructure. However, due to its centralized structure, SDN has been a target of various attack vectors. The most successful attack method against the SDN among these has been Distributed Denial of Service (DDoS). Therefore, this study proposes a snort and Zeek enabled with machine learning (ML) based model to classify the benign traffic from DDoS attack traffic. This study main contribution is the discovery of new features for DDoS attack detection, which made it difficult to distinguish authorized traffic from attack traffic when spread across so many points of origin. Using the ML-based enabled RYU controller with SNORT and ZEEK created fewer false positives and a smaller variety of true positives per attack than the existing methods. The processing time of ML-based enabled with SNORT and ZEEK on the real-time testbed is better contrasted to the existing methods. Using the open resource technologies offered a far better understanding of cyber safety and its benefits from the readily available programs to construct a solid network keeping an eye on the traffic. © The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2023.
引用
收藏
页码:1627 / 1643
页数:16
相关论文
共 46 条
[1]  
Al-Thaedan A., Shakir Z., Mjhool A.Y., Alsabah R., Al-Sabbagh A., Salah M., Zec J., Downlink throughput prediction using machine learning models on 4G-LTE networks, International Journal of Information Technology, pp. 1-7, (2023)
[2]  
Hong S., Xu L., Wang H., Gu G., Poisoning network visibility in software-defined networks: New attacks and countermeasures, Ndss, 15, pp. 8-11, (2015)
[3]  
An entropy-based distributed DDoS detection mechanism in software-defined networking, In 2015 IEEE Trustcom/Bigdatase/Ispa, 1, pp. 310-317, (2015)
[4]  
Rawat R., Chakrawarti R.K., Raj A., Mani G., Chidambarathanu K., Bhardwaj R., Association rule learning for threat analysis using traffic analysis and packet filtering approach, International Journal of Information Technology, pp. 1-11, (2023)
[5]  
Tonkal O., Polat H., Basaran E., Comert Z., Kocaoglu R., Machine learning approach equipped with neighbourhood component analysis for ddos attack detection in software-defined networking, Electronics, 10, 11, (2021)
[6]  
Biswas P., Samanta T., Anomaly detection using ensemble random forest in wireless sensor network, Int J Inf Technol, 13, 5, pp. 2043-2052, (2021)
[7]  
An SDN-supported collaborative approach for DDoS flooding detection and containment, In MILCOM 2015–2015 IEEE Military Communications Conference, pp. 659-664, (2015)
[8]  
Hnamte V., Hussain J., An efficient DDoS attack detection mechanism in SDN environment, International Journal of Information Technology, pp. 1-14, (2023)
[9]  
Ahuja N., Singal G., Mukhopadhyay D., Kumar N., Automated DDOS attack detection in software defined networking, J Netw Comput Appl, 187, (2021)
[10]  
Dhawan M., Poddar R., Mahajan K., Mann V., Sphinx: Detecting security attacks in software-defined networks, 15, pp. 8-11, (2015)