Skip to main content
Log in

Efficientnetv2-RegNet: an effective deep learning framework for secure SDN based IOT network

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Traditional network administration required manual programming of routing policies and related parameters on specific routers and switches, which was expensive. Therefore, software-defined networking (SDN) technology has been introduced, which has boosted flexibility and decreased hardware development costs by centralizing network management. Since intrusion detection is vital in the SDN environment, this centralized architecture makes information security vulnerable to network threats. To evaluate and recognize these attacks, many researchers have recently adopted cutting-edge approaches like machine learning. However, most of these methods are not very accurate and scalable. To address this issue, this paper proposes an EfficientNetV2-RegNet-based effective deep learning technique. It effectively extracted the network features and classified the intrusions in SDN-based IoT (Internet of Things). Afterwards, an effective mitigation process was performed by a remote SDN controller to mitigate the assaults and reconfigure the network resources for trusted network hosts. Furthermore, the Conditional Generative Adversarial Network (CGAN) based data augmentation approach efficiently tackles the data imbalance issue. The most recent realistic datasets, named InSDN and IoT-23, were utilized to train and assess the presented framework to validate its efficiency. The results of the experiments demonstrated that the suggested system surpassed competitors in identifying various attack types and achieved 99.53 and 99.56% accuracy for IoT-23 and InSDN datasets, correspondingly.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

Not applicable.

References

  1. Luo, K.: A distributed SDN-based intrusion detection system for IoT using optimized forests. PLoS ONE 18(8), e0290694 (2023)

    Article  Google Scholar 

  2. Kumar, C., Biswas, S., Ansari, M.S.A., Govil, M.C.: Nature-inspired intrusion detection system for protecting software-defined networks controller. Comput. Secur. 134, 103438 (2023)

    Article  Google Scholar 

  3. Shaji, N.S., Muthalagu, R., Pawar, P.M.: SD-IIDS: intelligent intrusion detection system for software-defined networks. Multimedia Tools and Applications, 1–33 (2023)

  4. Kou, L., Ding, S., Wu, T., Dong, W., Yin, Y.: An intrusion detection model for drone communication network in sdn environment. Drones 6(11), 342 (2022)

    Article  Google Scholar 

  5. Duy, P.T., Khoa, N.H., Do Hoang, H., Pham, V.H.: Investigating on the robustness of flow-based intrusion detection system against adversarial samples using generative adversarial networks. J. Inform. Secur. Appl. 74, 103472 (2023)

    Google Scholar 

  6. Imran, M., Haider, N., Shoaib, M., Razzak, I.: An intelligent and efficient network intrusion detection system using deep learning. Comput. Electr. Eng. 99, 107764 (2022)

    Article  Google Scholar 

  7. Talukder, M.A., Hasan, K.F., Islam, M.M., Uddin, M.A., Akhter, A., Yousuf, M.A., Moni, M.A.: A dependable hybrid machine learning model for network intrusion detection. J. Inform. Security Appl. 72, 103405 (2023)

    Google Scholar 

  8. Bhardwaj, A., Tyagi, R., Sharma, N., Khare, A., Punia, M.S., Garg, V.K.: Network intrusion detection in software defined networking with self-organized constraint-based intelligent learning framework. Meas. Sens 24, 100580 (2022)

    Article  Google Scholar 

  9. Kasongo, S.M.: A deep learning technique for intrusion detection system using a recurrent neural networks based framework. Comput. Commun. 199, 113–125 (2023)

    Article  Google Scholar 

  10. Alzahrani, A.O., Alenazi, M.J.: ML-IDSDN: Machine learning based intrusion detection system for software-defined network. Concurr. Comput. Pract. Exp. 35(1), e7438 (2023)

    Article  Google Scholar 

  11. Tayfour, O.E., Mubarakali, A., Tayfour, A.E., Marsono, M.N., Hassan, E., Abdelrahman, A.M.: Adapting deep learning-LSTM method using optimized dataset in SDN controller for secure IoT. Soft Comput. (2023). https://doi.org/10.1007/s00500-023-08348-w

    Article  Google Scholar 

  12. Bour, H., Abolhasan, M., Jafarizadeh, S., Lipman, J., Makhdoom, I.: A multilayered intrusion detection system for software defined networking. Comput. Electr. Eng. 101, 108042 (2022)

    Article  Google Scholar 

  13. Qureshi, S.S., He, J., Qureshi, S., Zhu, N., Zardari, Z.A., Mahmood, T., Wajahat, A.: SDN-enabled deep learning based detection mechanism (DDM) to tackle DDoS attacks in IoTs. J. Intell. Fuzzy Syst. 44(6), 10675–10687 (2023)

    Article  Google Scholar 

  14. Alshammari, T.M., Alserhani, F.M.: Scalable and robust intrusion detection system to secure the iot environments using software defined networks (SDN) enabled architecture. Int. J. Comput. Networks Appl 9(6), 678–688 (2022)

    Google Scholar 

  15. Jadhav, K.P., Arjariya, T., Gangwar, M.: Hybrid-Ids: an approach for intrusion detection system with hybrid feature extraction technique using supervised machine learning. Int. J. Intell. Syst. Appl. Eng. 11(5s), 591–597 (2023)

    Google Scholar 

  16. Wang, J., Wang, L.: SDN-Defend: a lightweight online attack detection and mitigation system for DDoS attacks in SDN. Sensors 22(21), 8287 (2022)

    Article  Google Scholar 

  17. Al Razib, M., Javeed, D., Khan, M.T., Alkanhel, R., Muthanna, M.S.A.: Cyber threats detection in smart environments using SDN-enabled DNN-LSTM hybrid framework. IEEE Access 10, 53015–53026 (2022)

    Article  Google Scholar 

  18. Hnamte, V., Hussain, J.: Dependable intrusion detection system using deep convolutional neural network: a Novel framework and performance evaluation approach. Telemat. Inform Rep. 11, 100077 (2023)

    Article  Google Scholar 

  19. Maheshwari, A., Mehraj, B., Khan, M.S., Idrisi, M.S.: An optimized weighted voting based ensemble model for DDoS attack detection and mitigation in SDN environment. Microprocess. Microsyst. 89, 104412 (2022)

    Article  Google Scholar 

  20. Ravi, V., Chaganti, R., Alazab, M.: Deep learning feature fusion approach for an intrusion detection system in SDN-based IoT networks. IEEE Internet Things Mag. 5(2), 24–29 (2022)

    Article  Google Scholar 

  21. Maray, M., MesferAlshahrani, H., Alissa, A.K., Alotaibi, N., Gaddah, A., Meree, A., Ahmed Hamza, M.: Optimal deep learning driven intrusion detection in SDN-Enabled IoT environment. Comput. Mater. Continua. 74(3), 6587–6604 (2022)

    Article  Google Scholar 

  22. Logeswari, G., Bose, S., Anitha, T.: An intrusion detection system for sdn using machine learning. Intell. Autom. Soft Comput. 35(1), 867–880 (2023)

    Article  Google Scholar 

  23. Aslam, M., Ye, D., Tariq, A., Asad, M., Hanif, M., Ndzi, D., Jilani, S.F.: Adaptive machine learning based distributed denial-of-services attacks detection and mitigation system for SDN-enabled IoT. Sensors 22(7), 2697 (2022)

    Article  Google Scholar 

  24. El Sayed, M.S., Le-Khac, N.A., Azer, M.A., Jurcut, A.D.: A flow-based anomaly detection approach with feature selection method against ddos attacks in sdns. IEEE Trans. Cognitive Commun. Netw. 8(4), 1862–1880 (2022)

    Article  Google Scholar 

  25. Elsayed, R.A., Hamada, R.A., Abdalla, M.I., Elsaid, S.A.: Securing IoT and SDN systems using deep-learning based automatic intrusion detection. Ain Shams Eng. J. 14(10), 102211 (2023)

    Article  Google Scholar 

  26. Ferrão, T., Manene, F., Ajibesin, A.A.: Multi-attack intrusion detection system for software-defined internet of things network. Comput. Mater. Continua. (2023). https://doi.org/10.32604/cmc.2023.038276

    Article  Google Scholar 

  27. Arun Prasad, P.B., Mohan, V., Vinoth Kumar, K.: Hybrid metaheuristics with deep learning enabled cyberattack prevention in software defined networks. Tehnički Vjesnik 31(1), 208–214 (2024)

    Google Scholar 

  28. Polat, O., Türkoğlu, M., Polat, H., Oyucu, S., Üzen, H., Yardımcı, F., Aksöz, A.: Multi-stage learning framework using convolutional neural network and decision tree-based classification for detection of DDoS pandemic attacks in SDN-based SCADA systems. Sensors 24(3), 1040 (2024)

    Article  Google Scholar 

  29. Said, R.B., Sabir, Z., Askerzade, I.: CNN-BiLSTM: A hybrid deep learning approach for network intrusion detection system in software defined networking with hybrid feature selection. IEEE Access. 11, 138732–138747 (2023). https://doi.org/10.1109/ACCESS.2023.3340142

  30. Friha, O., Ferrag, M.A., Shu, L., Maglaras, L., Choo, K.K.R., Nafaa, M.: FELIDS: Federated learning-based intrusion detection system for agricultural internet of things. J. Parallel Distrib. Comput. 165, 17–31 (2022)

    Article  Google Scholar 

  31. Abdallah, M., An Le Khac, N., Jahromi, H., Delia Jurcut, A.: A hybrid CNN-LSTM based approach for anomaly detection systems in SDNs. In: Proceedings of the 16th International Conference on Availability, Reliability and Security, p 1–7 (2021)

  32. Safwan, H., Iqbal, Z., Amin, R., Khan, M.A., Alhaisoni, M., Alqahtani, A., Chang, B.: An IoT environment based framework for intelligent intrusion detection. CMC Comput. Mater. Continua. 75(2), 2365–2381 (2023)

    Google Scholar 

  33. Alshra’a, A.S., Farhat, A., Seitz, J.: Deep learning algorithms for detecting denial of service attacks in software-defined networks. Procedia Comput. Sci. 191, 254–263 (2021)

    Article  Google Scholar 

  34. Elsayed, M.S., Jahromi, H.Z., Nazir, M.M., Jurcut, A.D.: The role of CNN for intrusion detection systems: An improved CNN learning approach for SDNs. In: International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures. Springer International Publishing, Cham, p 91–104 (2021)

  35. Gyamfi, E., Jurcut, A.D.: Novel online network intrusion detection system for industrial iot based on oi-svdd and as-elm. IEEE Internet Things J. 10(5), 3827–3839 (2022)

    Article  Google Scholar 

  36. Sanju, P.: Enhancing intrusion detection in IoT systems: a hybrid metaheuristics-deep learning approach with ensemble of recurrent neural networks. J. Eng. Res. (2023). https://doi.org/10.1016/j.jer.2023.100122

    Article  Google Scholar 

  37. Abdalgawad, N., Sajun, A., Kaddoura, Y., Zualkernan, I.A., Aloul, F.: Generative deep learning to detect cyberattacks for the IoT-23 dataset. IEEE Access 10, 6430–6441 (2021)

    Article  Google Scholar 

  38. Hamza, A.A., Abdel Halim, I.T., Sobh, M.A., Bahaa-Eldin, A.M.: HSAS-MD analyzer: a hybrid security analysis system using model-checking technique and deep learning for malware detection in IoT apps. Sensors 22(3), 1079 (2022)

    Article  Google Scholar 

  39. Sahu, A.K., Sharma, S., Tanveer, M., Raja, R.: Internet of things attack detection using hybrid deep learning model. Comput. Commun. 176, 146–154 (2021)

    Article  Google Scholar 

  40. Kolhar, M., Aldossary, S.M.: DL-Powered anomaly identification system for enhanced IoT data security. Comput. Mater. Continua. 77(3), 2857–2857 (2023)

    Article  Google Scholar 

  41. Bhandari, G., Lyth, A., Shalaginov, A., Grønli, T.M.: Distributed deep neural-network-based middleware for cyber-attacks detection in smart IoT ecosystem: a novel framework and performance evaluation approach. Electronics 12(2), 298 (2023)

    Article  Google Scholar 

Download references

Acknowledgements

We declare that this manuscript is original, has not been published before, and is not currently being considered for publication elsewhere.

Author information

Authors and Affiliations

Authors

Contributions

The author confirms sole responsibility for the following: study conception and design, data collection, analysis and interpretation of results, and manuscript preparation.

Corresponding author

Correspondence to Srinivasa Rao Battula.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Ethical approval

This material is the author’s original work, which has yet to be previously published elsewhere. The paper reflects the author’s research and analysis truthfully and completely.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix

Appendix-I

InSDN dataset

IoT-23 dataset

Attack types

Original Samples

After removing duplicate record

Newly generated samples

After augmentation

Attack types

Original Samples

After removing duplicate records

Newly generated samples

After augmentation

Normal

68,424

0

68,424

Benign

30,858,735

2,113,860

To maintain dataset balance, certain samples are eliminated

68,424

DDoS

121,942

To maintain dataset balance, certain samples are eliminated

68,424

DDoS

19,538,713

3,643,225

To maintain dataset balance, certain samples are eliminated

68,424

DoS

 

14,808

68,424

Mirai

9400

9400

59,024

68,424

Probe

 

To maintain dataset balance, certain samples are eliminated

68,424

Okiru

60,990,711

234,942

To maintain dataset balance, certain samples are eliminated

68,424

Botnet

164

68,260

68,424

Torii

30

30

68,394

68,424

Password

1405

67,019

68,424

PartofHorizontalPortScan

213,853,817

369,525

To maintain dataset balance, certain samples are eliminated

68,424

Web-attack

192

 

68,424

Heart beat

34,518

22,982

45,442

68,424

U2R

17

68,407

68,424

FileDownload

71

71

68,353

68,424

     

Command and control

21,995

18,939

49,485

68,424

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Swathi, B., Kolisetty, S.S., Sivanarayana, G.V. et al. Efficientnetv2-RegNet: an effective deep learning framework for secure SDN based IOT network. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04498-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04498-0

Keywords

Navigation