Skip to main content
Log in

An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

A Correction to this article was published on 14 December 2022

This article has been updated

Abstract

Securing digital data transmission or communication is essential for the growing smart cities. At the same, malicious vulnerabilities are also enhanced to break the security. Hence, securing data in a wireless or innovative environment is challenging. So, the current research article has aimed to design novel chimp-based Auto-encoder Networks (CbAN) for the Software-Defined-Network (SDN) Internet-of-Things (IoT) cloud network. Moreover, the SDN with Distributed-Denial-of-Service (DDoS) attack database has been considered in this research. Initially, the datasets were arranged in the tree structure then the error neglecting process was performed. Consequently, the error-less data is imported from the classification module of the auto-encoder tree. Incorporating the chimp fitness solution has offered a better feature extraction and classification outcome. After classifying the malicious features, it is neglected in the SDN environment. Finally, the proposed novel CbAN scheme has been executed in the python platform and has earned outstanding results than the previous work by yielding the highest intrusion forecasting accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

Change history

References

  1. Yang L, Song Y, Gao S, Hu A, Xiao B (2022) Griffin: Real-time network intrusion detection system via ensemble of autoencoder in SDN. IEEE Trans Netw Serv Manag. https://doi.org/10.1109/TNSM.2022.3175710

    Article  Google Scholar 

  2. Muthanna MSA, Alkanhel R, Muthanna A, Rafiq A, Abdullah WAM (2022) Towards SDN-Enabled, Intelligent Intrusion Detection System for Internet of Things (IoT). IEEE Access 10:22756–22768. https://doi.org/10.1109/ACCESS.2022.3153716

    Article  Google Scholar 

  3. Arsalan A, Rehman RA (2022) Interest broadcasting and timing attack in IoV (IBTA-IoV): A novel architecture using Named Software Defined Network. Comput Netw. https://doi.org/10.1016/j.comnet.2022.109121

    Article  Google Scholar 

  4. Prathibha S, Bino J, Ahammed T, Das C, Oion SR, Ghosh S, Afroj M (202) Detection Methods for Software Defined Networking Intrusions (SDN). 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), IEEE. https://doi.org/10.1109/ACCAI53970.2022.9752574

  5. Al Razib M, Javeed D, Khan MT, Alkanhel R, Ali Muthanna MS (2022) Cyber Threats Detection in Smart Environments Using SDN-Enabled DNN-LSTM Hybrid Framework. IEEE Access 10:53015–53026. https://doi.org/10.1109/ACCESS.2022.3172304

    Article  Google Scholar 

  6. Liu H, Zhang S, Zhang P, Zhou X, Shao X, Pu G, Zhang Y (2021) Blockchain and federated learning for collaborative intrusion detection in vehicular edge computing. IEEE Trans Veh Technol 70(6):6073–6084. https://doi.org/10.1109/TVT.2021.3076780

    Article  Google Scholar 

  7. Song F, Qin D, Xu C (2022) A survey of application of artificial intelligence methods in SDN. 2022 IEEE 2nd International Conference on Software Engineering and Artificial Intelligence (SEAI), IEEE. https://doi.org/10.1109/SEAI55746.2022.9832340

  8. Batra R, Mahajan M, Goel A (2022) An Optimized active learning TCM-KNN algorithm based on intrusion detection system. Congress on Intelligent Systems, Springer, Singapore. https://doi.org/10.1007/978-981-16-9416-5_45

  9. Khan AA, Khan MM, Khan KM, Arshad J, Ahmad F (2021) A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs. Comput Netw 196:108217. https://doi.org/10.1016/j.comnet.2021.108217

    Article  Google Scholar 

  10. Makhdoom I, Hayawi K, Kaosar M, Mathew SS, Ho PH (2021) D2Gen: A Decentralized Device Genome Based Integrity Verification Mechanism for Collaborative Intrusion Detection Systems. IEEE Access 9:137260–137280. https://doi.org/10.1109/ACCESS.2021.3117938

    Article  Google Scholar 

  11. Aslan Ö, Ozkan-Okay M, Gupta D (2021) Intelligent behavior-based malware detection system on cloud computing environment. IEEE Access 9:83252–83271. https://doi.org/10.1109/ACCESS.2021.3087316

    Article  Google Scholar 

  12. Razaque A, Jararweh Y, Alotaibi B, Alotaibi M, Hariri S, Almiani M (2022) Energy-efficient and secure mobile fog-based cloud for the Internet of Things. Future Gener Comput Syst 127:1–13. https://doi.org/10.1016/j.future.2021.08.024

    Article  Google Scholar 

  13. Zahra SR, Chishti MA (2022) A generic and lightweight security mechanism for detecting malicious behavior in the uncertain Internet of Things using fuzzy logic-and fog-based approach. Neural Comput Appl 1–26. https://doi.org/10.1007/s00521-021-06823-9

  14. Sanchez-Acevedo S, D'Arco S (2022) A SDN based method for blocking malicious attacks on digital substations communication. 2022 IEEE 5th International Conference on Industrial Cyber-Physical Systems (ICPS), IEEE. https://doi.org/10.1109/ICPS51978.2022.9816964

  15. Diro A, Mahmood A, Chilamkurti N (2021) Collaborative intrusion detection schemes in fog-to-things computing. Fog/Edge Computing For Security, Privacy, and Applications, pp. 93–119. Springer, Cham. https://doi.org/10.1007/978-3-030-57328-7_4

  16. Zaman S, Tauqeer H, Ahmad W, Shah SMA, Ilyas M (2020) Implementation of intrusion detection system in the Internet of Things: A survey. 2020 IEEE 23rd International Multitopic Conference (INMIC), IEEE. https://doi.org/10.1109/INMIC50486.2020.9318047

  17. Li W, Wang Y, Jin Z, Yu K, Li J, Xiang Y (2021) Challenge-based collaborative intrusion detection in software-defined networking: an evaluation. Digit Commun Netw 7(2):257–263. https://doi.org/10.1016/j.dcan.2020.09.003

    Article  Google Scholar 

  18. Li W, Tan J, Wang Y (2020) A framework of blockchain-based collaborative intrusion detection in software defined networking. International Conference on Network and System Security, Springer, Cham. https://doi.org/10.1007/978-3-030-65745-1_15

  19. Abdulqadder IH, Zhou S (2022) SliceBlock: Context-aware Authentication Handover and Secure Network Slicing using DAG-Blockchain in Edge-assisted SDN/NFV-6G Environment. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2022.3161838

    Article  Google Scholar 

  20. Friha O, Ferrag MA, Shu L, Maglaras L, Choo KKR, Nafaa M (2022) FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things. J Parallel Distrib Comput 165:17–31. https://doi.org/10.1016/j.jpdc.2022.03.003

    Article  Google Scholar 

  21. Ahmed U, Lin JCW, Srivastava G (2022) A resource allocation deep active learning based on load balancer for network intrusion detection in SDN sensors. Comput Commun 184:56–63. https://doi.org/10.1016/j.comcom.2021.12.009

    Article  Google Scholar 

  22. Abdel-Basset M, Moustafa N, Hawash H, Razzak I, Sallam KM, Elkomy OM (2021) Federated intrusion detection in blockchain-based smart transportation systems. IEEE Trans Intell Transp Syst 23(3):2523–2537. https://doi.org/10.1109/TITS.2021.3119968

    Article  Google Scholar 

  23. Türkoğlu M, Polat H, Koçak C, Polat O (2022) Recognition of DDoS attacks on SD-VANET based on combination of hyperparameter optimization and feature selection. Expert Syst Appl 117500. https://doi.org/10.1016/j.eswa.2022.117500

  24. Perez-Diaz JA, Valdovinos IA, Choo KKR, Zhu D (2020) A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning. IEEE Access 8:155859–155872. https://doi.org/10.1109/ACCESS.2020.3019330

    Article  Google Scholar 

  25. Hadem P, Saikia DK, Moulik S (2021) An SDN-based intrusion detection system using SVM with selective logging for IP traceback. Comput Netw 191:108015. https://doi.org/10.1016/j.comnet.2021.108015

    Article  Google Scholar 

  26. Patel N, Patel S, Mankad SH (2022) Impact of autoencoder based compact representation on emotion detection from audio. J Ambient Intell Humaniz Comput 13(2):867–885. https://doi.org/10.1007/s12652-021-02979-3

    Article  Google Scholar 

  27. Jia H, Sun K, Zhang W, Leng X (2021) An enhanced chimp optimization algorithm for continuous optimization domains. Complex Intell Syst 8:65–82. https://doi.org/10.1007/s40747-021-00346-5

    Article  Google Scholar 

  28. Liu G, Quan W, Cheng N, Zhang H, Yu S (2019) Efficient DDoS attacks mitigation for stateful forwarding in Internet of Things. J Netw Comput Appl 130:1–13. https://doi.org/10.1016/j.jnca.2019.01.006

    Article  Google Scholar 

  29. Quan W, Liu Y, Zhang H, Yu S (2017) Enhancing crowd collaborations for software defined vehicular networks. IEEE Commun Mag 55(8):80–86. https://doi.org/10.1109/MCOM.2017.1601162

    Article  Google Scholar 

  30. Liu G, Quan W, Cheng N, Gao D, Lu N, Zhang H, Shen X (2021) Softwarized iot network immunity against eavesdropping with programmable data planes. IEEE Internet Things J 8(8):6578–6590. https://doi.org/10.1109/JIOT.2020.3048842

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Kranthi.

Ethics declarations

Ethical approval

All applicable institutional and/or national guidelines for the care and use of animals were followed.

Informed consent

For this type of analysis formal consent is not needed.

Disclosure of potential conflict of interest

The authors declare that they have no potential conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original online version of this article was revised: Affiliation details of the 1st and 2nd authors were incorrectly assigned.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kranthi, S., Kanchana, M. & Suneetha, M. An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks. Peer-to-Peer Netw. Appl. 16, 210–225 (2023). https://doi.org/10.1007/s12083-022-01374-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-022-01374-9

Keywords

Navigation