Abstract
Securing digital data transmission or communication is essential for the growing smart cities. At the same, malicious vulnerabilities are also enhanced to break the security. Hence, securing data in a wireless or innovative environment is challenging. So, the current research article has aimed to design novel chimp-based Auto-encoder Networks (CbAN) for the Software-Defined-Network (SDN) Internet-of-Things (IoT) cloud network. Moreover, the SDN with Distributed-Denial-of-Service (DDoS) attack database has been considered in this research. Initially, the datasets were arranged in the tree structure then the error neglecting process was performed. Consequently, the error-less data is imported from the classification module of the auto-encoder tree. Incorporating the chimp fitness solution has offered a better feature extraction and classification outcome. After classifying the malicious features, it is neglected in the SDN environment. Finally, the proposed novel CbAN scheme has been executed in the python platform and has earned outstanding results than the previous work by yielding the highest intrusion forecasting accuracy.
Similar content being viewed by others
Change history
14 December 2022
A Correction to this paper has been published: https://doi.org/10.1007/s12083-022-01423-3
References
Yang L, Song Y, Gao S, Hu A, Xiao B (2022) Griffin: Real-time network intrusion detection system via ensemble of autoencoder in SDN. IEEE Trans Netw Serv Manag. https://doi.org/10.1109/TNSM.2022.3175710
Muthanna MSA, Alkanhel R, Muthanna A, Rafiq A, Abdullah WAM (2022) Towards SDN-Enabled, Intelligent Intrusion Detection System for Internet of Things (IoT). IEEE Access 10:22756–22768. https://doi.org/10.1109/ACCESS.2022.3153716
Arsalan A, Rehman RA (2022) Interest broadcasting and timing attack in IoV (IBTA-IoV): A novel architecture using Named Software Defined Network. Comput Netw. https://doi.org/10.1016/j.comnet.2022.109121
Prathibha S, Bino J, Ahammed T, Das C, Oion SR, Ghosh S, Afroj M (202) Detection Methods for Software Defined Networking Intrusions (SDN). 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), IEEE. https://doi.org/10.1109/ACCAI53970.2022.9752574
Al Razib M, Javeed D, Khan MT, Alkanhel R, Ali Muthanna MS (2022) Cyber Threats Detection in Smart Environments Using SDN-Enabled DNN-LSTM Hybrid Framework. IEEE Access 10:53015–53026. https://doi.org/10.1109/ACCESS.2022.3172304
Liu H, Zhang S, Zhang P, Zhou X, Shao X, Pu G, Zhang Y (2021) Blockchain and federated learning for collaborative intrusion detection in vehicular edge computing. IEEE Trans Veh Technol 70(6):6073–6084. https://doi.org/10.1109/TVT.2021.3076780
Song F, Qin D, Xu C (2022) A survey of application of artificial intelligence methods in SDN. 2022 IEEE 2nd International Conference on Software Engineering and Artificial Intelligence (SEAI), IEEE. https://doi.org/10.1109/SEAI55746.2022.9832340
Batra R, Mahajan M, Goel A (2022) An Optimized active learning TCM-KNN algorithm based on intrusion detection system. Congress on Intelligent Systems, Springer, Singapore. https://doi.org/10.1007/978-981-16-9416-5_45
Khan AA, Khan MM, Khan KM, Arshad J, Ahmad F (2021) A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs. Comput Netw 196:108217. https://doi.org/10.1016/j.comnet.2021.108217
Makhdoom I, Hayawi K, Kaosar M, Mathew SS, Ho PH (2021) D2Gen: A Decentralized Device Genome Based Integrity Verification Mechanism for Collaborative Intrusion Detection Systems. IEEE Access 9:137260–137280. https://doi.org/10.1109/ACCESS.2021.3117938
Aslan Ö, Ozkan-Okay M, Gupta D (2021) Intelligent behavior-based malware detection system on cloud computing environment. IEEE Access 9:83252–83271. https://doi.org/10.1109/ACCESS.2021.3087316
Razaque A, Jararweh Y, Alotaibi B, Alotaibi M, Hariri S, Almiani M (2022) Energy-efficient and secure mobile fog-based cloud for the Internet of Things. Future Gener Comput Syst 127:1–13. https://doi.org/10.1016/j.future.2021.08.024
Zahra SR, Chishti MA (2022) A generic and lightweight security mechanism for detecting malicious behavior in the uncertain Internet of Things using fuzzy logic-and fog-based approach. Neural Comput Appl 1–26. https://doi.org/10.1007/s00521-021-06823-9
Sanchez-Acevedo S, D'Arco S (2022) A SDN based method for blocking malicious attacks on digital substations communication. 2022 IEEE 5th International Conference on Industrial Cyber-Physical Systems (ICPS), IEEE. https://doi.org/10.1109/ICPS51978.2022.9816964
Diro A, Mahmood A, Chilamkurti N (2021) Collaborative intrusion detection schemes in fog-to-things computing. Fog/Edge Computing For Security, Privacy, and Applications, pp. 93–119. Springer, Cham. https://doi.org/10.1007/978-3-030-57328-7_4
Zaman S, Tauqeer H, Ahmad W, Shah SMA, Ilyas M (2020) Implementation of intrusion detection system in the Internet of Things: A survey. 2020 IEEE 23rd International Multitopic Conference (INMIC), IEEE. https://doi.org/10.1109/INMIC50486.2020.9318047
Li W, Wang Y, Jin Z, Yu K, Li J, Xiang Y (2021) Challenge-based collaborative intrusion detection in software-defined networking: an evaluation. Digit Commun Netw 7(2):257–263. https://doi.org/10.1016/j.dcan.2020.09.003
Li W, Tan J, Wang Y (2020) A framework of blockchain-based collaborative intrusion detection in software defined networking. International Conference on Network and System Security, Springer, Cham. https://doi.org/10.1007/978-3-030-65745-1_15
Abdulqadder IH, Zhou S (2022) SliceBlock: Context-aware Authentication Handover and Secure Network Slicing using DAG-Blockchain in Edge-assisted SDN/NFV-6G Environment. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2022.3161838
Friha O, Ferrag MA, Shu L, Maglaras L, Choo KKR, Nafaa M (2022) FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things. J Parallel Distrib Comput 165:17–31. https://doi.org/10.1016/j.jpdc.2022.03.003
Ahmed U, Lin JCW, Srivastava G (2022) A resource allocation deep active learning based on load balancer for network intrusion detection in SDN sensors. Comput Commun 184:56–63. https://doi.org/10.1016/j.comcom.2021.12.009
Abdel-Basset M, Moustafa N, Hawash H, Razzak I, Sallam KM, Elkomy OM (2021) Federated intrusion detection in blockchain-based smart transportation systems. IEEE Trans Intell Transp Syst 23(3):2523–2537. https://doi.org/10.1109/TITS.2021.3119968
Türkoğlu M, Polat H, Koçak C, Polat O (2022) Recognition of DDoS attacks on SD-VANET based on combination of hyperparameter optimization and feature selection. Expert Syst Appl 117500. https://doi.org/10.1016/j.eswa.2022.117500
Perez-Diaz JA, Valdovinos IA, Choo KKR, Zhu D (2020) A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning. IEEE Access 8:155859–155872. https://doi.org/10.1109/ACCESS.2020.3019330
Hadem P, Saikia DK, Moulik S (2021) An SDN-based intrusion detection system using SVM with selective logging for IP traceback. Comput Netw 191:108015. https://doi.org/10.1016/j.comnet.2021.108015
Patel N, Patel S, Mankad SH (2022) Impact of autoencoder based compact representation on emotion detection from audio. J Ambient Intell Humaniz Comput 13(2):867–885. https://doi.org/10.1007/s12652-021-02979-3
Jia H, Sun K, Zhang W, Leng X (2021) An enhanced chimp optimization algorithm for continuous optimization domains. Complex Intell Syst 8:65–82. https://doi.org/10.1007/s40747-021-00346-5
Liu G, Quan W, Cheng N, Zhang H, Yu S (2019) Efficient DDoS attacks mitigation for stateful forwarding in Internet of Things. J Netw Comput Appl 130:1–13. https://doi.org/10.1016/j.jnca.2019.01.006
Quan W, Liu Y, Zhang H, Yu S (2017) Enhancing crowd collaborations for software defined vehicular networks. IEEE Commun Mag 55(8):80–86. https://doi.org/10.1109/MCOM.2017.1601162
Liu G, Quan W, Cheng N, Gao D, Lu N, Zhang H, Shen X (2021) Softwarized iot network immunity against eavesdropping with programmable data planes. IEEE Internet Things J 8(8):6578–6590. https://doi.org/10.1109/JIOT.2020.3048842
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethical approval
All applicable institutional and/or national guidelines for the care and use of animals were followed.
Informed consent
For this type of analysis formal consent is not needed.
Disclosure of potential conflict of interest
The authors declare that they have no potential conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The original online version of this article was revised: Affiliation details of the 1st and 2nd authors were incorrectly assigned.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kranthi, S., Kanchana, M. & Suneetha, M. An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks. Peer-to-Peer Netw. Appl. 16, 210–225 (2023). https://doi.org/10.1007/s12083-022-01374-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-022-01374-9