Skip to main content
Log in

Hybrid architecture for mitigating DDoS and other intrusions in SDN-IoT using MHDBN-W deep learning model

  • Original Article
  • Published:
International Journal of Machine Learning and Cybernetics Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) connects billions of devices. However, because of its heterogeneous system and broad connectivity, it is vulnerable to various intrusion challenges, resulting in data and financial loss. The IoT environment must be secured from such threats. This research proposes an SDN-enabled Deep-Learning-Driven System for IoT intrusion detection. Intrusion detection can detect unknown threats from network traffic and is a good network security measure. Most current network anomaly detection approaches use standard machine learning models like KNN and SVM. These approaches have some significant advantages, but they are not very accurate and rely on manual traffic design, which is outmoded in the age of big data. Our proposed Hybrid Deep Learning-based Intrusion Detection System (HDLIDS) addresses low accuracy and feature engineering issues. HDLIDS uses a novel Modified Hybrid Deep Belief Network with Weights (MHDBN-W) algorithm to detect existing and new cyberattacks. The MHDBN-W method consists of an MCL, a layer combining the MGBRBM and DNN-W algorithms, and an aggregator layer. The MHDBN-W technique has two phases: UL and SL of traffic features into normal and abnormal classes. The HDLIDS model is evaluated on the CICIDS2018 dataset compared to other conventional learning methods. It outperforms all other models in all performance criteria.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Algorithm 1
Fig. 1
Fig. 2
Fig. 3
Algorithm 2
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

References

  1. Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: internet of threats? A Survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J 6:8182–8201

    Article  Google Scholar 

  2. Galeano-Brajones J, Carmona-Murillo J, Valenzuela-Valdés JF, Luna-Valero F (2020) Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: an experimental approach. Sensors (Basel) 20(3):816

    Article  Google Scholar 

  3. Singh J, Behal S (2020) Detection and mitigation of DDoS attacks in SDN: a comprehensive review, research challenges and future directions. Comput Sci Rev 37:100279

    Article  Google Scholar 

  4. Papamartzivanos D, Gomez Marmol F, Kambourakis G (2019) Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access 7:13546–13560

    Article  Google Scholar 

  5. Aldwairi T, Perera D, Novotny MA (2018) An evaluation of the performance of restricted Boltzmann machines as a model for anomaly network intrusion detection. Comput Netw 144:111–119

    Article  Google Scholar 

  6. Elsaeidy A, Munasinghe KS, Sharma D, Jamalipour A (2018) Intrusion detection in smart cities using restricted Boltzmann machines. J Netw Comput Appl 135(6):76–83

    Google Scholar 

  7. Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2019) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Future Gener Comput Syst 100:779–796

    Article  Google Scholar 

  8. Rawat DB, Reddy SR (2017) Software-defined networking architecture, security and energy efficiency: a survey. IEEE Commun Surv Tuts 19(1):325–346

    Article  Google Scholar 

  9. Salman O, Abdallah S, Elhajj IH, Chehab A, Kayssi A (2016) Identity-based authentication scheme for the Internet of things. In: 2016 IEEE Symposium on Computers and Communication, pp 1109–1111

  10. Nobakht M, Sivaraman V, Borelli R (2016) A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow. In: International Conference on Availability, Reliability and Security, pp 147–156

  11. Bull P, Austin R, Sharma M, Watson R (2016) Flow-based security for IoT devices using an SDN gateway. In: IEEE International Conference on Future Internet of Things and Cloud, pp 157–163

  12. Tortonesi M, Michaelis J, Morelli A, Suri N, Baker MA (2016) SPF: an SDN-based middleware solution to mitigate the IoT information explosion. In: Proceedings of the IEEE Symposium on Computers and Communication, Messina, Italy, 27–30 June 2016, pp 435–442

  13. Özçelik M, Chalabianloo N, Gür G (2017) Software-defined edge defense against IoT-based DDoS. In: Proceedings of the 2017 IEEE International Conference on Computer and Information Technology (CIT), Helsinki, Finland, 21–23 August 2017, pp 308–313

  14. Sarwar MA, Hussain M, Anwar MU, Ahmad M (2019) FlowJustifier: An optimized trust-based request prioritization approach for mitigation of SDN controller DDoS attacks in the IoT paradigm. In: Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, Paris, France, 1–2 July 2019, pp 1–9

  15. Ravi N, Shalinie SM (2020) Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet Things J 7:3559–3570

    Article  Google Scholar 

  16. Sharma PK, Singh S, Park JH (2018) OpCloudSec: open cloud software-defined wireless network security for the Internet of Things. Comput Commun 122:1–8

    Article  Google Scholar 

  17. Diro AA, Chilamkurti N (2018) ’ Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761–768

    Article  Google Scholar 

  18. Venkatraman S, Alazab M, Vinayakumar R (2019) ’A hybrid deep learning image-based analysis for effective malware detection. J Inj Secur Appl 47:377–389

    Google Scholar 

  19. Aigner W et al (2017) Visual analytics: foundations and experiences in malware analysis. Empirical research for software security. CRC Press, pp 159–192

    Google Scholar 

  20. Khan FA, Gumaei A, Derhab A, Hussain A (2019) A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access 7:30373–30385

    Article  Google Scholar 

  21. Ferrag MA, Maglaras L, Janicke H, Smith R (2019) Deep learning techniques for cyber security intrusion detection: a detailed analysis. https://doi.org/10.14236/ewic/icscsr19.16

  22. Ge M, Fu X, Syed N, Baig Z, Teo G, Robles-Kelly A (2019) Deep learning-based intrusion detection for IoT networks. In: Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC, pp 256–265

  23. Alkadi O, Moustafa N, Turnbull B, Choo K-KR (2019) Mixture localization-based outliers models for securing data migration in cloud centers. IEEE Access 7:114607–114618

    Article  Google Scholar 

  24. Rajesh-Kanna P, Santhi P (2022) Hybrid Intrusion detection using MapReduce based black widow optimized convolutional long short-term memory neural networks. Expert Syst Appl 194:116545. https://doi.org/10.1016/j.eswa.2022.116545

    Article  Google Scholar 

  25. Ullah S, Khan MA, Ahmad J, Jamal SS, Huma Z, Hassan MT, Pitropakis N, Arshad N, Buchanan WJ (2022) HDL-IDS: a hybrid deep learning architecture for intrusion detection in the internet of vehicles. Sensors 22:1340. https://doi.org/10.3390/s22041340

    Article  Google Scholar 

  26. Erfani SM, Rajasegarar S, Karunasekera S, Leckie C (2016) High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn 58(7):121–134

    Article  Google Scholar 

  27. Shao H, Jiang H, Li X, Liang T (2016) Rolling bearing fault detection using continuous deep belief network with locally linear embedding. Comput Ind 96(61):27–39

    Google Scholar 

  28. Khalaf BA, Mostafa SA, Mustapha A, Mohammed MA, Abduallah WM (2019) Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods. IEEE Access 7:51691–51713

    Article  Google Scholar 

  29. Metropolis N, Rosenbluth A, Rosenbluth M, Teller A, Teller E (1953) Equations of state calculations by fast computing machines. J Chem Phys 21:1087–1091

    Article  Google Scholar 

  30. Robert CP, Casella G (2004) Monte Carlo statistical methods. Springer

    Book  Google Scholar 

  31. Kamil Z, Robiah Y, Mostafa S, Bahaman N, Musa O, Al-rimy B (2021) Deep IoT-IDS: hybrid deep learning for enhancing IoT network intrusion detection. Comput Mater Contin 69:3945–3966

    Google Scholar 

  32. Ruder S (2016) An overview of gradient descent optimization algorithms. Sebastian Ruder

  33. Sharafaldin I, Lashkari AH, Ali A (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the He Fourth International Conference on Information Systems Security and Privacy (ICISSP), Madeira, Portugal, January 2018

Download references

Author information

Authors and Affiliations

Authors

Contributions

The authors confirm their contribution to the paper as follows: study conception and design: M. Revathi and S. Kiruthika Devi data collection: S. Kiruthika Devi; analysis and interpretation of results: M. Revathi and S. Kiruthika Devi; draft manuscript preparation: M. Revathi. All authors reviewed the results and approved the final version of the manuscript.

Corresponding author

Correspondence to M. Revathi.

Ethics declarations

Conflict of interest

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Revathi, M., Devi, S.K. Hybrid architecture for mitigating DDoS and other intrusions in SDN-IoT using MHDBN-W deep learning model. Int. J. Mach. Learn. & Cyber. (2024). https://doi.org/10.1007/s13042-024-02147-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13042-024-02147-x

Keywords

Navigation