Skip to main content

A Proposed Approach to DDoS Attacks Detection on SDN Using Machine Learning Technique

  • Conference paper
  • First Online:
Innovations in Cyber Physical Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 788))

  • 1068 Accesses

Abstract

Software-defined network (SDN) is becoming very popular because of numerous advantages it offers, such as scalability, centralized management, better performance and other parameters. However, it suffers from many security threats including DDoS attacks. These attacks are performed more on the controllers of SDN, which is the most important component in this new network architecture. When a DDoS attack is performed in the controller it becomes over-engaged and its power to communicate with network applications and devices is reduced drastically. Due to this overloading, the switch flow tables become exhausted and the overall network performance suffers and reduces to a bare minimum, and even stops at many times. In the proposed work, an approach to DDoS attacks in a software-defined network is described. About 130,000 feature vectors will be acquired from SDN for experimentation under normal traffic and expected DDoS-based traffic. Using feature selection methods, a proposed data set will be created. The nature of the feature selection method is to shorten the training time and prediction time, simplification of models and facilitate the interpretation of results. The original feature vector set and the data set filtered by the feature selection method will be trained with classifiers, namely naïve Bayes (NB), k-nearest neighbor (k-NN), artificial neural network (ANN) and support vector machine (SVM). The test results will be compared against existing researches. The aim of the experiments will be to obtain efficient results in terms of DDoS detection in SDN and pruning of time and processing loads.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Open Networking Foundation. Software-Defined Networking: The New Norm for Networks. Available online: www.opennetworking.org/images/stories/downloads /sdn-resources/white-papers/wp-sdn- newnorm.pdf. Last accessed 10 April 2020

    Google Scholar 

  2. Kreutz D, Ramos FMV, Verissimo PE, Rothenberg CE, Azodolmolky S, Uhlig S (2014) Software-defined networking: a comprehensive survey. Proc IEEE 103(1):14–76

    Google Scholar 

  3. Xie J, Guo D, Zhiyao Hu, Ting Qu, Lv P (2015) Control plane of software defined networks: a survey. Comput Commun 67:1–10

    Google Scholar 

  4. Suciu G, Vulpe A (2015) An overview study of software defined networking. In: Proceedings of the IE international conference, vol 30. Bucharest, Romania

    Google Scholar 

  5. Kreutz D, Ramos FMV, Verissimo P (2013) Towards secure and dependable software-defined networks. In: Proceedings of the second ACM SIGCOMM workshop on hot topics in software defined networking, pp 55–60

    Google Scholar 

  6. Shu Z, Wan J, Li Di, Lin J, Vasilakos AV, Imran M (2016) Security in software-defined networking: threats and countermeasures. Mobile Netw Appl 21(5):764–776

    Google Scholar 

  7. Ali ST, Sivaraman V, Radford A, Jha S (2015) A survey of securing networks using software defined networking. IEEE Trans Reliabil 64(3):1086–1097

    Google Scholar 

  8. Kuerban M, Tian Y, Yang Q, Jia Y, Huebert B, Poss D (2016) FlowSec: DOS attack mitigation strategy on SDN controller. In: 2016 IEEE international conference on networking, architecture and storage (NAS). IEEE, pp 1–2

    Google Scholar 

  9. Alshamrani A, Chowdhary A, Pisharody S, Lu D, Huang D (2017) A defense system for defeating DDoS attacks in SDN based networks. In: Proceedings of the 15th ACM international symposium on mobility management and wireless access, pp 83–92

    Google Scholar 

  10. Latah M, Toker L (2018) A novel intelligent approach for detecting DoS flooding attacks in software-defined networks. Int J Adv Intell Inf 2018

    Google Scholar 

  11. Li C, Wu Y, Yuan X, Sun Z, Wang W, Li X, Gong L (2018) Detection and defense of DDoS attack–based on deep learning in openflow‐based SDN. Int J Commun Syst 31(5):e3497

    Google Scholar 

  12. Li W, Meng W, Kwok LF (2016) A survey on openflow-based software defined networks: security challenges and countermeasures. J Netw Comput Appl 68(2016):126–139

    Google Scholar 

  13. Padmaja S, Vetriselvi V (2016) Mitigation of switch-DoS in software defined network. In: 2016 international conference on information communication and embedded systems (ICICES). IEEE, pp 1–5N

    Google Scholar 

  14. Polat H, Polat O (2017) The effects of DoS attacks on ODL and POX SDN controllers. In: 2017 8th international conference on information technology (ICIT). IEEE, pp 554–558

    Google Scholar 

  15. Bholebawa IZ, Dalal UD (2016) Design and performance analysis of openflow-enabled network topologies using mininet. Int J Comput Commun Eng 5(6):419

    Google Scholar 

  16. Ye J, Cheng X, Zhu J, Feng L, Song L (2018) A DDoS attack detection method based on SVM in software defined network. Secur Commun Netw 2018

    Google Scholar 

  17. Li X, Yuan D, Hu H, Ran J, Li S (2015) DDoS detection in SDN switches using support vector machine classifier. In: 2015 joint international mechanical, electronic and information technology conference (JIMET-15). Atlantis Press

    Google Scholar 

  18. Nanda S, Zafari F, DeCusatis C, Wedaa E, Yang B (2016) Predicting network attack patterns in SDN using machine learning approach. In: 2016 IEEE conference on network function virtualization and software defined networks (NFV-SDN). IEEE, pp 167–172

    Google Scholar 

  19. Hira ZM, Gillies DF (2015) A review of feature selection and feature extraction methods applied on microarray data. Adv Bioinf 2015

    Google Scholar 

  20. Venkatesh B, Anuradha J (2019) A review of feature selection and its methods. Cybern Inf Technol 19(1):3–26

    Google Scholar 

  21. Sahoo AK, Ravulakollu KK (2014) Vision based indian sign language character recognition. J Theor Appl Inf Technol 67(2):770–780

    Google Scholar 

  22. Sahoo AK, Ravulakollu KK (2014) Indian sign language recognition using skin color detection. Int J Appl Eng Res 9(20):7347–7360

    Google Scholar 

  23. Sharma M, Pal R, Sahoo AK (2014) Indian sign language recognition using neural networks and kNN classifiers. J Eng Appl Sci 9(8):1255–1259

    Google Scholar 

  24. Stamp M (2017) Introduction to machine learning with applications in information security. Chapman and Hall/CRC, Boca Raton, FL, USA

    Google Scholar 

  25. Somol P, Novovicová J, Pudil P (2010) Improving sequential feature selection methods performance by means of hybridization. In: Proceedings 6th IASTED international conference on advances in computer science and engineering, vol 2010. ACTA Press

    Google Scholar 

  26. Polat H, Polat O, Cetin A (2020) Detecting DDoS attacks in software-defined networks through feature selection methods and machine learning models. Sustainability 12(3):1035

    Google Scholar 

  27. Sengupta E, Garg D, Choudhury T, Aggarwal A (2018) Techniques to elimenate human bias in machine learning. In: Proceedings of the 2018 International conference on system modeling and advancement in research trends. SMART. https://doi.org/10.1109/SYSMART.2018.8746946

  28. Verma A, Shukla A, Choudhury T, Chauhan A (2020) Recommendation system for prediction of tumour in cells using machine learning approach. In: Communications in Computer and information science, vol 1229. CCIS. https://doi.org/10.1007/978-981-15-5827-6_18

  29. Kumari A, Choudhury T, Chitra Rajagopal P (2019) Exploring open source for machine learning problem on diabetic retinopathy. Adv Intell Syst Comput 841. https://doi.org/10.1007/978-981-13-2285-3_67

  30. Sharma S, Aggarwal A, Choudhury T (2018) Breast cancer detection using machine learning algorithms. In: Proceedings of the international conference on computational techniques, electronics and mechanical systems. CTEMS. https://doi.org/10.1109/CTEMS.2018.8769187

  31. Singh UV, Gupta E, Choudhury T (2019) Detection of rheumatoid arthritis using machine learning. In: Proceedings of 2019 international conference on computational intelligence and knowledge economy. ICCIKE. https://doi.org/10.1109/ICCIKE47802.2019.9004234

  32. Choudhury T, Dangi G, Singh TP, Chauhan A, Aggarwal A (2018) An efficient way to detect credit card fraud using machine learning methodologies. In:Proceedings of the 2nd international conference on green computing and internet of things. ICGCIoT. https://doi.org/10.1109/ICGCIoT.2018.8753077

  33. Joshi T, Badoni P, Choudhury T, Aggarwal A (2019) Modification of weiler-atherton algorithm to address loose polygons. J Sci Ind Res 78:771–774

    Google Scholar 

  34. Kumar V, Choudhury T (2019) Real-time recognition of malignant skin lesions using ensemble modeling. J Sci Ind Res (JSIR) 78:148–153

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chattopadhyay, S., Sahoo, A.K. (2021). A Proposed Approach to DDoS Attacks Detection on SDN Using Machine Learning Technique. In: Singh, J., Kumar, S., Choudhury, U. (eds) Innovations in Cyber Physical Systems. Lecture Notes in Electrical Engineering, vol 788. Springer, Singapore. https://doi.org/10.1007/978-981-16-4149-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-4149-7_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-4148-0

  • Online ISBN: 978-981-16-4149-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics