Skip to main content
Log in

A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Recently, SDN has arisen as a new network platform that offers unparalleled programming that enables network operators to dynamically customize and control their networks. The attackers aim to paralyse the logical plane, the brain of the network that offers several advantages, by using the SDN controller. However, the control plane is the desirable target of security attacks on the opponents because of its characteristics. One of the most common threats is the DDOS attacks to drain network capacity by sending them heavy traffic, causing network congestion. SDN is a common area of investigation for SDN defenceand DDoS threat identification and prevention in the SDN context has been introduced to many researchers since the proposed SDN attacks. Nevertheless, security risks must be adequately secured. In this paper we suggest a discrete scalable memory based support vector machine algorithm for DDoS threat and SDN mitigation architecture for attack detection. By starting the process of attack detection the input data can gets pre-processed by using Spark standardization technique in which the missing values are replaced and the unwanted data are removed. Then the feature extractions are done using semantic multilinear component analysis algorithm. The classifier is responsible for predicting target and for this a novel discrete scalable memory based support vector machine (DSM-SVM) algorithm is used which provides high accuracy of attack prediction. Followed by attack detection the mitigation process was done, here the mitigation server can identify the threat by intelligently dropping malicious bot traffic and absorbing the rest of the traffic. Here the suggested mechanism achieves attack traffic mitigation and benign traffic dropping. We have evaluated the whole process on KDD dataset. The proposed network model was trained and then used in an SDN threat detection and mitigation environment as part of the assessment process. The entire experiment is run on a VMware-based Ubuntu virtual machine. Weka will utilize our suggested classifier model for training and evaluation, while Mininet uses a RYU controller to establish an SD Network. The findings demonstrate that the mechanism presented exceeds the other algorithms examined, by expressing 99.7% accuracy especially concerning training and testing time over KDD dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Alheeti, K. M. A., Gruebler, A., & McDonald-Maier, K. (2017). Using discriminant analysis to detectintrusions in external communication for self-driving vehicles. Digital Communications and Networks, 3, 180–187.

    Article  Google Scholar 

  2. Poongodi, M., & Bose, S. (2015). Detection and prevention system towards the truth of convergence on decision using Aumann agreement theorem. Procedia Computer Science, 50, 244–251.

    Article  Google Scholar 

  3. Faisal, M., Abbas, S., & Rahman, H. U. (2018). Identity attack detection system for 802.11-based ad hoc networks. EURASIP Journal on Wireless Communications and Networking 2018: 1–16

  4. Singh, O., Singh, J., & Singh, R. (2017). An intelligent intrusion detection and prevention system for safeguard mobile adhoc networks against malicious nodes. Indian Journal of Science and Technology, 8, 1–12.

    Article  Google Scholar 

  5. Li, W., & Song, H. (2015). ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17, 960–969.

    Article  Google Scholar 

  6. Singh, N., Dumka, A., & Sharma, R. (2020). Comparative analysis of various techniques of DDoS attacks for detection & prevention and their impact in MANET. In: Performance Management of Integrated Systems and its Applications in Software Engineering, Ed: Springer, (pp. 151–162).

  7. Gurung, S., & Chauhan, S. (2019). Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET. Wireless Networks, 25, 975–988.

    Article  Google Scholar 

  8. Sengathir, J., & Manoharan, R. (2015). Exponential reliability coefficient based reputation mechanism for isolating selfish nodes in MANETs. Egyptian Informatics Journal, 16, 231–241.

    Article  Google Scholar 

  9. Buber, E., Diri, B., & Sahingoz, O. K. (2017). NLP based phishing attack detection from URLs. In: International Conference on Intelligent Systems Design and Applications, (pp. 608–618).

  10. Dhamodharan, U. S. R. K., & Vayanaperumal, R. (2015). Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. The Scientific World Journal 2015.

  11. Premkumar, M., & Sundararajan, T. V. P. (2020). DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks. Microprocessors and Microsystems 79: 103278.

  12. Van Trung, P., Huong, T. T., Van Tuyen, D., Duc, D. M., Thanh, N. H., & Marshall, A. (2015). A multi-criteria-based DDoS-attack prevention solution using software defined networking. In: 2015 international conference on advanced technologies for communications (ATC), (pp. 308–313).

  13. Bawany, N. Z., Shamsi, J. A., & Salah, K. (2017). DDoS attack detection and mitigation using SDN: Methods, practices, and solutions. Arabian Journal for Science and Engineering 42(2): 425–441.

  14. Alshamrani, A., Chowdhary, A., Pisharody, S., Lu, D., & Huang, D. (2017). A defense system for defeating DDoS attacks in SDN based networks. In: Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access, (pp. 83–92).

  15. Huang, X., Du, X., & Song, B. (2017). An effective DDoS defense scheme for SDN. In: 2017 IEEE International Conference on Communications (ICC), (pp. 1–6).

  16. Kokila, R. T., Selvi, S. T., & Govindarajan, K. (2014). DDoS detection and analysis in SDN-based environment using support vector machine classifier. In: 2014 Sixth International Conference on Advanced Computing (ICoAC), (pp. 205–210).

  17. Tuan, N. N., Hung, P. H., Nghia, N. D., Tho, N. V., Phan, T. V., & Thanh, N. H. (2020). A DDoS attack mitigation scheme in ISP networks using machine learning based on SDN. Electronics 9: 413.

  18. Harikrishna, P., & Amuthan, A. (2020). Sdn-based ddos attack mitigation scheme using convolution recursively enhanced self organizing maps. Sādhanā, 45(1): 1–12.

  19. Cheng, H., Liu, J., Xu, T., Ren, B., Mao, J., & Zhang, W. (2020). Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks. International Journal of Sensor Networks 34: 56–69.

  20. Sen, S., Gupta, K. D., & Ahsan, M. M. (2020). Leveraging machine learning approach to setup software-defined network (SDN) controller rules during DDoS attack. In: Proceedings of International Joint Conference on Computational Intelligence, (pp. 49–60).

  21. Dey, S. K., Uddin, M. R., & Rahman, M. M. (2020). Performance analysis of SDN-based intrusion detection model with feature selection approach. In: Proceedings of international joint conference on computational intelligence, (pp. 483–494).

  22. Swami, R., Dave, M., & Ranga, V. (2021). Detection and analysis of TCP-SYN DDoS attack in software-defined networking. Wireless Personal Communications 1–23.

  23. Gadze, J. D., Bamfo-Asante, A. A., Agyemang, J. O., Nunoo-Mensah, H., & Opare, K. A. B. (2021). An investigation into the application of deep learning in the detection and mitigation of DDOS attack on SDN controllers. Technologies 9: 14

  24. Hadem, P., Saikia, D. K., & Moulik, S. (2021). An SDN-based intrusion detection system using SVM with selective logging for IP traceback. Computer Networks 191: 108015.

  25. Tahmasebi, A., Salahi, A., & Pourmina, M. A. (2021). A novel feature-based DDoS detection and mitigation scheme in SDN controller using queueing theory. Wireless Personal Communications 117: 1985–2006.

  26. Valdovinos, I. A., Pérez-Díaz, J. A., Choo, K. K. R., & Botero, J. F. (2021). Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions. Journal of Network and Computer Applications 103093.

  27. Han, B., Yang, X., Sun, Z., Huang, J., & Su, J. (2018). OverWatch: A cross-plane DDoS attack defense framework with collaborative intelligence in SDN. Security and Communication Networks 2018.

  28. Deepa, V., Sudar, K. M., & Deepalakshmi, P. (2018). Detection of DDoS attack on SDN control plane using hybrid machine learning techniques. In: 2018 International Conference on Smart Systems and Inventive Technology (ICSSIT) (pp. 299–303).

  29. Phan, T. V., & Park, M. (2019). Efficient distributed denial-of-service attack defense in SDN-based cloud. IEEE Access 7: 18701–18714.

  30. Nguyen, V. G., Do, T. X., & Kim, Y. (2016). SDN and virtualization-based LTE mobile network architectures: A comprehensive survey. Wireless Personal Communications 86: 1401–1438.

  31. Abdelmoniem, A. M., & Bensaou, B. (2016). HKUST, Tech. Rep. HKUST-CS16-01, "SDN-based incast congestion control framework for data centers: Implementation and evaluation. CSE Dept, HKUST, Tech. Rep. HKUST-CS16-01.

  32. Makuvaza, A., Jat, D. S., & Gamundani, A. M. (2021). Deep neural network (DNN) solution for real-time detection of distributed denial of service (DDoS) attacks in software defined networks (SDNs). SN Computer Science, 2: 1–10.

  33. Pérez-Díaz, J. A., Valdovinos, I. A., Choo, K. K. R., & Zhu, D. (2020). A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning. IEEE Access 8: 155859–155872.

  34. Velliangiri, S., Karthikeyan, P., & Vinoth Kumar, V. (2020). Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks. Journal of Experimental & Theoretical Artificial Intelligence 1–20.

  35. Ujjan, R. M. A., Pervez, Z., Dahal, K., Bashir, A. K., Mumtaz, R., & González, J. (2020). Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN. Future Generation Computer Systems 111: 763–779.

  36. Roopa Devi, E. M., & Suganthe, R. C. (2020). Enhanced transductive support vector machine classification with grey wolf optimizer cuckoo search optimization for intrusion detection system. Concurrency and Computation: Practice and Experience 32: e4999.

  37. Rahman, O., Quraishi, M. A. G., & Lung, C. H. (2019). DDoS attacks detection and mitigation in SDN using machine learning. In: IEEE World Congress on Services (SERVICES) (pp. 184–189).

  38. Alhisnawi, M., & Ahmadi, M. (2020). Detecting and mitigating DDoS attack in named data networking. Journal of Network and Systems Management, 28, 1343–1365.

    Article  Google Scholar 

  39. Wang, K., Zhou, H., Qin, Y., Chen, J., & Zhang, H. (2013). Decoupling malicious interests from pending interest table to mitigate interest flooding attacks. In: IEEE Globecom Workshops (GC Wkshps) (pp. 963–968).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Revathi.

Ethics declarations

Conflict of interest

We authors not having any conflict of interest among ourselves to submit and publish our articles in Wireless Personal Communications journal.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Revathi, M., Ramalingam, V.V. & Amutha, B. A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework. Wireless Pers Commun 127, 2417–2441 (2022). https://doi.org/10.1007/s11277-021-09071-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-09071-1

Keywords

Navigation