Detection of distributed denial of service attacks in software defined networks
Software Defined Network (SDN) architecture is a new and novel way of network management. In SDN, switches do not process the incoming packets. They match for the incoming packets in the forwarding tables and if there is none it will be sent to the controller for processing which is the operating sy...
Saved in:
Published in | 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI) pp. 2576 - 2581 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.09.2016
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/ICACCI.2016.7732445 |
Cover
Abstract | Software Defined Network (SDN) architecture is a new and novel way of network management. In SDN, switches do not process the incoming packets. They match for the incoming packets in the forwarding tables and if there is none it will be sent to the controller for processing which is the operating system of the SDN. A Distributed Denial of Service (DDoS) attack is a biggest threat to cyber security in SDN network. The attack will occur at the network layer or the application layer of the compromised systems that are connected to the network. In this paper we discuss the DDoS attacks from the traces of the traffic flow. We use different machine learning algorithms such as Naive Bayes, K-Nearest neighbour, K-means and K-medoids to classify the traffic as normal and abnormal. Then these algorithms are measured using parameters such as detection rate and efficiency. The algorithm having more accuracy is chosen to implement Signature IDS and results of it are then processed by Advanced IDS which detects anomalous behaviour based on open connections and provides accurate results of the hosts specifying which hosts is involved in the DDOS attack. |
---|---|
AbstractList | Software Defined Network (SDN) architecture is a new and novel way of network management. In SDN, switches do not process the incoming packets. They match for the incoming packets in the forwarding tables and if there is none it will be sent to the controller for processing which is the operating system of the SDN. A Distributed Denial of Service (DDoS) attack is a biggest threat to cyber security in SDN network. The attack will occur at the network layer or the application layer of the compromised systems that are connected to the network. In this paper we discuss the DDoS attacks from the traces of the traffic flow. We use different machine learning algorithms such as Naive Bayes, K-Nearest neighbour, K-means and K-medoids to classify the traffic as normal and abnormal. Then these algorithms are measured using parameters such as detection rate and efficiency. The algorithm having more accuracy is chosen to implement Signature IDS and results of it are then processed by Advanced IDS which detects anomalous behaviour based on open connections and provides accurate results of the hosts specifying which hosts is involved in the DDOS attack. |
Author | Shidling, Amrit Meti, Nisharani Barki, Lohit Mulla, Mohammed Moin Narayan, D. G. |
Author_xml | – sequence: 1 givenname: Lohit surname: Barki fullname: Barki, Lohit email: lohit.barki1994@gmail.com organization: B.V. Bhoomaraddi Coll. of Eng. & Technol., Hubli, India – sequence: 2 givenname: Amrit surname: Shidling fullname: Shidling, Amrit email: amritlshidling@gmail.com organization: B.V. Bhoomaraddi Coll. of Eng. & Technol., Hubli, India – sequence: 3 givenname: Nisharani surname: Meti fullname: Meti, Nisharani email: narayan_dg@bvb.edu organization: B.V. Bhoomaraddi Coll. of Eng. & Technol., Hubli, India – sequence: 4 givenname: D. G. surname: Narayan fullname: Narayan, D. G. email: nisharanimeti@gmail.com organization: B.V. Bhoomaraddi Coll. of Eng. & Technol., Hubli, India – sequence: 5 givenname: Mohammed Moin surname: Mulla fullname: Mulla, Mohammed Moin email: moinbvb@gmail.com organization: KLE Technol. Univ., Hubli, India |
BookMark | eNotj8tqQjEYhFNoF9b6BG7yAuc092OW5fQmCG7cS0z-H4KalCSt9O17pMLAwPAxzDyS-5QTELLkrOec2ef1-DKO614wbvphkEIpfUcWdlhxzSwTTFg1I9tXaOBbzIlmpCHWVuLhu0GgAVJ0p2taofxED9S15vyx0phozdgursBEYUwTnaBdcjnWJ_KA7lRhcfM52b2_7cbPbrP9mAZtumhZ68w0gavADFiF1kvudbDIUWvltfDyqnAIaBgqMAZXzgiuzGRuCMowOSfL_9oIAPuvEs-u_O5vL-UfZEdMgQ |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICACCI.2016.7732445 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781509020294 1509020292 |
EndPage | 2581 |
ExternalDocumentID | 7732445 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i90t-615014d06e94f9c31c5d9f1f554c52c32c32dbdf60f4e66f8a621468a6a7d4603 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:37:54 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-615014d06e94f9c31c5d9f1f554c52c32c32dbdf60f4e66f8a621468a6a7d4603 |
PageCount | 6 |
ParticipantIDs | ieee_primary_7732445 |
PublicationCentury | 2000 |
PublicationDate | 2016-Sept. |
PublicationDateYYYYMMDD | 2016-09-01 |
PublicationDate_xml | – month: 09 year: 2016 text: 2016-Sept. |
PublicationDecade | 2010 |
PublicationTitle | 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI) |
PublicationTitleAbbrev | ICACCI |
PublicationYear | 2016 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.8363034 |
Snippet | Software Defined Network (SDN) architecture is a new and novel way of network management. In SDN, switches do not process the incoming packets. They match for... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 2576 |
SubjectTerms | Clustering algorithms Computer architecture Computer crime DDoS IDS Machine learning algorithms SDN Servers Software Training |
Title | Detection of distributed denial of service attacks in software defined networks |
URI | https://ieeexplore.ieee.org/document/7732445 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA7bTp5UNvE3OXi0XWvTl-Yo1bEJUw8TdhtpXgJD6WTrEPzrzWurongQAg0h0JCUfK_J932PsQsPOg6MsQHKIguEUSrQGiJiAhQAClIsSOA8vYfxk7ibp_MOu_zSwlhra_KZDala3-XjymzpqGwopYd_kXZZ139mjVarNRKKIzWc5Nd5PiG2FoRtzx8pU2rEGO2y6ee7GqLIc7ititC8_7Jh_O9g9tjgW5vHH79QZ591bNlnDze2qjlVJV85jmSGS3msLHIkMt0LtW6aXYHrqiJdPV-WfOP34De9tr6X89Em8rIhhW8GbDa6neXjoE2VECxVVAXk6h4LjMAq4ZRJYpOicrHzsYJJr0xCBQt0EDlhAVymgRJ6-4eWKCBKDlivXJX2kHEptQKnjUKXeXCXRQKoFWYUJyX-Z_KI9WkuFq-NGcainYbjv5tP2A6tR0PKOmW9ar21Zx7Fq-K8Xr4PGVqfiA |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5zHvSksom_zcGj7VqbvjZHqY5Nt-lhwm4jzUtAlE62DsG_3rx2ThQPQiAhBBoSyPfSfN_3GLtwoGNBa-Nhkqee0FJ6SkFATIAcQEKMOQmchyPoPYm7STxpsMu1FsYYU5HPjE_N6i0fZ3pJv8o6SeLgX8QbbNPhvohrtdbKSigMZKefXWdZn_ha4K_G_kiaUmFGd4cNv75WU0Ve_GWZ-_rjlxHjf6ezy9rf6jz-uMadPdYwRYs93JiyYlUVfGY5kh0uZbIyyJHodK_Uu6jPBa7KkpT1_LngC3cKv6u5caOsizeRFzUtfNFm4-7tOOt5q2QJ3rMMSo983UOBARgprNRRqGOUNrQuWtDxlY6oYI4WAisMgE0VUEpvV6kEBQTRPmsWs8IcMJ4kSoJVWqJNHbwneQSoJKYUKUXuOnnIWrQW07faDmO6Woajv7vP2VZvPBxMB_3R_THbpr2pKVonrFnOl-bUYXqZn1Vb-QmjAqLV |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+International+Conference+on+Advances+in+Computing%2C+Communications+and+Informatics+%28ICACCI%29&rft.atitle=Detection+of+distributed+denial+of+service+attacks+in+software+defined+networks&rft.au=Barki%2C+Lohit&rft.au=Shidling%2C+Amrit&rft.au=Meti%2C+Nisharani&rft.au=Narayan%2C+D.+G.&rft.date=2016-09-01&rft.pub=IEEE&rft.spage=2576&rft.epage=2581&rft_id=info:doi/10.1109%2FICACCI.2016.7732445&rft.externalDocID=7732445 |