Detection of distributed denial of service attacks in software defined networks

Software Defined Network (SDN) architecture is a new and novel way of network management. In SDN, switches do not process the incoming packets. They match for the incoming packets in the forwarding tables and if there is none it will be sent to the controller for processing which is the operating sy...

Full description

Saved in:
Bibliographic Details
Published in2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI) pp. 2576 - 2581
Main Authors Barki, Lohit, Shidling, Amrit, Meti, Nisharani, Narayan, D. G., Mulla, Mohammed Moin
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.09.2016
Subjects
Online AccessGet full text
DOI10.1109/ICACCI.2016.7732445

Cover

Abstract Software Defined Network (SDN) architecture is a new and novel way of network management. In SDN, switches do not process the incoming packets. They match for the incoming packets in the forwarding tables and if there is none it will be sent to the controller for processing which is the operating system of the SDN. A Distributed Denial of Service (DDoS) attack is a biggest threat to cyber security in SDN network. The attack will occur at the network layer or the application layer of the compromised systems that are connected to the network. In this paper we discuss the DDoS attacks from the traces of the traffic flow. We use different machine learning algorithms such as Naive Bayes, K-Nearest neighbour, K-means and K-medoids to classify the traffic as normal and abnormal. Then these algorithms are measured using parameters such as detection rate and efficiency. The algorithm having more accuracy is chosen to implement Signature IDS and results of it are then processed by Advanced IDS which detects anomalous behaviour based on open connections and provides accurate results of the hosts specifying which hosts is involved in the DDOS attack.
AbstractList Software Defined Network (SDN) architecture is a new and novel way of network management. In SDN, switches do not process the incoming packets. They match for the incoming packets in the forwarding tables and if there is none it will be sent to the controller for processing which is the operating system of the SDN. A Distributed Denial of Service (DDoS) attack is a biggest threat to cyber security in SDN network. The attack will occur at the network layer or the application layer of the compromised systems that are connected to the network. In this paper we discuss the DDoS attacks from the traces of the traffic flow. We use different machine learning algorithms such as Naive Bayes, K-Nearest neighbour, K-means and K-medoids to classify the traffic as normal and abnormal. Then these algorithms are measured using parameters such as detection rate and efficiency. The algorithm having more accuracy is chosen to implement Signature IDS and results of it are then processed by Advanced IDS which detects anomalous behaviour based on open connections and provides accurate results of the hosts specifying which hosts is involved in the DDOS attack.
Author Shidling, Amrit
Meti, Nisharani
Barki, Lohit
Mulla, Mohammed Moin
Narayan, D. G.
Author_xml – sequence: 1
  givenname: Lohit
  surname: Barki
  fullname: Barki, Lohit
  email: lohit.barki1994@gmail.com
  organization: B.V. Bhoomaraddi Coll. of Eng. & Technol., Hubli, India
– sequence: 2
  givenname: Amrit
  surname: Shidling
  fullname: Shidling, Amrit
  email: amritlshidling@gmail.com
  organization: B.V. Bhoomaraddi Coll. of Eng. & Technol., Hubli, India
– sequence: 3
  givenname: Nisharani
  surname: Meti
  fullname: Meti, Nisharani
  email: narayan_dg@bvb.edu
  organization: B.V. Bhoomaraddi Coll. of Eng. & Technol., Hubli, India
– sequence: 4
  givenname: D. G.
  surname: Narayan
  fullname: Narayan, D. G.
  email: nisharanimeti@gmail.com
  organization: B.V. Bhoomaraddi Coll. of Eng. & Technol., Hubli, India
– sequence: 5
  givenname: Mohammed Moin
  surname: Mulla
  fullname: Mulla, Mohammed Moin
  email: moinbvb@gmail.com
  organization: KLE Technol. Univ., Hubli, India
BookMark eNotj8tqQjEYhFNoF9b6BG7yAuc092OW5fQmCG7cS0z-H4KalCSt9O17pMLAwPAxzDyS-5QTELLkrOec2ef1-DKO614wbvphkEIpfUcWdlhxzSwTTFg1I9tXaOBbzIlmpCHWVuLhu0GgAVJ0p2taofxED9S15vyx0phozdgursBEYUwTnaBdcjnWJ_KA7lRhcfM52b2_7cbPbrP9mAZtumhZ68w0gavADFiF1kvudbDIUWvltfDyqnAIaBgqMAZXzgiuzGRuCMowOSfL_9oIAPuvEs-u_O5vL-UfZEdMgQ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICACCI.2016.7732445
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781509020294
1509020292
EndPage 2581
ExternalDocumentID 7732445
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-615014d06e94f9c31c5d9f1f554c52c32c32dbdf60f4e66f8a621468a6a7d4603
IEDL.DBID RIE
IngestDate Thu Jun 29 18:37:54 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-615014d06e94f9c31c5d9f1f554c52c32c32dbdf60f4e66f8a621468a6a7d4603
PageCount 6
ParticipantIDs ieee_primary_7732445
PublicationCentury 2000
PublicationDate 2016-Sept.
PublicationDateYYYYMMDD 2016-09-01
PublicationDate_xml – month: 09
  year: 2016
  text: 2016-Sept.
PublicationDecade 2010
PublicationTitle 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)
PublicationTitleAbbrev ICACCI
PublicationYear 2016
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8363034
Snippet Software Defined Network (SDN) architecture is a new and novel way of network management. In SDN, switches do not process the incoming packets. They match for...
SourceID ieee
SourceType Publisher
StartPage 2576
SubjectTerms Clustering algorithms
Computer architecture
Computer crime
DDoS
IDS
Machine learning algorithms
SDN
Servers
Software
Training
Title Detection of distributed denial of service attacks in software defined networks
URI https://ieeexplore.ieee.org/document/7732445
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA7bTp5UNvE3OXi0XWvTl-Yo1bEJUw8TdhtpXgJD6WTrEPzrzWurongQAg0h0JCUfK_J932PsQsPOg6MsQHKIguEUSrQGiJiAhQAClIsSOA8vYfxk7ibp_MOu_zSwlhra_KZDala3-XjymzpqGwopYd_kXZZ139mjVarNRKKIzWc5Nd5PiG2FoRtzx8pU2rEGO2y6ee7GqLIc7ititC8_7Jh_O9g9tjgW5vHH79QZ591bNlnDze2qjlVJV85jmSGS3msLHIkMt0LtW6aXYHrqiJdPV-WfOP34De9tr6X89Em8rIhhW8GbDa6neXjoE2VECxVVAXk6h4LjMAq4ZRJYpOicrHzsYJJr0xCBQt0EDlhAVymgRJ6-4eWKCBKDlivXJX2kHEptQKnjUKXeXCXRQKoFWYUJyX-Z_KI9WkuFq-NGcainYbjv5tP2A6tR0PKOmW9ar21Zx7Fq-K8Xr4PGVqfiA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5zHvSksom_zcGj7VqbvjZHqY5Nt-lhwm4jzUtAlE62DsG_3rx2ThQPQiAhBBoSyPfSfN_3GLtwoGNBa-Nhkqee0FJ6SkFATIAcQEKMOQmchyPoPYm7STxpsMu1FsYYU5HPjE_N6i0fZ3pJv8o6SeLgX8QbbNPhvohrtdbKSigMZKefXWdZn_ha4K_G_kiaUmFGd4cNv75WU0Ve_GWZ-_rjlxHjf6ezy9rf6jz-uMadPdYwRYs93JiyYlUVfGY5kh0uZbIyyJHodK_Uu6jPBa7KkpT1_LngC3cKv6u5caOsizeRFzUtfNFm4-7tOOt5q2QJ3rMMSo983UOBARgprNRRqGOUNrQuWtDxlY6oYI4WAisMgE0VUEpvV6kEBQTRPmsWs8IcMJ4kSoJVWqJNHbwneQSoJKYUKUXuOnnIWrQW07faDmO6Woajv7vP2VZvPBxMB_3R_THbpr2pKVonrFnOl-bUYXqZn1Vb-QmjAqLV
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+International+Conference+on+Advances+in+Computing%2C+Communications+and+Informatics+%28ICACCI%29&rft.atitle=Detection+of+distributed+denial+of+service+attacks+in+software+defined+networks&rft.au=Barki%2C+Lohit&rft.au=Shidling%2C+Amrit&rft.au=Meti%2C+Nisharani&rft.au=Narayan%2C+D.+G.&rft.date=2016-09-01&rft.pub=IEEE&rft.spage=2576&rft.epage=2581&rft_id=info:doi/10.1109%2FICACCI.2016.7732445&rft.externalDocID=7732445