Open Access Open Access  Restricted Access Subscription Access

Improving Performance and Efficiency of Software Defined Networking by Identifying Malicious Switches through Deep Learning Model


Affiliations
1 Department of Computer Science and Engineering, Annamalai University, Chidambaram, Tamil Nadu, India
2 Department of Computer Science and Engineering, King Khalid University, Abha, Saudi Arabia
 

In recent times, Software Defined Networking (SDN) has developed widely to provide capable solutions for future internet services. As with the solutions, SDN brings us a hazardous rise in malicious threats. We investigated a sort of Distributed Denial of Services (DDoS) assault known as an internet services attack, which evaluates the influence of both traffic flow and throughput depletions in order to characterize the abnormalities. This sort of attack has a significant impact on the whole SDN. This paper introduces a deep learning method to improve the performance efficiency of the SDN by classifying the network switch into either a trusted switch or a malicious switch device. In this research, an attack detection methodology for Internet services utilizing Software Defined Networking (SDN) is proposed. The SDN controller may evaluate traffic flow, detect anomalies, and restrict both incoming and outgoing traffic as well as source nodes. The SDN considers a Convolutional Neural Network (CNN) based attack detection system that can identify malicious node. Kaggle datasets are used to test and train CNN and the features such as packet duration, packet count, byte count, accuracy for identifying the flow of trusted and malicious switches. According to the results, the CNN-based attack detection system can identify the attack with an accuracy of 89 percent. The comparison evaluation with the already proposed LeNet CNN of the feature classification proves that the flow is the trusted one and with the constant throughput with the help of the deep learning model.

Keywords

Software Defined Networking (SDN), Kaggle Dataset, Convolutional Neural Networks (CNN), Keras, Internet Service Attack, Malicious Switches, Malicious Node, Distributed Denial of Services.
User
Notifications
Font Size

  • Oliveira, T.F.; Xavier-de-Souza, S.; Silveira, L.F. Improving Energy Efficiency on SDN Control-Plane Using Multi-Core Controllers. Energies, 14, 3161, 2021.
  • Mohsin Masood, Mohamed Mostafa Fouad, Saleh Seyedzadeh and Ivan Glesk, “Energy Efficient Software Defined Networking Algorithm for Wireless Sensor Networks”, 13th International Scientific Conference on Sustainable, Modern and Safe Transport, 2019.
  • Madhukrishna Priyadarsini, Padmalochan Bera, and Mohammad Ashiqur Rahman, “A New Approach for Energy Efficiency in Software Defined Network”, Fifth International Conference on Software Defined Systems (SDS), 2018.
  • Thangaraj Ethilu, Abirami Sathappan, Paul Rodrigues, "Modified Deep Learning Methodology Based Malicious Intrusion Detection System in Software Defined Networking", International Journal of Computer Networks and Applications (IJCNA), 8(4), PP: 381-389, 2021, DOI: 10.22247/ijcna/2021/209704.
  • Danda B. Rawat and Swetha R. Reddy, Software Defined Networking Architecture, Security and Energy Efficiency: A Survey,IEEE communication surveys and tutorials,2019.
  • W. Meng, W. Li, Y. Xiang and K.-K.R. Choo. A Bayesian Inferencebased Detection Mechanism to Defend Medical Smartphone Networks Against Insider Attacks. Journal of Network and Computer Applications, vol. 78, pp. 162-169, Elsevier, 2017.
  • Rinki Gupta, Sreeraman Rajan, “Comparative Analysis of Convolution Neural Network Models for Continuous Indian Sign Language Classification”, Procedia Computer Science 171 (2020) 1542–1550.
  • P. -W. Chi, M. -H. Wang and Y. Zheng, "SandboxNet: An Online Malicious SDN Application Detection Framework for SDN Networking," 2020 International Computer Symposium (ICS), 2020, pp. 397-402.
  • Sebbar, A., ZKIK, K., Baddi, Y. MitM detection and defense mechanism CBNA-RF based on machine learning for large-scale SDN context. J Ambient Intell Human Comput 11, 5875–5894 (2020).
  • Nife, F.N., Kotulski, Z. Application-Aware Firewall Mechanism for Software Defined Networks. J Netw Syst Manage 28, 605–626 (2020).
  • Neu C. V., Tatsch C. G., Lunardi R. C., Michelin R. A., Orozco A. M. S.,and Zorzo A. F.: Lightweight IPS for port scan in OpenFlow SDN networks. In NOMS 2018 IEEE/IFIP Network Operations and Manag. Symposium, Taipei, Taiwan, pp. 1–6, (2018).
  • H. Naeem, B. Guo, and M. R. Naeem, ‘‘A light-weight malware static visual analysis for IoT infrastructure,’’ in Proc. Int. Conf. Artif. Intell. Big Data (ICAIBD), May 2018, pp. 240–244.
  • H. Zhang, X. Xiao, F. Mercaldo, S. Ni, F. Martinelli, and A. K. Sangaiah, ‘‘Classification of ransomware families with machine learning based on N-Gram of opcodes,’’ Future Gener. Comput. Syst., vol. 90, pp. 211–221, Jan. 2019.
  • A. Khalilian, A. Nourazar, M. Vahidi-Asl, and H. Haghighi, ‘‘G3MD: Mining frequent opcode sub-graphs for metamorphic malware detection of existing families,’’ Expert Syst. Appl., vol. 112, pp. 15–33, Dec. 2018.
  • Y.-S. Liu, Y.-K. Lai, Z.-H. Wang, and H.-B. Yan, ‘‘A new learning approach to malware classification using discriminative feature extraction,’’ IEEE Access, vol. 7, pp. 13015–13023, 2019.
  • Chang Y., and Lin T.: Cloud-clustered firewall with distributed SDN devices. In: 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, pp. 1–5. (2018).
  • J. Yan, Y. Qi, and Q. Rao, ‘‘Detecting malware with an ensemble method based on deep neural network,’’ Secur. Commun. Netw., vol. 2018, pp. 1–16, Mar. 2018.
  • D. Gibert, C. Mateu, J. Planes, and R. Vicens, ‘‘Classification of malware by using structural entropy on convolutional neural networks,’’ in Proc. 32nd AAAI Conf. Artif. Intell., (AAAI), 30th Innov. Appl. Artif. Intell. (IAAI), 8th AAAI Symp. Educ. Adv. Artif. Intell. (EAAI), New Orleans, LA, USA, 2018, pp. 7759–7764.
  • Z. Ma, L. Liu, W. Meng. Towards Multiple-Mix-Attack Detection via Consensus-based Trust Management in IoT Networks. Computers & Security, In press (2020).
  • Y. Meng. The practice on using machine learning for network anomaly intrusion detection. The 2011 International Conference on Machine Learning and Cybernetics (ICMLC 2011), IEEE, pp. 576-581, 2011.
  • Andrzej Kamisiński, Carol Fung,” FlowMon: Detecting Malicious Switches in Software-Defined Networks”, ACM CCS workshop on Automated Decision Making for Active Cyber Defense ,2015.
  • Lis, A.; Sudolska, A.; Pietryka, I.; Kozakiewicz, A. Cloud Computing and Energy Efficiency: Mapping the Thematic Structure of Research. Energies 2020, 13, 4117.
  • Aujla, G.S.; Kumar, N.; Zomaya, A.Y.; Ranjan, R. Optimal Decision Making for Big Data Processing at Edge-Cloud Environment: An SDN Perspective. IEEE Trans. Ind. Inform. 2018, 14, 778–789.
  • Xu, G.; Dai, B.; Huang, B.; Yang, J.; Wen, S. Bandwidth-aware energy efficient flow scheduling with SDN in data center networks. Future Gener. Comput. Syst. 2017, 68, 163–174.
  • Fernández-Fernández, A.; Cervelló-Pastor, C.; Ochoa-Aday, L. Energy Efficiency and Network Performance: A Reality Check in SDN-Based 5G Systems. Energies 2017.
  • Son, J.; Dastjerdi, A.V.; Calheiros, R.N.; Buyya, R. SLA-Aware and Energy-Efficient Dynamic Overbooking in SDN-Based Cloud Data Centers. IEEE Trans. Sustain. Comput. 2017, 2, 76–89.

Abstract Views: 492

PDF Views: 5




  • Improving Performance and Efficiency of Software Defined Networking by Identifying Malicious Switches through Deep Learning Model

Abstract Views: 492  |  PDF Views: 5

Authors

Thangaraj Ethilu
Department of Computer Science and Engineering, Annamalai University, Chidambaram, Tamil Nadu, India
Abirami Sathappan
Department of Computer Science and Engineering, Annamalai University, Chidambaram, Tamil Nadu, India
Paul Rodrigues
Department of Computer Science and Engineering, King Khalid University, Abha, Saudi Arabia

Abstract


In recent times, Software Defined Networking (SDN) has developed widely to provide capable solutions for future internet services. As with the solutions, SDN brings us a hazardous rise in malicious threats. We investigated a sort of Distributed Denial of Services (DDoS) assault known as an internet services attack, which evaluates the influence of both traffic flow and throughput depletions in order to characterize the abnormalities. This sort of attack has a significant impact on the whole SDN. This paper introduces a deep learning method to improve the performance efficiency of the SDN by classifying the network switch into either a trusted switch or a malicious switch device. In this research, an attack detection methodology for Internet services utilizing Software Defined Networking (SDN) is proposed. The SDN controller may evaluate traffic flow, detect anomalies, and restrict both incoming and outgoing traffic as well as source nodes. The SDN considers a Convolutional Neural Network (CNN) based attack detection system that can identify malicious node. Kaggle datasets are used to test and train CNN and the features such as packet duration, packet count, byte count, accuracy for identifying the flow of trusted and malicious switches. According to the results, the CNN-based attack detection system can identify the attack with an accuracy of 89 percent. The comparison evaluation with the already proposed LeNet CNN of the feature classification proves that the flow is the trusted one and with the constant throughput with the help of the deep learning model.

Keywords


Software Defined Networking (SDN), Kaggle Dataset, Convolutional Neural Networks (CNN), Keras, Internet Service Attack, Malicious Switches, Malicious Node, Distributed Denial of Services.

References





DOI: https://doi.org/10.22247/ijcna%2F2022%2F211627