Performance Evaluation and Validation of Intelligent Security Mechanism in Software Defined Network

Main Article Content

Shailesh Bendale
Brijendra Gupta

Abstract

Network attacks are discovered using intrusion detection systems (IDS), one of the most crucial security solutions. Machine learning techniques-based intrusion detection approaches have been rapidly created as a result of the widespread use of standard machine learning algorithms in the security field. Unfortunately, as technology has advanced and there have been faults in the machine learning-based intrusion detection system, the system has consistently failed to fulfill the standards for cyber security. Generative adversarial networks (GANs) have drawn a lot of interest recently and have been utilized widely in anomaly detection due to their enormous capacity for learning difficult high-dimensional real time data distribution. Traditional machine learning algorithms for intrusion detection have a number of drawbacks that deep learning techniques can significantly mitigate. With the help of a real time dataset, this work suggests employing GANs and its variants to detect network intrusions in SDN. The feasibility and comparison results are also presented. For different kinds of datasets, the BiGAN outcomes outperform the GAN.

Article Details

How to Cite
Bendale, S. ., & Gupta, B. . (2023). Performance Evaluation and Validation of Intelligent Security Mechanism in Software Defined Network. International Journal on Recent and Innovation Trends in Computing and Communication, 11(7s), 359–367. https://doi.org/10.17762/ijritcc.v11i7s.7011
Section
Articles

References

Wenfeng Xia, Yonggang Wen, Chuan Heng Foh, Dusit Niyato, and Haiyong Xie, “A Survey on Software-Defined Networking”, IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. 17, NO. 1, FIRST QUARTER 2015.

R. Braga, E. Mota, and A. Passito, “Lightweight DDoS flooding attack detection using NOX/OpenFlow,” in Proc. IEEE LCN’10, Denver, CO, USA, Oct. 2010, pp. 408–415.

L. Grimaudo, M. Mellia, E. Baralis, and R. Keralapura,``Self-learning classifier for Internet traffic,'' in Proc. IEEE INFOCOM, Apr. 2013, pp. 3381_3386.

Prof. Vaishali Sarangpure. (2018). Hybrid Hand-off Scheme for Performance Improvisation of Wireless Networks. International Journal of New Practices in Management and Engineering, 7(03), 08 - 14. https://doi.org/10.17762/ijnpme.v7i03.67

Y. Hong, C. Huang, B. Nandy, and N. Seddigh,``Iterative-tuning support vector machine for network traffic classification,'' in Proc. IFIP/IEEE IM, May 2015, pp. 458_466.

A. S. da Silva, J. A. Wickboldt, L. Z. Granville, and A. Schaeffer-Filho, “ATLANTIC: A framework for anomaly traffic detection, classification, and mitigation in SDN,” in Proc. IEEE NOMS’16, Istanbul, Turkey, April. 2016, pp. 27–35.

M. Nobakht, V. Sivaraman, and R. Boreli, “A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow,” in Proc. IEEE ARES’16, Salzburg, Austria, Aug. 2016, pp. 147–156.

L. Barki, A. Shidling, N. Meti, D. G. Narayan, and M. M. Mulla, “Detection of distributed denial of service attacks in software defined networks,” in Proc. IEEE ICACCI’16, Jaipur, India, Sept. 2016, pp. 2576–2581.

T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, ``Deep learning approach for network intrusion detection in software defined networking,'' in Proc. IEEE WINCOM, Oct. 2016, pp. 258_263.

S. Nanda, F. Zafari, C. DeCusatis, E. Wedaa, and B. Yang, ``Predicting network attack patterns in SDN using machine learning approach,'' in Proc. IEEE NFV-SDN, Nov. 2016, pp. 167_172.

P. Wang, K. M. Chao, H. C. Lin, W. H. Lin, and C. C. Lo, “An efficient flow control approach for SDN-based network threat detection and migration using support vector machine,” in Proc. IEEE ICEBE’16, Macau, China, Nov. 2016, pp. 56–63.

T. Hurley, J. E. Perdomo, and A. Perez-Pons, “HMM-based intrusion detection system for software defined networking,” in Proc. IEEE ICMLA’16, Anaheim, CA, USA, Dec. 2016, pp. 617–621.

C. Song, Y. Park, K. Golani, Y. Kim, K. Bhatt, and K. Goswami, ``Machine-learning based threat-aware system in software defined networks,' in Proc. IEEE ICCCN, Jul./Aug. 2017, pp. 1_9.

I. Alawe, A. Ksentini, Y. Hadjadj-Aoul, and P. Bertin, ``Improving traffic forecasting for 5G core network scalability: A machine learning approach,'' IEEE/ACM Trans. Netw., vol. 32, no. 6, pp. 42_49, Nov./Dec. 2018.

J. Xu, J. Wang, Q. Qi, H. Sun, and B. He,``Deep neural networks for application awareness in SDN-based network,'' in Proc. IEEE MLSP, Sep. 2018, pp. 1_6.

T. Tang, S. A. R. Zaidi, D. McLernon, L. Mhamdi, and M. Ghogho, “Deep recurrent neural network for intrusion detection in SDN-based networks,” in Proc. IEEE NetSoft’18, Montreal, Canada, 2018.

N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, “A deep learning approach to network intrusion detection,” IEEE Trans. Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 41–50, Feb 2018.

AlEroud A., Karabatis G. (2020) SDN-GAN: Generative Adversarial Deep NNs for Synthesizing Cyber Attacks on Software Defined Networks. In: Debruyne C. et al. (eds) On the Move to Meaningful Internet Systems: OTM 2019 Workshops. OTM 2019. Lecture Notes in Computer Science, vol 11878.

I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, “Generative adversarial nets,” in Advances in Neural Information Processing Systems, 2014, pp. 2672– 2680.

Shailesh Pramod Bendale, Jayashree Rajesh Prasad, Rajesh Shardanand Prasad, Chapter 27 - State of the art for edge security in software-defined networks, Editor(s): Rajiv Pandey, Sunil Kumar Khatri, Neeraj kumar Singh, Parul Verma, Artificial Intelligence and Machine Learning for EDGE Computing, Academic Press, 2022, Pages 411-424, ISBN 9780128240540, https://doi.org/10.1016/B978-0-12-824054-0.00010-1.

S. P. Bendale and J. Rajesh Prasad, "Security Threats and Challenges in Future Mobile Wireless Networks," 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN), Lonavala, India, 2018, pp. 146-150, doi: 10.1109/GCWCN.2018.8668635.

S. P. Bendale and G. V. Chowdhary, "Stable path selection and safe backup routing for Optical Border Gateway Protocol (OBGP) and Extended Optical Border Gateway Protocol (OBGP+)," 2012 International Conference on Communication, Information & Computing Technology (ICCICT), Mumbai, 2012, pp. 1-6, doi: 10.1109/ICCICT.2012.6398201.

Bendale, Shailesh and Prasad, Jayashree Rajesh, Preliminary Study of Software Defined Network on COVID-19 Pandemic Use Cases (May 28, 2020). Available at SSRN: https://ssrn.com/abstract=3612815 or http://dx.doi.org/10.2139/ssrn.3612815

Shailesh Pramod Bendale, Jayashree Rajesh Prasad, “Security Challenges to provide Intelligence in SDN with the help of Machine Learning or Deep Learning”, IJAST, vol. 29, no. 05, pp. 356 - 363, Apr. 2020.

Smith, J., Ivanov, G., Petrovi?, M., Silva, J., & García, A. Detecting Fake News: A Machine Learning Approach. Kuwait Journal of Machine Learning, 1(3). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/142

M. A. R. S. Mr. Shailesh P. Bendale, “Implications and Application of Artificial Intelligence and Machine Learning Concepts on Software Defined Network and Its Future Prospects.”, IJAST, vol. 29, no. 4s, pp. 1142 - 1152, Mar. 2020.

S. Shah and S. Pramod Bendale, "An Intuitive Study: Intrusion Detection Systems and Anomalies, How AI can be used as a tool to enable the majority, in 5G era," 2019 5th International Conference On Computing, Communication, Control And Automation (ICCUBEA), Pune, India, 2019, pp. 1-8, doi: 10.1109/ICCUBEA47591.2019.9128786.

Prasad, J.R., Bendale, S.P., Prasad, R.S. (2021). Semantic Internet of Things (IoT) Interoperability Using Software Defined Network (SDN) and Network Function Virtualization (NFV). In: Pandey, R., Paprzycki, M., Srivastava, N., Bhalla, S., Wasielewska-Michniewska, K. (eds) Semantic IoT: Theory and Applications. Studies in Computational Intelligence, vol 941. Springer, Cham. https://doi.org/10.1007/978-3-030-64619-6_18

Tamboli, D. N., & Bendale, S. P. (2022). Crowdfunded Assassinations and Propaganda by Dark Web Cyber Criminals. In R. Rawat, S. Telang, P. William, U. Kaur, & O. C.U. (Ed.), Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence (pp. 74-84). IGI Global. https://doi.org/10.4018/978-1-6684-3942- 5.ch006

Gawali, N. N., & Bendale, S. (2022). Artifical Intelligence and Machine Learning Algorithms in Dark Web Crime Recognition. In R. Rawat, U. Kaur, S. Khan, R. Sikarwar, & K. Sankaran (Ed.), Using Computational Intelligence for the Dark Web and Illicit Behavior Detection (pp. 126-149). IGI Global. https://doi.org/10.4018/978-1- 6684-6444-1.ch007