Detection of DDoS Attack in Software-Defined Networking Environment and Its Protocol-wise Analysis using Machine Learning

Authors

  • Ashwani Prasad School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu 600127, India https://orcid.org/0000-0002-7031-4190
  • Sanjana Prasad School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu 600127, India https://orcid.org/0000-0002-3602-4990
  • Karmel Arockiasamy School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu 600127, India https://orcid.org/0000-0003-2706-2239
  • Karthika P School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu 600127, India https://orcid.org/0000-0002-8319-9371
  • Xiaohui Yuan Associate Professor, Department of Computer Science and Engineering University of North Texas, Denton, TX 76203

Keywords:

DDoS detection, TCP SYN attack, ICMP attack, UDP flood attack, Software-Defined Networking, Machine Learning

Abstract

Distributed-denial-of-service (DDoS) attacks can cause a great menace to numerous organizations and their stakeholders. On a successful launch of such attacks, the intended users of the network become deprived of its services, which eventually causes a loss of time and money. Not just the traditional networks were victims of DDoS attacks, even the modern networks based on software-defined networking (SDN) technology are susceptible to them. The objective of this research work is to take into account a DDoS afflicted SDN specific dataset and detect the malicious traffic by using various machine learning algorithms namely., K-Nearest Neighbours, Logistic Regression, Multilayer Perceptron, Iterative Dichotomiser 3, and Stochastic Gradient Descent. Additionally, the categories of malicious traffic based on the protocol as ICMP attack, TCP SYN attack and UDP flood attack are analyzed and compared. The experiment results suggested that some algorithms were able to detect malicious traffic with accuracies up to 99.993%. The models used in this paper are further evaluated and validated with Area Under the Curve of Receiver Operator Characteristic (AUC-ROC) curves. Therefore, through the methodologies presented in this paper, the most suitable techniques for DDoS detection are suggested and thus contribute towards the DDoS mitigation in network management of SDN environments.

Downloads

Download data is not yet available.

References

Wankhede, S., & Kshirsagar, D. (2018). DoS Attack Detection Using Machine Learning and Neural Network. 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA).

Lee, K., Kim, J., Kwon, K. H., Han, Y., & Kim, S. (2008). DDoS attack detection method using cluster analysis. Expert Systems with Applications, 34(3), 1659–1665. doi:10.1016/j.eswa.2007.01.040

Tan Z, Jamdagni A, He X, Nanda P, Liu RP, Hu J (2014) Detection of denial-of-service attacks based on computer vision techniques. IEEE Trans Comput 64(9):2519–2533

Garg, D. K. . (2022). Understanding the Purpose of Object Detection, Models to Detect Objects, Application Use and Benefits. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(2), 01–04. https://doi.org/10.17762/ijfrcsce.v8i2.2066

Saied A, Overill RE, Radzik T (2016) Detection of known and unknown DDoS attacks using artificial neural networks. Neurocomputing 172:385–393

Yan Q, Gong Q, Deng F-A (2016) Detection of DDoS attacks against wireless SDN controllers based on the fuzzy synthetic evaluation decision-making model. Adhoc Sens Wirel Netw 33

Patil, V. N., & Ingle, D. R. (2022). A Novel Approach for ABO Blood Group Prediction using Fingerprint through Optimized Convolutional Neural Network. International Journal of Intelligent Systems and Applications in Engineering, 10(1), 60–68. https://doi.org/10.18201/ijisae.2022.268

Cui Y, Yan L, Li S, Xing H, Pan W, Zhu J, Zheng X (2016) SD-Anti-DDoS: fast and efficient DDoS defense in software-defined networks. J Netw Comput Appl 68:65–79

Fallahi N, Sami A, Tajbakhsh M (2016) Automated fow-based rule generation for network intrusion detection systems. In: 24th Iranian Conference on Electrical Engineering (ICEE). IEEE, pp 1948–1953

Garg, D. K. . (2022). Understanding the Purpose of Object Detection, Models to Detect Objects, Application Use and Benefits. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(2), 01–04. https://doi.org/10.17762/ijfrcsce.v8i2.2066

Wang M, Lu Y, Qin J (2020) A dynamic MLP-based DDoS attack detection method using feature selection and feedback. Comput Secur 88:101645

Liang X, Znati T (2019) On the performance of intelligent techniques for intensive and stealthy DDoS detection. Comput Netw 164:106906

Garg, D. K. . (2022). Understanding the Purpose of Object Detection, Models to Detect Objects, Application Use and Benefits. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(2), 01–04. https://doi.org/10.17762/ijfrcsce.v8i2.2066

Criscuolo, P. J. (2000). Distributed denial of service Trin00, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht CIAC-2319. Department of Energy Computer Incident Advisory (CIAC), UCRLID-136939, Rev. 1, Lawrence Livermore National Laboratory

Haghaghi A, Kaafar MA, Buyya R, Jha S (2020) Software-defined network (SDN) data plane security: issues, solutions, and future directions. In: Handbook of Computer Networks and Cyber Security. Springer, pp 341–387

RZhong and G. Yue, “DDOS detection system based on data mining,” in Proceedings of the 2nd International Symposium on Networking and Network Security, Jinggangshan, China, 2010, pp. 2–4

Garg, D. K. . (2022). Understanding the Purpose of Object Detection, Models to Detect Objects, Application Use and Benefits. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(2), 01–04. https://doi.org/10.17762/ijfrcsce.v8i2.2066

YC. Wu, H.-R. Tseng, W. Yang, and R.-H. Jan, “DDOS detection and traceback with decision tree and grey relational analysis,” International Journal of Ad Hoc and Ubiquitous Computing, vol. 7, no. 2, pp. 121– 136, 2011

JH. Chen, M. Zhong, F.-J. Chen, and A.-D. Zhang, “DDOS defense system with turing test and neural network,” in IEEE International Conference on Granular Computing (GrC). IEEE, 2012, pp. 38–43.

H. Li and D. Liu, “Research on intelligent intrusion prevention system based on snort,” in International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE), vol. 1. IEEE, 2010, pp. 251–253

Ahuja, Nisha; Singal, Gaurav; Mukhopadhyay, Debajyoti (2020), “DDOS attack SDN Dataset”, Mendeley Data, V1, doi: 10.17632/jxpfjc64kr.1.

Liu, Z., Hu, C., & Shan, C. (2021). Riemannian manifold on stream data: Fourier transform and entropy-based DDoS attacks detection method. Computers & Security, 109, 102392. https://doi.org/10.1016/J.COSE.2021.102392

Ahuja, Nisha; Singal, Gaurav; Mukhopadhyay, Debajyoti (2020), “DDOS attack SDN Dataset”, Mendeley Data, V1, doi: 10.17632/jxpfjc64kr.1

Garg, D. K. . (2022). Understanding the Purpose of Object Detection, Models to Detect Objects, Application Use and Benefits. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(2), 01–04. https://doi.org/10.17762/ijfrcsce.v8i2.2066

C. Liu, Z., Hu, C., & Shan, C. (2021). Riemannian manifold on stream data: Fourier transform and entropy-based DDoS attacks detection method. Computers & Security, 109, 102392. https://doi.org/10.1016/J.COSE.2021.102392

The Architecture of the Proposed Method

Downloads

Published

01.10.2022

How to Cite

Prasad, A. ., Prasad, S. ., Arockiasamy, K. ., P, K. ., & Yuan, X. . (2022). Detection of DDoS Attack in Software-Defined Networking Environment and Its Protocol-wise Analysis using Machine Learning. International Journal of Intelligent Systems and Applications in Engineering, 10(3), 147–153. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2150

Issue

Section

Research Article