Perceptron Based Deep Learning Technique to Enhance Quality of Service (QoS) and Security in Software Defined Network
Keywords:
Deep learning, Congestion detection, avoidance, Software-Defined Network (SDN), Quality of Service, DDoS attack, Multilayer Perceptron (MLP)Abstract
As network technology are always being improved, the Internet economy is quickly growing. Consequently, it is critical to pay attention to the reliability and safety of the network services offered by the ISP. A unified monitoring and control mechanism is available with state-of-the-art technologies such as Software-defined Network (SDN), however the SDN controller receives too much data to handle network traffic maintenance independently. Through the use of software-defined networking (SDN), networks are able to continuously monitor traffic, detect threats, adjust security policies, and include security services. Threats like man-in-the-middle attacks, DoS attacks, and saturation attacks are brought about by the SDN. So, the centralised controller can employ modern methods, like AI, to govern the flow of data across the network. Managing network congestion and detecting distributed denial-of-service (DDoS) assaults are the main concerns of this article. This study uses the Multilayer Perceptron (MLP) to detect DDoS attacks and connection congestion through packet loss using data acquired from the Open Flow Switch Table. Simulation results show that the proposed methodology out performs the status quo in terms of network performance.
Downloads
References
W. Xia, Y. Wen, C. H. Foh, D. Niyato and H. Xie, "A Survey on Software-Defined Networking," in IEEE Communications Surveys & Tutorials, vol. 17, no. 1, pp. 27-51, Firstquarter 2015, doi: 10.1109/COMST.2014.2330903.
F. Hu, Q. Hao and K. Bao, "A Survey on Software- Defined Network and OpenFlow: From Concept to Implementation," in IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 2181-2206, Fourthquarter 2014, doi: 10.1109/COMST.2014.2326417.
A. Abubakar and B. Pranggono, "Machine learning based intrusion detection system for software defined networks," 2017 Seventh International Conference on Emerging Security Technologies (EST), 2017, pp. 138- 143, doi: 10.1109/EST.2017.8090413.
M. S. Elsayed, N. -A. Le-Khac, S. Dev and A. D. Jurcut, "DDoSNet: A Deep-Learning Model for Detecting Network Attacks," 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM), 2020, pp. 391- 396, doi: 10.1109/WoWMoM49955.2020.00072.
Mahesh Kumar N and Siddesh G.K, "Comprehensive Survey On Network And Cross Layers Of Cognitive Radio Networks," International Journal of Scientific & Technology Research, vol. 8, no. 9, pp. 230-235, September 2020.
J. Ye, X. Cheng, J. Zhu, L. Feng, and L. Song, “A DDoS attack detection method based on SVM in software defined network,” Secur. Commun. Netw., vol. 2018, pp. 1–8, 2018, doi: 10.1155/2018/9804061
N. Ahuja, G. Singal and D. Mukhopadhyay, "DLSDN: Deep Learning for DDOS attack detection in Software Defined Networking," 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence), 2021, pp. 683-688, doi: 10.1109/Confluence51648.2021.9376879.
S. M. Mousavi and M. St-Hilaire, “Early detection of DDoS attacks against SDN controllers,” in Proceedings of the 2015 International Conference on Computing, Networking and Communications, ICNC 2015, pp. 77– 81, Garden Grove, Calif, USA, February 2015.
Iwata K, Ito Y. Proposal of Multi-Pathization Method of UDP with SDN for NFS[C]//2018 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2018: 1-5.
J. Wu, Y. Peng, M. Song, M. Cui and L. Zhang, "Link Congestion Prediction using Machine Learning for Software-Defined-Network Data Plane," 2019 International Conference on Computer, Information and Telecommunication Systems (CITS), 2019, pp. 1-5, doi: 10.1109/CITS.2019.8862098.
Khan, S.; Bagiwa, M.A.; Wahab, A.W.A.; Gani, A.; Abdelaziz, A. Understanding link fabrication attack in software defined network using formal methods. In Proceedings of the IEEE International Conference on Informatics, IoT, and Enabling Technologies, Doha, Qatar, 2–5 February 2020; pp. 555–562.
B. S. Kiruthika Devi, G. Preetha, G. Selvaram and S. Mercy Shalinie, "An impact analysis: Real time DDoS attack detection and mitigation using machine learning," 2014 International Conference on Recent Trends in Information Technology, 2014, pp. 1-7, doi: 10.1109/ICRTIT.2014.6996133.
Yang Y., Wang J., Zhai B., Liu J. (2019) IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDN. In: Vaidya J., Zhang X., Li J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science, vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_1.
F. Naeem, G. Srivastava and M. Tariq, "A Software Defined Network Based Fuzzy Normalized Neural Adaptive Multipath Congestion Control for the Internet of Things," in IEEE Transactions on Network Science and Engineering, vol. 7, no. 4, pp. 2155-2164, 1 Oct.- Dec. 2020, doi: 10.1109/TNSE.2020.2991106.
T. Zhang and S. Mao, "Machine Learning for End-to- End Congestion Control," in IEEE Communications Magazine, vol. 58, no. 6, pp. 52-57, June 2020, doi: 10.1109/MCOM.001.1900509.
M. Gholami and B. Akbari, "Congestion control in software defined data center networks through flow rerouting," 2015 23rd Iranian Conference on Electrical Engineering, 2015, pp. 654-657, doi: 10.1109/IranianCEE.2015.7146295.
Yifei Lu and Shuhong Zhu, "SDN-based TCP congestion control in data center networks," 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), 2015, pp. 1-7, doi: 10.1109/PCCC.2015.7410275.
T. Hu, P. Yi, J. Zhang and J. Lan, "Reliable and load balance-aware multi-controller deployment in SDN," in China Communications, vol. 15, no. 11, pp. 184-198, Nov. 2018, doi: 10.1109/CC.2018.8543099.
A. M. Al-Sadi, A. Al-Sherbaz, J. Xue and S. Turner, "Routing algorithm optimization for software defined network WAN," 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC- MITCSA), 2016, pp. 1-6, doi: 10.1109/AIC- MITCSA.2016.7759945.
P. Dong, X. Du, H. Zhang and T. Xu, "A detection method for a novel DDoS attack against SDN controllers by vast new low-traffic flows," 2016 IEEE International Conference on Communications (ICC), 2016, pp. 1-6, doi: 10.1109/ICC.2016.7510992.
R. Kandoi and M. Antikainen, "Denial-of-service attacks in OpenFlow SDN networks," 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015, pp. 1322-1326, doi: 10.1109/INM.2015.7140489.
T. G. Gebremeskel, K. A. Gemeda, T. G. Krishna, and P. J. Ramulu, “DDoS Attack Detection and Classification Using Hybrid Model for Multicontroller SDN,” Wireless Communications and Mobile Computing, vol. 2023, p. e9965945,Jun. 2023, doi: https://doi.org/10.1155/2023/9965945.
Mahesh Kumar N, Ane Ashok Babu, Sathish Shet, Nithya Selvaraj, Jamal Kovelakuntla, “Mitigation of spectrum sensing data falsification attack using multilayer perception in cognitive radio networks”, Acta IMEKO, ISSN: 2221-870X, vol.11, no.1, pp. 1-7, 2022. DOI: http://dx.doi.org/10.21014/acta_imeko.v11i1.1199
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.