A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework
Recently, SDN has arisen as a new network platform that offers unparalleled programming that enables network operators to dynamically customize and control their networks. The attackers aim to paralyse the logical plane, the brain of the network that offers several advantages, by using the SDN contr...
Gespeichert in:
Veröffentlicht in: | Wireless personal communications 2022-12, Vol.127 (3), p.2417-2441 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2441 |
---|---|
container_issue | 3 |
container_start_page | 2417 |
container_title | Wireless personal communications |
container_volume | 127 |
creator | Revathi, M. Ramalingam, V. V. Amutha, B. |
description | Recently, SDN has arisen as a new network platform that offers unparalleled programming that enables network operators to dynamically customize and control their networks. The attackers aim to paralyse the logical plane, the brain of the network that offers several advantages, by using the SDN controller. However, the control plane is the desirable target of security attacks on the opponents because of its characteristics. One of the most common threats is the DDOS attacks to drain network capacity by sending them heavy traffic, causing network congestion. SDN is a common area of investigation for SDN defenceand DDoS threat identification and prevention in the SDN context has been introduced to many researchers since the proposed SDN attacks. Nevertheless, security risks must be adequately secured. In this paper we suggest a discrete scalable memory based support vector machine algorithm for DDoS threat and SDN mitigation architecture for attack detection. By starting the process of attack detection the input data can gets pre-processed by using Spark standardization technique in which the missing values are replaced and the unwanted data are removed. Then the feature extractions are done using semantic multilinear component analysis algorithm. The classifier is responsible for predicting target and for this a novel discrete scalable memory based support vector machine (DSM-SVM) algorithm is used which provides high accuracy of attack prediction. Followed by attack detection the mitigation process was done, here the mitigation server can identify the threat by intelligently dropping malicious bot traffic and absorbing the rest of the traffic. Here the suggested mechanism achieves attack traffic mitigation and benign traffic dropping. We have evaluated the whole process on KDD dataset. The proposed network model was trained and then used in an SDN threat detection and mitigation environment as part of the assessment process. The entire experiment is run on a VMware-based Ubuntu virtual machine. Weka will utilize our suggested classifier model for training and evaluation, while Mininet uses a RYU controller to establish an SD Network. The findings demonstrate that the mechanism presented exceeds the other algorithms examined, by expressing 99.7% accuracy especially concerning training and testing time over KDD dataset. |
doi_str_mv | 10.1007/s11277-021-09071-1 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2743527872</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2743527872</sourcerecordid><originalsourceid>FETCH-LOGICAL-c249t-a552fd72fb881be41f3a1c04c6efda95700d1248e041540a5a1f24a57fb24ada3</originalsourceid><addsrcrecordid>eNp9kE1LAzEURYMoWKt_wFXAdTQvkzQzy9qxKlS7qAV3ITOTtNOPTE1SpP_eaUdw5-ry4J774CB0C_QeKJUPAYBJSSgDQjMqgcAZ6oGQjKQJ_zxHPZqxjAwYsEt0FcKK0hbLWA_ZIX7T5bJ2Bk-M9q52C_yog6lwbqIpY904rF2F3-pYL_TpbCyOS4PzfDrDwxh1ucbFAc_DEZ3l73jUuOibzcZ4PPZ6a74bv75GF1Zvgrn5zT6aj58-Ri9kMn1-HQ0npGQ8i0QLwWwlmS3SFArDwSYaSsrLgbGVzoSktALGU0M5CE610GAZ10Laoo1KJ3101-3ufPO1NyGqVbP3rn2pmOSJYDKVrG2xrlX6JgRvrNr5eqv9QQFVR5-q86lan-rkU0ELJR0U2rJbGP83_Q_1A8t2d1A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2743527872</pqid></control><display><type>article</type><title>A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework</title><source>SpringerLink Journals - AutoHoldings</source><creator>Revathi, M. ; Ramalingam, V. V. ; Amutha, B.</creator><creatorcontrib>Revathi, M. ; Ramalingam, V. V. ; Amutha, B.</creatorcontrib><description>Recently, SDN has arisen as a new network platform that offers unparalleled programming that enables network operators to dynamically customize and control their networks. The attackers aim to paralyse the logical plane, the brain of the network that offers several advantages, by using the SDN controller. However, the control plane is the desirable target of security attacks on the opponents because of its characteristics. One of the most common threats is the DDOS attacks to drain network capacity by sending them heavy traffic, causing network congestion. SDN is a common area of investigation for SDN defenceand DDoS threat identification and prevention in the SDN context has been introduced to many researchers since the proposed SDN attacks. Nevertheless, security risks must be adequately secured. In this paper we suggest a discrete scalable memory based support vector machine algorithm for DDoS threat and SDN mitigation architecture for attack detection. By starting the process of attack detection the input data can gets pre-processed by using Spark standardization technique in which the missing values are replaced and the unwanted data are removed. Then the feature extractions are done using semantic multilinear component analysis algorithm. The classifier is responsible for predicting target and for this a novel discrete scalable memory based support vector machine (DSM-SVM) algorithm is used which provides high accuracy of attack prediction. Followed by attack detection the mitigation process was done, here the mitigation server can identify the threat by intelligently dropping malicious bot traffic and absorbing the rest of the traffic. Here the suggested mechanism achieves attack traffic mitigation and benign traffic dropping. We have evaluated the whole process on KDD dataset. The proposed network model was trained and then used in an SDN threat detection and mitigation environment as part of the assessment process. The entire experiment is run on a VMware-based Ubuntu virtual machine. Weka will utilize our suggested classifier model for training and evaluation, while Mininet uses a RYU controller to establish an SD Network. The findings demonstrate that the mechanism presented exceeds the other algorithms examined, by expressing 99.7% accuracy especially concerning training and testing time over KDD dataset.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-021-09071-1</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Classifiers ; Communications Engineering ; Computer Communication Networks ; Controllers ; Datasets ; Denial of service attacks ; Engineering ; Evaluation ; Feature extraction ; Machine learning ; Networks ; Security ; Signal,Image and Speech Processing ; Software-defined networking ; Support vector machines ; Traffic capacity ; Traffic congestion ; Training ; Virtual environments</subject><ispartof>Wireless personal communications, 2022-12, Vol.127 (3), p.2417-2441</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c249t-a552fd72fb881be41f3a1c04c6efda95700d1248e041540a5a1f24a57fb24ada3</citedby><cites>FETCH-LOGICAL-c249t-a552fd72fb881be41f3a1c04c6efda95700d1248e041540a5a1f24a57fb24ada3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-021-09071-1$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-021-09071-1$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27922,27923,41486,42555,51317</link.rule.ids></links><search><creatorcontrib>Revathi, M.</creatorcontrib><creatorcontrib>Ramalingam, V. V.</creatorcontrib><creatorcontrib>Amutha, B.</creatorcontrib><title>A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>Recently, SDN has arisen as a new network platform that offers unparalleled programming that enables network operators to dynamically customize and control their networks. The attackers aim to paralyse the logical plane, the brain of the network that offers several advantages, by using the SDN controller. However, the control plane is the desirable target of security attacks on the opponents because of its characteristics. One of the most common threats is the DDOS attacks to drain network capacity by sending them heavy traffic, causing network congestion. SDN is a common area of investigation for SDN defenceand DDoS threat identification and prevention in the SDN context has been introduced to many researchers since the proposed SDN attacks. Nevertheless, security risks must be adequately secured. In this paper we suggest a discrete scalable memory based support vector machine algorithm for DDoS threat and SDN mitigation architecture for attack detection. By starting the process of attack detection the input data can gets pre-processed by using Spark standardization technique in which the missing values are replaced and the unwanted data are removed. Then the feature extractions are done using semantic multilinear component analysis algorithm. The classifier is responsible for predicting target and for this a novel discrete scalable memory based support vector machine (DSM-SVM) algorithm is used which provides high accuracy of attack prediction. Followed by attack detection the mitigation process was done, here the mitigation server can identify the threat by intelligently dropping malicious bot traffic and absorbing the rest of the traffic. Here the suggested mechanism achieves attack traffic mitigation and benign traffic dropping. We have evaluated the whole process on KDD dataset. The proposed network model was trained and then used in an SDN threat detection and mitigation environment as part of the assessment process. The entire experiment is run on a VMware-based Ubuntu virtual machine. Weka will utilize our suggested classifier model for training and evaluation, while Mininet uses a RYU controller to establish an SD Network. The findings demonstrate that the mechanism presented exceeds the other algorithms examined, by expressing 99.7% accuracy especially concerning training and testing time over KDD dataset.</description><subject>Algorithms</subject><subject>Classifiers</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Controllers</subject><subject>Datasets</subject><subject>Denial of service attacks</subject><subject>Engineering</subject><subject>Evaluation</subject><subject>Feature extraction</subject><subject>Machine learning</subject><subject>Networks</subject><subject>Security</subject><subject>Signal,Image and Speech Processing</subject><subject>Software-defined networking</subject><subject>Support vector machines</subject><subject>Traffic capacity</subject><subject>Traffic congestion</subject><subject>Training</subject><subject>Virtual environments</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp9kE1LAzEURYMoWKt_wFXAdTQvkzQzy9qxKlS7qAV3ITOTtNOPTE1SpP_eaUdw5-ry4J774CB0C_QeKJUPAYBJSSgDQjMqgcAZ6oGQjKQJ_zxHPZqxjAwYsEt0FcKK0hbLWA_ZIX7T5bJ2Bk-M9q52C_yog6lwbqIpY904rF2F3-pYL_TpbCyOS4PzfDrDwxh1ucbFAc_DEZ3l73jUuOibzcZ4PPZ6a74bv75GF1Zvgrn5zT6aj58-Ri9kMn1-HQ0npGQ8i0QLwWwlmS3SFArDwSYaSsrLgbGVzoSktALGU0M5CE610GAZ10Laoo1KJ3101-3ufPO1NyGqVbP3rn2pmOSJYDKVrG2xrlX6JgRvrNr5eqv9QQFVR5-q86lan-rkU0ELJR0U2rJbGP83_Q_1A8t2d1A</recordid><startdate>20221201</startdate><enddate>20221201</enddate><creator>Revathi, M.</creator><creator>Ramalingam, V. V.</creator><creator>Amutha, B.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20221201</creationdate><title>A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework</title><author>Revathi, M. ; Ramalingam, V. V. ; Amutha, B.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c249t-a552fd72fb881be41f3a1c04c6efda95700d1248e041540a5a1f24a57fb24ada3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Classifiers</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Controllers</topic><topic>Datasets</topic><topic>Denial of service attacks</topic><topic>Engineering</topic><topic>Evaluation</topic><topic>Feature extraction</topic><topic>Machine learning</topic><topic>Networks</topic><topic>Security</topic><topic>Signal,Image and Speech Processing</topic><topic>Software-defined networking</topic><topic>Support vector machines</topic><topic>Traffic capacity</topic><topic>Traffic congestion</topic><topic>Training</topic><topic>Virtual environments</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Revathi, M.</creatorcontrib><creatorcontrib>Ramalingam, V. V.</creatorcontrib><creatorcontrib>Amutha, B.</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Revathi, M.</au><au>Ramalingam, V. V.</au><au>Amutha, B.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2022-12-01</date><risdate>2022</risdate><volume>127</volume><issue>3</issue><spage>2417</spage><epage>2441</epage><pages>2417-2441</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>Recently, SDN has arisen as a new network platform that offers unparalleled programming that enables network operators to dynamically customize and control their networks. The attackers aim to paralyse the logical plane, the brain of the network that offers several advantages, by using the SDN controller. However, the control plane is the desirable target of security attacks on the opponents because of its characteristics. One of the most common threats is the DDOS attacks to drain network capacity by sending them heavy traffic, causing network congestion. SDN is a common area of investigation for SDN defenceand DDoS threat identification and prevention in the SDN context has been introduced to many researchers since the proposed SDN attacks. Nevertheless, security risks must be adequately secured. In this paper we suggest a discrete scalable memory based support vector machine algorithm for DDoS threat and SDN mitigation architecture for attack detection. By starting the process of attack detection the input data can gets pre-processed by using Spark standardization technique in which the missing values are replaced and the unwanted data are removed. Then the feature extractions are done using semantic multilinear component analysis algorithm. The classifier is responsible for predicting target and for this a novel discrete scalable memory based support vector machine (DSM-SVM) algorithm is used which provides high accuracy of attack prediction. Followed by attack detection the mitigation process was done, here the mitigation server can identify the threat by intelligently dropping malicious bot traffic and absorbing the rest of the traffic. Here the suggested mechanism achieves attack traffic mitigation and benign traffic dropping. We have evaluated the whole process on KDD dataset. The proposed network model was trained and then used in an SDN threat detection and mitigation environment as part of the assessment process. The entire experiment is run on a VMware-based Ubuntu virtual machine. Weka will utilize our suggested classifier model for training and evaluation, while Mininet uses a RYU controller to establish an SD Network. The findings demonstrate that the mechanism presented exceeds the other algorithms examined, by expressing 99.7% accuracy especially concerning training and testing time over KDD dataset.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-021-09071-1</doi><tpages>25</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0929-6212 |
ispartof | Wireless personal communications, 2022-12, Vol.127 (3), p.2417-2441 |
issn | 0929-6212 1572-834X |
language | eng |
recordid | cdi_proquest_journals_2743527872 |
source | SpringerLink Journals - AutoHoldings |
subjects | Algorithms Classifiers Communications Engineering Computer Communication Networks Controllers Datasets Denial of service attacks Engineering Evaluation Feature extraction Machine learning Networks Security Signal,Image and Speech Processing Software-defined networking Support vector machines Traffic capacity Traffic congestion Training Virtual environments |
title | A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T02%3A18%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Machine%20Learning%20Based%20Detection%20and%20Mitigation%20of%20the%20DDOS%20Attack%20by%20Using%20SDN%20Controller%20Framework&rft.jtitle=Wireless%20personal%20communications&rft.au=Revathi,%20M.&rft.date=2022-12-01&rft.volume=127&rft.issue=3&rft.spage=2417&rft.epage=2441&rft.pages=2417-2441&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-021-09071-1&rft_dat=%3Cproquest_cross%3E2743527872%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2743527872&rft_id=info:pmid/&rfr_iscdi=true |