A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework

Recently, SDN has arisen as a new network platform that offers unparalleled programming that enables network operators to dynamically customize and control their networks. The attackers aim to paralyse the logical plane, the brain of the network that offers several advantages, by using the SDN contr...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless personal communications 2022-12, Vol.127 (3), p.2417-2441
Hauptverfasser: Revathi, M., Ramalingam, V. V., Amutha, B.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2441
container_issue 3
container_start_page 2417
container_title Wireless personal communications
container_volume 127
creator Revathi, M.
Ramalingam, V. V.
Amutha, B.
description Recently, SDN has arisen as a new network platform that offers unparalleled programming that enables network operators to dynamically customize and control their networks. The attackers aim to paralyse the logical plane, the brain of the network that offers several advantages, by using the SDN controller. However, the control plane is the desirable target of security attacks on the opponents because of its characteristics. One of the most common threats is the DDOS attacks to drain network capacity by sending them heavy traffic, causing network congestion. SDN is a common area of investigation for SDN defenceand DDoS threat identification and prevention in the SDN context has been introduced to many researchers since the proposed SDN attacks. Nevertheless, security risks must be adequately secured. In this paper we suggest a discrete scalable memory based support vector machine algorithm for DDoS threat and SDN mitigation architecture for attack detection. By starting the process of attack detection the input data can gets pre-processed by using Spark standardization technique in which the missing values are replaced and the unwanted data are removed. Then the feature extractions are done using semantic multilinear component analysis algorithm. The classifier is responsible for predicting target and for this a novel discrete scalable memory based support vector machine (DSM-SVM) algorithm is used which provides high accuracy of attack prediction. Followed by attack detection the mitigation process was done, here the mitigation server can identify the threat by intelligently dropping malicious bot traffic and absorbing the rest of the traffic. Here the suggested mechanism achieves attack traffic mitigation and benign traffic dropping. We have evaluated the whole process on KDD dataset. The proposed network model was trained and then used in an SDN threat detection and mitigation environment as part of the assessment process. The entire experiment is run on a VMware-based Ubuntu virtual machine. Weka will utilize our suggested classifier model for training and evaluation, while Mininet uses a RYU controller to establish an SD Network. The findings demonstrate that the mechanism presented exceeds the other algorithms examined, by expressing 99.7% accuracy especially concerning training and testing time over KDD dataset.
doi_str_mv 10.1007/s11277-021-09071-1
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2743527872</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2743527872</sourcerecordid><originalsourceid>FETCH-LOGICAL-c249t-a552fd72fb881be41f3a1c04c6efda95700d1248e041540a5a1f24a57fb24ada3</originalsourceid><addsrcrecordid>eNp9kE1LAzEURYMoWKt_wFXAdTQvkzQzy9qxKlS7qAV3ITOTtNOPTE1SpP_eaUdw5-ry4J774CB0C_QeKJUPAYBJSSgDQjMqgcAZ6oGQjKQJ_zxHPZqxjAwYsEt0FcKK0hbLWA_ZIX7T5bJ2Bk-M9q52C_yog6lwbqIpY904rF2F3-pYL_TpbCyOS4PzfDrDwxh1ucbFAc_DEZ3l73jUuOibzcZ4PPZ6a74bv75GF1Zvgrn5zT6aj58-Ri9kMn1-HQ0npGQ8i0QLwWwlmS3SFArDwSYaSsrLgbGVzoSktALGU0M5CE610GAZ10Laoo1KJ3101-3ufPO1NyGqVbP3rn2pmOSJYDKVrG2xrlX6JgRvrNr5eqv9QQFVR5-q86lan-rkU0ELJR0U2rJbGP83_Q_1A8t2d1A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2743527872</pqid></control><display><type>article</type><title>A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework</title><source>SpringerLink Journals - AutoHoldings</source><creator>Revathi, M. ; Ramalingam, V. V. ; Amutha, B.</creator><creatorcontrib>Revathi, M. ; Ramalingam, V. V. ; Amutha, B.</creatorcontrib><description>Recently, SDN has arisen as a new network platform that offers unparalleled programming that enables network operators to dynamically customize and control their networks. The attackers aim to paralyse the logical plane, the brain of the network that offers several advantages, by using the SDN controller. However, the control plane is the desirable target of security attacks on the opponents because of its characteristics. One of the most common threats is the DDOS attacks to drain network capacity by sending them heavy traffic, causing network congestion. SDN is a common area of investigation for SDN defenceand DDoS threat identification and prevention in the SDN context has been introduced to many researchers since the proposed SDN attacks. Nevertheless, security risks must be adequately secured. In this paper we suggest a discrete scalable memory based support vector machine algorithm for DDoS threat and SDN mitigation architecture for attack detection. By starting the process of attack detection the input data can gets pre-processed by using Spark standardization technique in which the missing values are replaced and the unwanted data are removed. Then the feature extractions are done using semantic multilinear component analysis algorithm. The classifier is responsible for predicting target and for this a novel discrete scalable memory based support vector machine (DSM-SVM) algorithm is used which provides high accuracy of attack prediction. Followed by attack detection the mitigation process was done, here the mitigation server can identify the threat by intelligently dropping malicious bot traffic and absorbing the rest of the traffic. Here the suggested mechanism achieves attack traffic mitigation and benign traffic dropping. We have evaluated the whole process on KDD dataset. The proposed network model was trained and then used in an SDN threat detection and mitigation environment as part of the assessment process. The entire experiment is run on a VMware-based Ubuntu virtual machine. Weka will utilize our suggested classifier model for training and evaluation, while Mininet uses a RYU controller to establish an SD Network. The findings demonstrate that the mechanism presented exceeds the other algorithms examined, by expressing 99.7% accuracy especially concerning training and testing time over KDD dataset.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-021-09071-1</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Classifiers ; Communications Engineering ; Computer Communication Networks ; Controllers ; Datasets ; Denial of service attacks ; Engineering ; Evaluation ; Feature extraction ; Machine learning ; Networks ; Security ; Signal,Image and Speech Processing ; Software-defined networking ; Support vector machines ; Traffic capacity ; Traffic congestion ; Training ; Virtual environments</subject><ispartof>Wireless personal communications, 2022-12, Vol.127 (3), p.2417-2441</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c249t-a552fd72fb881be41f3a1c04c6efda95700d1248e041540a5a1f24a57fb24ada3</citedby><cites>FETCH-LOGICAL-c249t-a552fd72fb881be41f3a1c04c6efda95700d1248e041540a5a1f24a57fb24ada3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-021-09071-1$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-021-09071-1$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27922,27923,41486,42555,51317</link.rule.ids></links><search><creatorcontrib>Revathi, M.</creatorcontrib><creatorcontrib>Ramalingam, V. V.</creatorcontrib><creatorcontrib>Amutha, B.</creatorcontrib><title>A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>Recently, SDN has arisen as a new network platform that offers unparalleled programming that enables network operators to dynamically customize and control their networks. The attackers aim to paralyse the logical plane, the brain of the network that offers several advantages, by using the SDN controller. However, the control plane is the desirable target of security attacks on the opponents because of its characteristics. One of the most common threats is the DDOS attacks to drain network capacity by sending them heavy traffic, causing network congestion. SDN is a common area of investigation for SDN defenceand DDoS threat identification and prevention in the SDN context has been introduced to many researchers since the proposed SDN attacks. Nevertheless, security risks must be adequately secured. In this paper we suggest a discrete scalable memory based support vector machine algorithm for DDoS threat and SDN mitigation architecture for attack detection. By starting the process of attack detection the input data can gets pre-processed by using Spark standardization technique in which the missing values are replaced and the unwanted data are removed. Then the feature extractions are done using semantic multilinear component analysis algorithm. The classifier is responsible for predicting target and for this a novel discrete scalable memory based support vector machine (DSM-SVM) algorithm is used which provides high accuracy of attack prediction. Followed by attack detection the mitigation process was done, here the mitigation server can identify the threat by intelligently dropping malicious bot traffic and absorbing the rest of the traffic. Here the suggested mechanism achieves attack traffic mitigation and benign traffic dropping. We have evaluated the whole process on KDD dataset. The proposed network model was trained and then used in an SDN threat detection and mitigation environment as part of the assessment process. The entire experiment is run on a VMware-based Ubuntu virtual machine. Weka will utilize our suggested classifier model for training and evaluation, while Mininet uses a RYU controller to establish an SD Network. The findings demonstrate that the mechanism presented exceeds the other algorithms examined, by expressing 99.7% accuracy especially concerning training and testing time over KDD dataset.</description><subject>Algorithms</subject><subject>Classifiers</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Controllers</subject><subject>Datasets</subject><subject>Denial of service attacks</subject><subject>Engineering</subject><subject>Evaluation</subject><subject>Feature extraction</subject><subject>Machine learning</subject><subject>Networks</subject><subject>Security</subject><subject>Signal,Image and Speech Processing</subject><subject>Software-defined networking</subject><subject>Support vector machines</subject><subject>Traffic capacity</subject><subject>Traffic congestion</subject><subject>Training</subject><subject>Virtual environments</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp9kE1LAzEURYMoWKt_wFXAdTQvkzQzy9qxKlS7qAV3ITOTtNOPTE1SpP_eaUdw5-ry4J774CB0C_QeKJUPAYBJSSgDQjMqgcAZ6oGQjKQJ_zxHPZqxjAwYsEt0FcKK0hbLWA_ZIX7T5bJ2Bk-M9q52C_yog6lwbqIpY904rF2F3-pYL_TpbCyOS4PzfDrDwxh1ucbFAc_DEZ3l73jUuOibzcZ4PPZ6a74bv75GF1Zvgrn5zT6aj58-Ri9kMn1-HQ0npGQ8i0QLwWwlmS3SFArDwSYaSsrLgbGVzoSktALGU0M5CE610GAZ10Laoo1KJ3101-3ufPO1NyGqVbP3rn2pmOSJYDKVrG2xrlX6JgRvrNr5eqv9QQFVR5-q86lan-rkU0ELJR0U2rJbGP83_Q_1A8t2d1A</recordid><startdate>20221201</startdate><enddate>20221201</enddate><creator>Revathi, M.</creator><creator>Ramalingam, V. V.</creator><creator>Amutha, B.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20221201</creationdate><title>A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework</title><author>Revathi, M. ; Ramalingam, V. V. ; Amutha, B.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c249t-a552fd72fb881be41f3a1c04c6efda95700d1248e041540a5a1f24a57fb24ada3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Classifiers</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Controllers</topic><topic>Datasets</topic><topic>Denial of service attacks</topic><topic>Engineering</topic><topic>Evaluation</topic><topic>Feature extraction</topic><topic>Machine learning</topic><topic>Networks</topic><topic>Security</topic><topic>Signal,Image and Speech Processing</topic><topic>Software-defined networking</topic><topic>Support vector machines</topic><topic>Traffic capacity</topic><topic>Traffic congestion</topic><topic>Training</topic><topic>Virtual environments</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Revathi, M.</creatorcontrib><creatorcontrib>Ramalingam, V. V.</creatorcontrib><creatorcontrib>Amutha, B.</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Revathi, M.</au><au>Ramalingam, V. V.</au><au>Amutha, B.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2022-12-01</date><risdate>2022</risdate><volume>127</volume><issue>3</issue><spage>2417</spage><epage>2441</epage><pages>2417-2441</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>Recently, SDN has arisen as a new network platform that offers unparalleled programming that enables network operators to dynamically customize and control their networks. The attackers aim to paralyse the logical plane, the brain of the network that offers several advantages, by using the SDN controller. However, the control plane is the desirable target of security attacks on the opponents because of its characteristics. One of the most common threats is the DDOS attacks to drain network capacity by sending them heavy traffic, causing network congestion. SDN is a common area of investigation for SDN defenceand DDoS threat identification and prevention in the SDN context has been introduced to many researchers since the proposed SDN attacks. Nevertheless, security risks must be adequately secured. In this paper we suggest a discrete scalable memory based support vector machine algorithm for DDoS threat and SDN mitigation architecture for attack detection. By starting the process of attack detection the input data can gets pre-processed by using Spark standardization technique in which the missing values are replaced and the unwanted data are removed. Then the feature extractions are done using semantic multilinear component analysis algorithm. The classifier is responsible for predicting target and for this a novel discrete scalable memory based support vector machine (DSM-SVM) algorithm is used which provides high accuracy of attack prediction. Followed by attack detection the mitigation process was done, here the mitigation server can identify the threat by intelligently dropping malicious bot traffic and absorbing the rest of the traffic. Here the suggested mechanism achieves attack traffic mitigation and benign traffic dropping. We have evaluated the whole process on KDD dataset. The proposed network model was trained and then used in an SDN threat detection and mitigation environment as part of the assessment process. The entire experiment is run on a VMware-based Ubuntu virtual machine. Weka will utilize our suggested classifier model for training and evaluation, while Mininet uses a RYU controller to establish an SD Network. The findings demonstrate that the mechanism presented exceeds the other algorithms examined, by expressing 99.7% accuracy especially concerning training and testing time over KDD dataset.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-021-09071-1</doi><tpages>25</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0929-6212
ispartof Wireless personal communications, 2022-12, Vol.127 (3), p.2417-2441
issn 0929-6212
1572-834X
language eng
recordid cdi_proquest_journals_2743527872
source SpringerLink Journals - AutoHoldings
subjects Algorithms
Classifiers
Communications Engineering
Computer Communication Networks
Controllers
Datasets
Denial of service attacks
Engineering
Evaluation
Feature extraction
Machine learning
Networks
Security
Signal,Image and Speech Processing
Software-defined networking
Support vector machines
Traffic capacity
Traffic congestion
Training
Virtual environments
title A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T02%3A18%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Machine%20Learning%20Based%20Detection%20and%20Mitigation%20of%20the%20DDOS%20Attack%20by%20Using%20SDN%20Controller%20Framework&rft.jtitle=Wireless%20personal%20communications&rft.au=Revathi,%20M.&rft.date=2022-12-01&rft.volume=127&rft.issue=3&rft.spage=2417&rft.epage=2441&rft.pages=2417-2441&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-021-09071-1&rft_dat=%3Cproquest_cross%3E2743527872%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2743527872&rft_id=info:pmid/&rfr_iscdi=true