Detection of Malicious Flows in the Software-Defined Networks by Using Statistical Flow Analysis-Based Intrusion Detection System

Author:

Naqash Talha1,Asfand-e-Yar Muhammad1,Tanveer Muhammad Hassan1

Affiliation:

1. Bahria University

Abstract

Abstract

Specifically, in the past few years, internet traffic has grown rapidly, evolving modern network technologies with hybrid telecommunication systems and conventional computer networks. Unfortunately, the wireless nature of these technologies provides easy access to the network, resulting in an increased risk of network intrusion, ultimately creating a demand to develop an intrusion detection system (IDS). In this paper, an IDS is proposed to detect the malicious flows in the Software-Defined Network (SDN). The core concept behind this idea is implementing a robust statistical analysis-based intrusion detection system (SF-ABIDS) inside the RYU controller that takes statistics of network traffic from the southbound interface after a specific time interval (without changing the standard architecture of SDN). It is evident that due to the centralized nature of SDNs, the SDN controller that sits on top will face lightning-speed incoming network traffic flows. Our IDS will live in SDN controller as an application, and it will perform systemized analysis on incoming network traffic flows. After research, the IDS will have the results, and it will completely block the generator of IP that is classified as malicious by our IDS. This will be a generalized workflow of our IDS in an SDN controller monitoring the incoming traffic. This workflow will allow our IDS to perform accurately and achieve outstanding results by classifying malicious packets and placing them to where they belong i.e., The Blacklist. The SF-ABIDS is inspired by a meta-classification (an ensemble classification) technique that consists of four modules. We use a standard ISCX-UNB dataset to gauge the overall performance of our proposed Intrusion Detection System. Flow match statics features are extracted using the open flow (OF) protocol, which enables the new scheme to detect malicious flows in less time with higher accuracy. These features are then exploited using various ML (Machine Learning) based classifiers, including Decision Table, JRip, J48, PART, Random Forest, RepTree, LMT. The performance of these classifiers is tested by using evaluation parameters like accuracy in terms of true positive (TP), false positive (FP), AUROC, and the harmonic mean of Precision and recall at 0.95. Supervised classifiers with more than 99% AUROC, harmonic value, accuracy, and detecting the flow class in the least time (up to precision level 3) is considered ideal for the new system. As we mentioned above, the architecture of Software defines network enforces that it should be dependable to manage the network traffic, so our proposed Intrusion Detection System will introduce dependability as security in SDN by actively monitoring incoming traffic. So, intruders cannot exploit the centralized nature of Software Defined Networks. The core idea of the transition from conventional networks to SDNs is to introduce simplicity so the network can be easily scalable to support the need of today due to IoT (Internet of things) revolution. Our IDS supports the manifesto and introduces simplicity and security in the network without any additional pre-processing overhead.

Publisher

Research Square Platform LLC

Reference64 articles.

1. HIDS: A host based intrusion detection system for cloud computing environment;SharmaS. SC;Int. J. Syst. Assur. Eng. Manage.

2. Proposed Network Intrusion Detection System ‎Based on Fuzzy c Mean Algorithm in Cloud ‎Computing Environment;Hashim MS;J. Univ. Babylon.,2017

3. H.Omessaad, M., Maissa, K.: A cloud based Architecture for Network Attack Signature Learning 7th International Conference on New Technologies, Mobility and Security (NTMS), (2015)

4. Machine learning models for secure data analytics: A taxonomy and threat model;Rajesh G;Comput. Commun.,2020

5. Wan, W.Y., Guo, X.J.Y.F.: and ShuFang. X, Polymorphic Worms Signature Extraction based-on Improved Ant Colony Algorithm The 9th International Conference on Computer Science & Education (ICCSE 2014), Vancouver, (2014)

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3