Javascript must be enabled to continue!
Detection of Malicious Flows in the Software-Defined Networks by Using Statistical Flow Analysis-Based Intrusion Detection System
View through CrossRef
Abstract
Specifically, in the past few years, internet traffic has grown rapidly, evolving modern network technologies with hybrid telecommunication systems and conventional computer networks. Unfortunately, the wireless nature of these technologies provides easy access to the network, resulting in an increased risk of network intrusion, ultimately creating a demand to develop an intrusion detection system (IDS). In this paper, an IDS is proposed to detect the malicious flows in the Software-Defined Network (SDN). The core concept behind this idea is implementing a robust statistical analysis-based intrusion detection system (SF-ABIDS) inside the RYU controller that takes statistics of network traffic from the southbound interface after a specific time interval (without changing the standard architecture of SDN). It is evident that due to the centralized nature of SDNs, the SDN controller that sits on top will face lightning-speed incoming network traffic flows. Our IDS will live in SDN controller as an application, and it will perform systemized analysis on incoming network traffic flows. After research, the IDS will have the results, and it will completely block the generator of IP that is classified as malicious by our IDS. This will be a generalized workflow of our IDS in an SDN controller monitoring the incoming traffic. This workflow will allow our IDS to perform accurately and achieve outstanding results by classifying malicious packets and placing them to where they belong i.e., The Blacklist. The SF-ABIDS is inspired by a meta-classification (an ensemble classification) technique that consists of four modules. We use a standard ISCX-UNB dataset to gauge the overall performance of our proposed Intrusion Detection System. Flow match statics features are extracted using the open flow (OF) protocol, which enables the new scheme to detect malicious flows in less time with higher accuracy. These features are then exploited using various ML (Machine Learning) based classifiers, including Decision Table, JRip, J48, PART, Random Forest, RepTree, LMT. The performance of these classifiers is tested by using evaluation parameters like accuracy in terms of true positive (TP), false positive (FP), AUROC, and the harmonic mean of Precision and recall at 0.95. Supervised classifiers with more than 99% AUROC, harmonic value, accuracy, and detecting the flow class in the least time (up to precision level 3) is considered ideal for the new system. As we mentioned above, the architecture of Software defines network enforces that it should be dependable to manage the network traffic, so our proposed Intrusion Detection System will introduce dependability as security in SDN by actively monitoring incoming traffic. So, intruders cannot exploit the centralized nature of Software Defined Networks. The core idea of the transition from conventional networks to SDNs is to introduce simplicity so the network can be easily scalable to support the need of today due to IoT (Internet of things) revolution. Our IDS supports the manifesto and introduces simplicity and security in the network without any additional pre-processing overhead.
Title: Detection of Malicious Flows in the Software-Defined Networks by Using Statistical Flow Analysis-Based Intrusion Detection System
Description:
Abstract
Specifically, in the past few years, internet traffic has grown rapidly, evolving modern network technologies with hybrid telecommunication systems and conventional computer networks.
Unfortunately, the wireless nature of these technologies provides easy access to the network, resulting in an increased risk of network intrusion, ultimately creating a demand to develop an intrusion detection system (IDS).
In this paper, an IDS is proposed to detect the malicious flows in the Software-Defined Network (SDN).
The core concept behind this idea is implementing a robust statistical analysis-based intrusion detection system (SF-ABIDS) inside the RYU controller that takes statistics of network traffic from the southbound interface after a specific time interval (without changing the standard architecture of SDN).
It is evident that due to the centralized nature of SDNs, the SDN controller that sits on top will face lightning-speed incoming network traffic flows.
Our IDS will live in SDN controller as an application, and it will perform systemized analysis on incoming network traffic flows.
After research, the IDS will have the results, and it will completely block the generator of IP that is classified as malicious by our IDS.
This will be a generalized workflow of our IDS in an SDN controller monitoring the incoming traffic.
This workflow will allow our IDS to perform accurately and achieve outstanding results by classifying malicious packets and placing them to where they belong i.
e.
, The Blacklist.
The SF-ABIDS is inspired by a meta-classification (an ensemble classification) technique that consists of four modules.
We use a standard ISCX-UNB dataset to gauge the overall performance of our proposed Intrusion Detection System.
Flow match statics features are extracted using the open flow (OF) protocol, which enables the new scheme to detect malicious flows in less time with higher accuracy.
These features are then exploited using various ML (Machine Learning) based classifiers, including Decision Table, JRip, J48, PART, Random Forest, RepTree, LMT.
The performance of these classifiers is tested by using evaluation parameters like accuracy in terms of true positive (TP), false positive (FP), AUROC, and the harmonic mean of Precision and recall at 0.
95.
Supervised classifiers with more than 99% AUROC, harmonic value, accuracy, and detecting the flow class in the least time (up to precision level 3) is considered ideal for the new system.
As we mentioned above, the architecture of Software defines network enforces that it should be dependable to manage the network traffic, so our proposed Intrusion Detection System will introduce dependability as security in SDN by actively monitoring incoming traffic.
So, intruders cannot exploit the centralized nature of Software Defined Networks.
The core idea of the transition from conventional networks to SDNs is to introduce simplicity so the network can be easily scalable to support the need of today due to IoT (Internet of things) revolution.
Our IDS supports the manifesto and introduces simplicity and security in the network without any additional pre-processing overhead.
Related Results
Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
<p>Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver targeted ads and explicit impr...
Breast Carcinoma within Fibroadenoma: A Systematic Review
Breast Carcinoma within Fibroadenoma: A Systematic Review
Abstract
Introduction
Fibroadenoma is the most common benign breast lesion; however, it carries a potential risk of malignant transformation. This systematic review provides an ove...
Detailed stratigraphy of the N
2Grande Ronde Basalt, Columbia River Basalt Group, in the central Columbia Plateau
Detailed stratigraphy of the N
2Grande Ronde Basalt, Columbia River Basalt Group, in the central Columbia Plateau
Stratigraphy of individual basalt flows in the N 2magnetostratigraphic unit of the Grande Ronde Basalt (GRB) within the central Columbia Plateau has been developed using data from ...
Development and application of biological intelligence technology in computer
Development and application of biological intelligence technology in computer
To study the development and application of biological intelligence technology in computers and realize high-precision network anomaly detection, a distributed intrusion detection ...
Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc Networks
Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc Networks
Technology and its growth is considerably enormous. This massive growth allows the opening of new fields of application in the domain of wireless networking and mobile ad-hoc netwo...

