1
|
Wang K, Fu Y, Duan X, Liu T. Detection and mitigation of DDoS attacks based on multi-dimensional characteristics in SDN. Sci Rep 2024; 14:16421. [PMID: 39014041 PMCID: PMC11253008 DOI: 10.1038/s41598-024-66907-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/23/2024] [Accepted: 07/05/2024] [Indexed: 07/18/2024] Open
Abstract
Due to the large computational overhead, underutilization of features, and high bandwidth consumption in traditional SDN environments for DDoS attack detection and mitigation methods, this paper proposes a two-stage detection and mitigation method for DDoS attacks in SDN based on multi-dimensional characteristics. Firstly, an analysis of the traffic statistics from the SDN switch ports is performed, which aids in conducting a coarse-grained detection of DDoS attacks within the network. Subsequently, a Multi-Dimensional Deep Convolutional Classifier (MDDCC) is constructed using wavelet decomposition and convolutional neural networks to extract multi-dimensional characteristics from the traffic data passing through suspicious switches. Based on these extracted multi-dimensional characteristics, a simple classifier can be employed to accurately detect attack samples. Finally, by integrating graph theory with restrictive strategies, the source of attacks in SDN networks can be effectively traced and isolated. The experimental results indicate that the proposed method, which utilizes a minimal amount of statistical information, can quickly and accurately detect attacks within the SDN network. It demonstrates superior accuracy and generalization capabilities compared to traditional detection methods, especially when tested on both simulated and public datasets. Furthermore, by isolating the affected nodes, the method effectively mitigates the impact of the attacks, ensuring the normal transmission of legitimate traffic during network attacks. This approach not only enhances the detection capabilities but also provides a robust mechanism for containing the spread of cyber threats, thereby safeguarding the integrity and performance of the network.
Collapse
Affiliation(s)
- Kun Wang
- Department of Information Security, Naval University of Engineering, Wuhan, 430033, China
- School of Mathematics and Information Engineering, Xinyang Vocational and Technical College, Xinyang, 464000, China
| | - Yu Fu
- Department of Information Security, Naval University of Engineering, Wuhan, 430033, China.
| | - Xueyuan Duan
- College of Computer and Information Technology, Xinyang Normal University, Xinyang, 464000, China
- Henan Key Laboratory of Analysis and Applications of Education Big Data, Xinyang, 464000, China
| | - Taotao Liu
- Department of Information Security, Naval University of Engineering, Wuhan, 430033, China
| |
Collapse
|
2
|
Sriraman G, R S. Slide-block: End-to-end amplified security to improve DevOps resilience through pattern-based authentication. Heliyon 2024; 10:e26312. [PMID: 38434020 PMCID: PMC10907398 DOI: 10.1016/j.heliyon.2024.e26312] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/09/2023] [Revised: 02/06/2024] [Accepted: 02/09/2024] [Indexed: 03/05/2024] Open
Abstract
DevOps represents the fusion of cultural philosophies, tools, and practices that rapidly enhance an organization's capacity to deploy services and applications. Cloud-based tools, a subset of DevOps services, facilitate collaboration between development and operations teams within an organization. However, persistent challenges such as inadequate security management, substantial leakage of sensitive data, and system/service unavailability pose significant threats to sustainability. We propose an end-to-end enhanced security framework to fortify DevOps resilience by implementing authentication and vulnerability management through the Slide-Block methodology. Our approach comprises four sequential processes: pattern-based authentication, tri-level access control, privacy-focused data storage, and vulnerability management and correction. Initially, we establish candidate legitimacy through pattern-based authentication using the Magnificent Chacha-Poly 1305 algorithm. Subsequently, we devise effective access policies using the Enhanced Deep Deterministic Policy Gradient (EDDPG) algorithm, employing tri-level access control based on trust value, attributes, and roles for optimal user and developer selection via the African Vulture Optimization Algorithm (AVOA). Moreover, we encrypt data in transit and at rest using Mcha-Poly 1305, considering sensitivity, and store it in a blockchain to enhance data privacy. Our approach incorporates a sliding window blockchain for secure data transmission and storage. Finally, we identify and address attack and application-based issues using the Tweak Naive Bayes (Tweak-NB) algorithm and Intruder Vulnerability Scanner (IVS). Our Slide-Block framework demonstrates superior performance in detection rate, authentication time, packet loss, security strengthening, communication overhead, and latency compared to existing models.
Collapse
Affiliation(s)
| | - Shriram R
- Department of Computing Science and Engineering, VIT Bhopal University, Sehore, MP, India
| |
Collapse
|
3
|
Liu Z, Wang Y, Feng F, Liu Y, Li Z, Shan Y. A DDoS Detection Method Based on Feature Engineering and Machine Learning in Software-Defined Networks. SENSORS (BASEL, SWITZERLAND) 2023; 23:6176. [PMID: 37448025 DOI: 10.3390/s23136176] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/18/2023] [Revised: 06/26/2023] [Accepted: 07/03/2023] [Indexed: 07/15/2023]
Abstract
Distributed denial-of-service (DDoS) attacks pose a significant cybersecurity threat to software-defined networks (SDNs). This paper proposes a feature-engineering- and machine-learning-based approach to detect DDoS attacks in SDNs. First, the CSE-CIC-IDS2018 dataset was cleaned and normalized, and the optimal feature subset was found using an improved binary grey wolf optimization algorithm. Next, the optimal feature subset was trained and tested in Random Forest (RF), Support Vector Machine (SVM), K-Nearest Neighbor (k-NN), Decision Tree, and XGBoost machine learning algorithms, from which the best classifier was selected for DDoS attack detection and deployed in the SDN controller. The results show that RF performs best when compared across several performance metrics (e.g., accuracy, precision, recall, F1 and AUC values). We also explore the comparison between different models and algorithms. The results show that our proposed method performed the best and can effectively detect and identify DDoS attacks in SDNs, providing a new idea and solution for the security of SDNs.
Collapse
Affiliation(s)
- Zhenpeng Liu
- School of Electronic Information Engineering, Hebei University, Baoding 071002, China
- Information Technology Center, Hebei University, Baoding 071002, China
| | - Yihang Wang
- School of Electronic Information Engineering, Hebei University, Baoding 071002, China
| | - Fan Feng
- Information Technology Center, Hebei University, Baoding 071002, China
| | - Yifan Liu
- School of Cyberspace Security and Computer, Hebei University, Baoding 071002, China
| | - Zelin Li
- School of Electronic Information Engineering, Hebei University, Baoding 071002, China
| | - Yawei Shan
- School of Electronic Information Engineering, Hebei University, Baoding 071002, China
| |
Collapse
|
4
|
Abu Bakar R, Huang X, Javed MS, Hussain S, Majeed MF. An Intelligent Agent-Based Detection System for DDoS Attacks Using Automatic Feature Extraction and Selection. SENSORS (BASEL, SWITZERLAND) 2023; 23:3333. [PMID: 36992049 PMCID: PMC10053203 DOI: 10.3390/s23063333] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/24/2022] [Revised: 03/17/2023] [Accepted: 03/19/2023] [Indexed: 06/19/2023]
Abstract
Distributed Denial of Service (DDoS) attacks, advanced persistent threats, and malware actively compromise the availability and security of Internet services. Thus, this paper proposes an intelligent agent system for detecting DDoS attacks using automatic feature extraction and selection. We used dataset CICDDoS2019, a custom-generated dataset, in our experiment, and the system achieved a 99.7% improvement over state-of-the-art machine learning-based DDoS attack detection techniques. We also designed an agent-based mechanism that combines machine learning techniques and sequential feature selection in this system. The system learning phase selected the best features and reconstructed the DDoS detector agent when the system dynamically detected DDoS attack traffic. By utilizing the most recent CICDDoS2019 custom-generated dataset and automatic feature extraction and selection, our proposed method meets the current, most advanced detection accuracy while delivering faster processing than the current standard.
Collapse
Affiliation(s)
- Rana Abu Bakar
- College of Data Science, Taiyuan University of Technology, Taiyuan 030024, China;
| | - Xin Huang
- College of Data Science, Taiyuan University of Technology, Taiyuan 030024, China;
| | - Muhammad Saqib Javed
- Department of Computer Science, Virtual University of Pakistan, Lahore 58000, Pakistan
| | - Shafiq Hussain
- Department of Computer Science, University of Sahiwal, Sahiwal 57000, Pakistan
| | | |
Collapse
|
5
|
Astray G, Soria-Lopez A, Barreiro E, Mejuto JC, Cid-Samamed A. Machine Learning to Predict the Adsorption Capacity of Microplastics. NANOMATERIALS (BASEL, SWITZERLAND) 2023; 13:1061. [PMID: 36985954 PMCID: PMC10051191 DOI: 10.3390/nano13061061] [Citation(s) in RCA: 6] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/14/2023] [Revised: 03/10/2023] [Accepted: 03/11/2023] [Indexed: 06/18/2023]
Abstract
Nowadays, there is an extensive production and use of plastic materials for different industrial activities. These plastics, either from their primary production sources or through their own degradation processes, can contaminate ecosystems with micro- and nanoplastics. Once in the aquatic environment, these microplastics can be the basis for the adsorption of chemical pollutants, favoring that these chemical pollutants disperse more quickly in the environment and can affect living beings. Due to the lack of information on adsorption, three machine learning models (random forest, support vector machine, and artificial neural network) were developed to predict different microplastic/water partition coefficients (log Kd) using two different approximations (based on the number of input variables). The best-selected machine learning models present, in general, correlation coefficients above 0.92 in the query phase, which indicates that these types of models could be used for the rapid estimation of the absorption of organic contaminants on microplastics.
Collapse
Affiliation(s)
- Gonzalo Astray
- Universidade de Vigo, Departamento de Química Física, Facultade de Ciencias, 32004 Ourense, Spain
| | - Anton Soria-Lopez
- Universidade de Vigo, Departamento de Química Física, Facultade de Ciencias, 32004 Ourense, Spain
| | - Enrique Barreiro
- Universidade de Vigo, Departamento de Informática, Escola Superior de Enxeñaría Informática, 32004 Ourense, Spain
| | - Juan Carlos Mejuto
- Universidade de Vigo, Departamento de Química Física, Facultade de Ciencias, 32004 Ourense, Spain
| | - Antonio Cid-Samamed
- Universidade de Vigo, Departamento de Química Física, Facultade de Ciencias, 32004 Ourense, Spain
| |
Collapse
|
6
|
Caroline Misbha J, Ajith Bosco Raj T, Jiji G. Novel deep learning approach for DDoS attack using elephant heard optimization algorithm along with a fuzzy classifier for rules learning. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2023. [DOI: 10.3233/jifs-224149] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/12/2023]
Abstract
The research aims to provide network security so that it can be protected from several attacks, especially DoS (Denial-of-Service) or DDoS (Distributed Denial-of-Service) attacks that could at some point render the server inoperable. Security is one of the main obstacles. There are a lot of network risks and attacks available today. One of the most common and disruptive attacks is a DDoS attack. In this study, upgraded deep learning Elephant Herd Optimization with random forest classifier is employed for early DDos attack detection. The DDoS dataset’s number of characteristics is decreased by the proposed IDN-EHO method for classifying data learning that works with a lot of data. In the feature extraction stage, deep neural networks (DNN) approach is used, and the classified data packages are compared to return the DDoS attack traffic characteristics with a significant percentage. In the classification stage, the proposed deep learning Elephant Herd Optimization with random forest classifier used to classify the data learning which deal with a huge amount of data and minimise the number of features of the DDoS dataset. During the detection step, when the extracted features are used as input features, the attack detection model is trained using the improved deep learning Elephant Herd Optimization. The proposed framework has the potential to be a promising method for identifying unidentified DDoS attacks, according to experiments. 99% recall, precision, and accuracy can be attained using the suggested strategy, according on the findings of the experiments.
Collapse
Affiliation(s)
- J. Caroline Misbha
- Department of Computer Science and Engineering, Arunachala College of Engineering for Women, Nagercoil, Tamil Nadu, India
| | - T. Ajith Bosco Raj
- Department of Electronics and Communication Engineering, PSN College of Engineering and Technology, Melathediyoor, Tirunelveli, Tamil Nadu, India
| | - G. Jiji
- Department of Electronics and Communication Engineering, Lord Jegannath College of Engineering and Technology, Nagercoil, Tamil Nadu, India
| |
Collapse
|
7
|
Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing. INT J INTELL SYST 2023. [DOI: 10.1155/2023/2039217] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/22/2023]
Abstract
Cloud computing is a vast revolution in information technology (IT) that inhibits scalable and virtualized sources to end users with low infrastructure cost and maintenance. They also have much flexibility and these resources are supervised by various management organizations and provided over the Internet by known standards, formats, and networking protocols. Legacy protocols and underlying technologies consist of vulnerabilities and bugs which open doors for intrusion by network attackers. Attacks as distributed denial of service (DDoS) are one of most frequent attacks, which impose heavy damage and affect performance of the cloud. In this research work, DDoS attack detection is easily identified in an optimized way through a novel algorithm, namely, the proposed gradient hybrid leader optimization (GHLBO) algorithm. This optimized algorithm is responsible to train a deep stacked autoencoder (DSA) that detects the attack in an efficient manner. Here, fusion of features is carried out by deep maxout network (DMN) with an overlap coefficient, and augmentation of data is carried out by the oversampling process. Furthermore, the proposed GHLBO is generated by integrating the gradient descent and hybrid leader-based optimization (HLBO) algorithm. Also, this proposed method is assessed by various performance metrics, such as the true positive rate (TPR), true negative rate (TNR), and testing accuracy with values attained as 0.909, 0.909, and 0.917, accordingly.
Collapse
|
8
|
Determination of Air Traffic Complexity Most Influential Parameters Based on Machine Learning Models. Symmetry (Basel) 2022. [DOI: 10.3390/sym14122629] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/14/2022] Open
Abstract
Today, aircraft demand is exceeding the capacity of the Air Traffic Control (ATC) system. As a result, airspace is becoming a very complex environment to control. The complexity of airspace is thus closely related to the workload of controllers and is a topic of great interest. The major concern is that variables that are related to complexity are currently recognised, but there is still a debate about how to define complexity. This paper attempts to define which variables determine airspace complexity. To do so, a novel methodology based on the use of machine learning models is used. In this way, it tries to overcome one of the main disadvantages of the current complexity models: the subjectivity of the models based on expert opinion. This study has determined that the main indicator that defines complexity is the number of aircraft in the sector, together with the occupancy of the traffic flows and the vertical distribution of aircraft. This research can help numerous studies on both air traffic complexity assessment and Air Traffic Controller (ATCO) workload studies. This model can also help to study the behaviour of air traffic and to verify that there is symmetry in structure and the origin of the complexity in the different ATC sectors. This would have a great benefit on ATM, as it would allow progress to be made in solving the existing capacity problem.
Collapse
|
9
|
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction. ACTA INFORMATICA PRAGENSIA 2022. [DOI: 10.18267/j.aip.199] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/14/2022] Open
|
10
|
Toward Efficient Intrusion Detection System Using Hybrid Deep Learning Approach. Symmetry (Basel) 2022. [DOI: 10.3390/sym14091916] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022] Open
Abstract
The increased adoption of cloud computing resources produces major loopholes in cloud computing for cybersecurity attacks. An intrusion detection system (IDS) is one of the vital defenses against threats and attacks to cloud computing. Current IDSs encounter two challenges, namely, low accuracy and a high false alarm rate. Due to these challenges, additional efforts are required by network experts to respond to abnormal traffic alerts. To improve IDS efficiency in detecting abnormal network traffic, this work develops an IDS using a recurrent neural network based on gated recurrent units (GRUs) and improved long short-term memory (LSTM) through a computing unit to form Cu-LSTMGRU. The proposed system efficiently classifies the network flow instances as benign or malevolent. This system is examined using the most up-to-date dataset CICIDS2018. To further optimize computational complexity, the dataset is optimized through the Pearson correlation feature selection algorithm. The proposed model is evaluated using several metrics. The results show that the proposed model remarkably outperforms benchmarks by up to 12.045%. Therefore, the Cu-LSTMGRU model provides a high level of symmetry between cloud computing security and the detection of intrusions and malicious attacks.
Collapse
|