Araştırma Makalesi
BibTex RIS Kaynak Göster

A NEW SOFTWARE DEFINED NETWORKS (SDN) IN IOTS BASED DEEP LEARNING TECHNIQUES

Yıl 2023, Cilt: 7 Sayı: 2, 165 - 185, 31.12.2023
https://doi.org/10.53600/ajesa.1254542

Öz

In this study, a new software defined networks (SDN) in IoTs based on deep learning techniques was implemented using various types of classifiers such as DNN, CNN, GRU, LSTM RNN and SDN Ryu controller. The system was able to handle high-dimensional and complex data by using NSL-KDD dataset, and was able to detect unknown intrusions that traditional methods may miss. The effectiveness of the proposed model was evaluated by accuracy, precision, recall, F-score, and confusion matrix. Python 3.10 has been used to implementation our system. The proposed system was able to achieve good performance, however, the system's efficacy will be determined by the kind of the data feed and the scale of the issue that is attemped to address. This study highlights the potential of DL-based NIDS with SDN and IoT to detect network intrusions, but also highlights the need for continuous monitoring and updating to ensure that the system remains effective.

Kaynakça

  • Ambika, N. (2021). A Reliable IDS System Using Blockchain for SDN-Enabled IIoT Systems. In IoT Protocols and Applications for Improving Industry, Environment, and Society (pp. 173-194). IGI Global.
  • Saritha, A., Ramasubba Reddy, B., & Suresh Babu, A. (2022). A Hybrid SDN Architecture for IDS Using Bio-Inspired Optimization Techniques. Journal of Interconnection Networks, 22(Supp01), 2141028.
  • Hendrawan, H., Sukarno, P., & Nugroho, M. A. (2019, July). Quality of service (qos) comparison analysis of snort ids and bro ids application in software define network (sdn) architecture. In 2019 7th International Conference on Information and Communication Technology (ICoICT) (pp. 1-7). IEEE.
  • Li, H., Wei, F., & Hu, H. (2019, March). Enabling dynamic network access control with anomaly-based IDS and SDN. In Proceedings of the ACM international workshop on security in software defined networks & network function virtualization (pp. 13-16).
  • Varghese, J. E., & Muniyal, B. (2021). An Efficient IDS framework for DDoS attacks in SDN environment. IEEE Access, 9, 69680-69699.
  • Ong, L. Y. (2014). OpenFlow/SDN and optical networks. Network Innovation Through OpenFlow and SDN: Principles and Design.
  • Raj, P., Raman, A., Raj, P., & Raman, A. (2018). Software-defined network (SDN) for network virtualization. Software-Defined Cloud Centers: Operational and Management Technologies and Tools, 65-89.
  • Sutton, R., Ludwiniak, R., Pitropakis, N., Chrysoulas, C., & Dagiuklas, T. (2021, April). Towards an SDN assisted IDS. In 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS) (pp. 1-5). IEEE.
  • Zwane, S., Tarwireyi, P., & Adigun, M. (2019, November). A Flow-based IDS for SDN-enabled Tactical Networks. In 2019 International Multidisciplinary Information Technology and Engineering Conference (IMITEC) (pp. 1-6). IEEE.
  • Usman, S., Winarno, I., & Sudarsono, A. (2020, September). Implementation of SDN-based IDS to protect Virtualization Server against HTTP DoS attacks. In 2020 International Electronics Symposium (IES) (pp. 195-198). IEEE.
  • Alhowaide, A., Alsmadi, I., & Tang, J. (2021). Ensemble detection model for IoT IDS. Internet of Things, 16, 100435.
  • Panigrahi, A., Sahu, B., & Mohanty, S. N. (2022). A Survey on Opportunity and Challenges of IDS Over IoT. In Real-Life Applications of the Internet of Things: Challenges, Applications, and Advances (pp. 55-83). CRC Press.
  • Romeo, M. D., Rahman, N. A. A., & Yusof, Y. (2019). Intrusion Detection System (IDS) in Internet of Things (IoT) Devices for Smart Home. International Journal of Psychosocial Rehabilitation, 23(4).
  • Doshi, R., Apthorpe, N., & Feamster, N. (2018, May). Machine learning ddos detection for consumer internet of things devices. In 2018 IEEE Security and Privacy Workshops (SPW) (pp. 29-35). IEEE.
  • Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761-768.
  • Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P. L., Iorkyase, E., Tachtatzis, C., & Atkinson, R. (2016, May). Threat analysis of IoT networks using artificial neural network intrusion detection system. In 2016 International Symposium on Networks, Computers and Communications (ISNCC) (pp. 1-6). IEEE.
  • Pajouh, H. H., Javidan, R., Khayami, R., Dehghantanha, A., & Choo, K. K. R. (2016). A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Transactions on Emerging Topics in Computing, 7(2), 314-323.
  • Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018). N-baiot—network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing, 17(3), 12-22.
  • Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2), 1153-1176.
  • Khodjaeva, M., Obaidat, M., & Salane, D. (2019). Mitigating Threats and Vulnerabilities of RFID in IoT Through Outsourcing Computations for Public Key Cryptography. Security, Privacy and Trust in the IoT Environment, 39-60.
  • Wrona, K., Amanowicz, M., Szwaczyk, S., & Gierłowski, K. (2017, May). SDN testbed for validation of cross-layer data-centric security policies. In 2017 International Conference on Military Communications and Information Systems (ICMCIS) (pp. 1-6). IEEE.
  • Shin, I., Choi, Y., Kwon, T., Lee, H., & Song, J. (2019, August). Platform design and implementation for flexible data processing and building ML models of IDS alerts. In 2019 14th Asia Joint Conference on Information Security (AsiaJCIS) (pp. 64-71). IEEE.
  • Nam, K., & Kim, K. (2018, October). A study on sdn security enhancement using open source ids/ips suricata. In 2018 International Conference on Information and Communication Technology Convergence (ICTC) (pp. 1124-1126). IEEE.
  • Parkar, P., & Bilimoria, A. (2021, May). A survey on cyber security IDS using ML methods. In 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 352-360). IEEE.
  • Kiran, U. (2022, January). IDS to detect worst parent selection attack in RPL-based IoT network. In 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS) (pp. 769-773). IEEE.
  • Tang, T. A., McLernon, D., Mhamdi, L., Zaidi, S. A. R., & Ghogho, M. (2019). Intrusion detection in sdn-based networks: Deep recurrent neural network approach. Deep Learning Applications for Cyber Security, 175-195.
  • Alshahrani, A., & Clark, J. A. (2022, October). Transfer Learning Approach to Discover IDS Configurations Using Deep Neural Networks. In 2022 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI) (pp. 1-8). IEEE.
  • Boné, R., & Cardot, H. (2011). Advanced Methods for Time Series Prediction Using Recurrent Neural Networks. Recurrent Neural Networks for Temporal Data Processing, 15-36.
  • Wrona, K., Amanowicz, M., Szwaczyk, S., & Gierłowski, K. (2017, May). SDN testbed for validation of cross-layer data-centric security policies. In 2017 International Conference on Military Communications and Information Systems (ICMCIS) (pp. 1-6). IEEE.
  • Salem, F. M., & Salem, F. M. (2022). Gated RNN: The Gated Recurrent Unit (GRU) RNN. Recurrent Neural Networks: From Simple to Gated Architectures, 85-100.
  • Dai, J. (2021). Predicting machine’s performance data using the stacked long short-term memory (LSTM) neural networks.
  • Meena, G., & Choudhary, R. R. (2017, July). A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA. In 2017 International Conference on Computer, Communications and Electronics (Comptelix) (pp. 553-558). IEEE.
  • Rahim, R., Ahanger, A. S., Khan, S. M., & Ma, F. (2022). Analysis of IDS using feature selection approach on NSL-KDD dataset.
  • Sharma, S., Gigras, Y., Chhikara, R., & Dhull, A. (2019). Analysis of NSL KDD dataset using classification algorithms for intrusion detection system. Recent Patents on Engineering, 13(2), 142-147.
  • Fong, J. S., Wong Ting Yan, K., Fong, J. S., & Wong Ting Yan, K. (2021). Information Systems Reengineering, Integration, and Normalization (pp. 1-28). Springer International Publishing.
  • Chen, B., & Ji, P. (2012). Numericalization of the self adaptive spectral rotation method for coding region prediction. Journal of Theoretical Biology, 296, 95-102.
  • Shou, Z., & Li, S. (2018). Large dataset summarization with automatic parameter optimization and parallel processing for local outlier detection. Concurrency and Computation: Practice and Experience, 30(23), e4466.
  • Wuisan, J. A., Jacobus, A., & Sompie, S. (2022). Data Balancing Methods on Radiographic Image Classification on Unbalance Dataset. Jurnal Teknik Elektro dan Komputer, 11(1), 1-8.
Yıl 2023, Cilt: 7 Sayı: 2, 165 - 185, 31.12.2023
https://doi.org/10.53600/ajesa.1254542

Öz

Kaynakça

  • Ambika, N. (2021). A Reliable IDS System Using Blockchain for SDN-Enabled IIoT Systems. In IoT Protocols and Applications for Improving Industry, Environment, and Society (pp. 173-194). IGI Global.
  • Saritha, A., Ramasubba Reddy, B., & Suresh Babu, A. (2022). A Hybrid SDN Architecture for IDS Using Bio-Inspired Optimization Techniques. Journal of Interconnection Networks, 22(Supp01), 2141028.
  • Hendrawan, H., Sukarno, P., & Nugroho, M. A. (2019, July). Quality of service (qos) comparison analysis of snort ids and bro ids application in software define network (sdn) architecture. In 2019 7th International Conference on Information and Communication Technology (ICoICT) (pp. 1-7). IEEE.
  • Li, H., Wei, F., & Hu, H. (2019, March). Enabling dynamic network access control with anomaly-based IDS and SDN. In Proceedings of the ACM international workshop on security in software defined networks & network function virtualization (pp. 13-16).
  • Varghese, J. E., & Muniyal, B. (2021). An Efficient IDS framework for DDoS attacks in SDN environment. IEEE Access, 9, 69680-69699.
  • Ong, L. Y. (2014). OpenFlow/SDN and optical networks. Network Innovation Through OpenFlow and SDN: Principles and Design.
  • Raj, P., Raman, A., Raj, P., & Raman, A. (2018). Software-defined network (SDN) for network virtualization. Software-Defined Cloud Centers: Operational and Management Technologies and Tools, 65-89.
  • Sutton, R., Ludwiniak, R., Pitropakis, N., Chrysoulas, C., & Dagiuklas, T. (2021, April). Towards an SDN assisted IDS. In 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS) (pp. 1-5). IEEE.
  • Zwane, S., Tarwireyi, P., & Adigun, M. (2019, November). A Flow-based IDS for SDN-enabled Tactical Networks. In 2019 International Multidisciplinary Information Technology and Engineering Conference (IMITEC) (pp. 1-6). IEEE.
  • Usman, S., Winarno, I., & Sudarsono, A. (2020, September). Implementation of SDN-based IDS to protect Virtualization Server against HTTP DoS attacks. In 2020 International Electronics Symposium (IES) (pp. 195-198). IEEE.
  • Alhowaide, A., Alsmadi, I., & Tang, J. (2021). Ensemble detection model for IoT IDS. Internet of Things, 16, 100435.
  • Panigrahi, A., Sahu, B., & Mohanty, S. N. (2022). A Survey on Opportunity and Challenges of IDS Over IoT. In Real-Life Applications of the Internet of Things: Challenges, Applications, and Advances (pp. 55-83). CRC Press.
  • Romeo, M. D., Rahman, N. A. A., & Yusof, Y. (2019). Intrusion Detection System (IDS) in Internet of Things (IoT) Devices for Smart Home. International Journal of Psychosocial Rehabilitation, 23(4).
  • Doshi, R., Apthorpe, N., & Feamster, N. (2018, May). Machine learning ddos detection for consumer internet of things devices. In 2018 IEEE Security and Privacy Workshops (SPW) (pp. 29-35). IEEE.
  • Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761-768.
  • Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P. L., Iorkyase, E., Tachtatzis, C., & Atkinson, R. (2016, May). Threat analysis of IoT networks using artificial neural network intrusion detection system. In 2016 International Symposium on Networks, Computers and Communications (ISNCC) (pp. 1-6). IEEE.
  • Pajouh, H. H., Javidan, R., Khayami, R., Dehghantanha, A., & Choo, K. K. R. (2016). A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Transactions on Emerging Topics in Computing, 7(2), 314-323.
  • Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018). N-baiot—network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing, 17(3), 12-22.
  • Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2), 1153-1176.
  • Khodjaeva, M., Obaidat, M., & Salane, D. (2019). Mitigating Threats and Vulnerabilities of RFID in IoT Through Outsourcing Computations for Public Key Cryptography. Security, Privacy and Trust in the IoT Environment, 39-60.
  • Wrona, K., Amanowicz, M., Szwaczyk, S., & Gierłowski, K. (2017, May). SDN testbed for validation of cross-layer data-centric security policies. In 2017 International Conference on Military Communications and Information Systems (ICMCIS) (pp. 1-6). IEEE.
  • Shin, I., Choi, Y., Kwon, T., Lee, H., & Song, J. (2019, August). Platform design and implementation for flexible data processing and building ML models of IDS alerts. In 2019 14th Asia Joint Conference on Information Security (AsiaJCIS) (pp. 64-71). IEEE.
  • Nam, K., & Kim, K. (2018, October). A study on sdn security enhancement using open source ids/ips suricata. In 2018 International Conference on Information and Communication Technology Convergence (ICTC) (pp. 1124-1126). IEEE.
  • Parkar, P., & Bilimoria, A. (2021, May). A survey on cyber security IDS using ML methods. In 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 352-360). IEEE.
  • Kiran, U. (2022, January). IDS to detect worst parent selection attack in RPL-based IoT network. In 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS) (pp. 769-773). IEEE.
  • Tang, T. A., McLernon, D., Mhamdi, L., Zaidi, S. A. R., & Ghogho, M. (2019). Intrusion detection in sdn-based networks: Deep recurrent neural network approach. Deep Learning Applications for Cyber Security, 175-195.
  • Alshahrani, A., & Clark, J. A. (2022, October). Transfer Learning Approach to Discover IDS Configurations Using Deep Neural Networks. In 2022 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI) (pp. 1-8). IEEE.
  • Boné, R., & Cardot, H. (2011). Advanced Methods for Time Series Prediction Using Recurrent Neural Networks. Recurrent Neural Networks for Temporal Data Processing, 15-36.
  • Wrona, K., Amanowicz, M., Szwaczyk, S., & Gierłowski, K. (2017, May). SDN testbed for validation of cross-layer data-centric security policies. In 2017 International Conference on Military Communications and Information Systems (ICMCIS) (pp. 1-6). IEEE.
  • Salem, F. M., & Salem, F. M. (2022). Gated RNN: The Gated Recurrent Unit (GRU) RNN. Recurrent Neural Networks: From Simple to Gated Architectures, 85-100.
  • Dai, J. (2021). Predicting machine’s performance data using the stacked long short-term memory (LSTM) neural networks.
  • Meena, G., & Choudhary, R. R. (2017, July). A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA. In 2017 International Conference on Computer, Communications and Electronics (Comptelix) (pp. 553-558). IEEE.
  • Rahim, R., Ahanger, A. S., Khan, S. M., & Ma, F. (2022). Analysis of IDS using feature selection approach on NSL-KDD dataset.
  • Sharma, S., Gigras, Y., Chhikara, R., & Dhull, A. (2019). Analysis of NSL KDD dataset using classification algorithms for intrusion detection system. Recent Patents on Engineering, 13(2), 142-147.
  • Fong, J. S., Wong Ting Yan, K., Fong, J. S., & Wong Ting Yan, K. (2021). Information Systems Reengineering, Integration, and Normalization (pp. 1-28). Springer International Publishing.
  • Chen, B., & Ji, P. (2012). Numericalization of the self adaptive spectral rotation method for coding region prediction. Journal of Theoretical Biology, 296, 95-102.
  • Shou, Z., & Li, S. (2018). Large dataset summarization with automatic parameter optimization and parallel processing for local outlier detection. Concurrency and Computation: Practice and Experience, 30(23), e4466.
  • Wuisan, J. A., Jacobus, A., & Sompie, S. (2022). Data Balancing Methods on Radiographic Image Classification on Unbalance Dataset. Jurnal Teknik Elektro dan Komputer, 11(1), 1-8.
Toplam 38 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Yapay Zeka, Bilgisayar Yazılımı, Elektrik Mühendisliği
Bölüm Araştırma Makalesi
Yazarlar

Hasan Hüseyin Balık 0000-0003-3022-100X

Osamah Al-hwaıdı 0000-0001-7962-4366

Yayımlanma Tarihi 31 Aralık 2023
Gönderilme Tarihi 22 Şubat 2023
Kabul Tarihi 11 Mayıs 2023
Yayımlandığı Sayı Yıl 2023 Cilt: 7 Sayı: 2

Kaynak Göster

APA Balık, H. H., & Al-hwaıdı, O. (2023). A NEW SOFTWARE DEFINED NETWORKS (SDN) IN IOTS BASED DEEP LEARNING TECHNIQUES. AURUM Journal of Engineering Systems and Architecture, 7(2), 165-185. https://doi.org/10.53600/ajesa.1254542