Research Article
BibTex RIS Cite

Yazılım Tanımlı Ağlarda Makine Öğrenimi ile Anomali Tespiti

Year 2019, , 748 - 756, 31.01.2019
https://doi.org/10.29130/dubited.433825

Abstract

Son yıllarda, bilgisayar ağlarını daha esnek bir hale getirmeyi amaçlayan Yazılım Tanımlı Ağ yaklaşımı ortaya
çıkmıştır. Google’ın iç ağındaki Yazılım tanımlı ağ uygulaması, Yazılım Tanımlı Ağ yaklaşımının kullanışlılığını
ve gelecek vadeden bir teknoloji olacağını kanıtlamasına rağmen güvenlik konusu göz ardı edilemeyecek hayati
bir sorundur. SDN mimarisinde, Veri Düzlemini Kontrol Düzleminden ayrıldığı için saldırganlar artık üç
düzlemden herhangi birinden ağa saldırabilirler. Makine öğrenimi algoritmaları, bilgisayar ağlarına yapılan
saldırıları ve izinsiz girişleri tespit etmede kullanılan yöntemlerdir ve Yazılım Tanımlı Ağlar için de
kullanılabilir. Bu çalışmada, Yazılım Tanımlı Ağlarda makine öğrenme algoritmaları kullanılarak anomali tespiti
için yeni bir test düzeneği geliştirilmiştir. Oluşturulan sistem OpenFlow destekli anahtar cihazından geçen akışları
inceler ve karar ağacı makine öğrenmesi algoritmasını kullanarak anormal durumları tespit etmeye çalışır. Elde
edilen sonuçlar karar ağacı algoritması kullanılarak oluşturulan sistemin DDoS saldırılarına karşı başarılı bir
şekilde çalıştığını göstermiştir.

References

  • [1] Jonathan Crane. (2017, October 09). “Outage Prevention: Taking Humans Out Of The IT Equation,” Forbes, [Online]. Available https://www.forbes.com/sites/ciocentral/2012/10/22/outageprevention-taking-humans-out-of-the-it-equation/#3603b7504dd1.
  • [2] Kathleen Hickey. (2017, October 09). “What’s behind most data center outages? [Online]. Available: https://gcn.com/articles/2016/02/09/data-center-outages.aspx.
  • [3] Press Release. (2017, October 09). “Global Survey: Complexity, Change and Human Factors Cause Network Outages - The Data Center Journal,” 2016 [Online]. Available: http://www.datacenterjournal.com/global-survey-complexity-change-human-factors-cause-networkoutages/.
  • [4] J. Networks Inc. “What’s Behind Network Downtime? Proactive Steps to Reduce Human Error and Improve Availability of Networks” May, 2008.
  • [5] Rachel King. (2017, October 09). “Amazon Web Services Outage Caused by Human Error: A Typo | Fortune,” 2017 [Online]. Available: http://fortune.com/2017/03/02/amazon-cloud-outage/.
  • [6] E. Description, “Cisco Certified Network Associate,” 2016.
  • [7] ONF. (2018, June 13) “Software-Defined Networking (SDN) Definition - Open Networking Foundation.” [Online]. Available: https://www.opennetworking.org/sdn-definition/.
  • [8] ONF. (2018, June 05) “Single Point of Failure. Not. - Open Networking Foundation.” [Online]. Available: https://www.opennetworking.org/news-and-events/blog/single-point-of-failure-not/.
  • [9] E. Banks. (2018, June 05) “SDN FAQ | Network World.” [Online]. Available: https://www.networkworld.com/article/2167706/lan-wan/lan-wan-sdn-faq.html.
  • [10] A. Mestres et al., “Knowledge-Defined Networking,” ACM SIGCOMM Computer Communication Review, vol. 47, no. 3, 2017.
  • [11] Y. L. Chen, (2018, June 05) “OpenDaylight Summit 2016: OpenDaylight Machine Learning & Artifici...” [Online]. Available: https://opendaylightsummit2016.sched.com/event/80Nz.
  • [12] R. Braga, E. Mota, and A. Passito, “Lightweight DDoS Flooding Attack Detection Using NOX / OpenFlow Network-Based Mechanisms Using SDN Network-Based Mechanisms Using SDN,” pp. 408–415, 2018.
  • [13] L. Dongsoo, “Improving Detection Capability of Flow-based IDS in SDN,” M.S. thesis, Department of Computer Science, KAIST University, Daejeon, South Korea, 2015.
  • [14] SDxCentral, (2018, June 02) “What are SDN Southbound APIs? - Where they are used.” [Online]. Available: https://www.sdxcentral.com/sdn/definitions/southbound-interface-api/.
  • [15] M. H. Bhuyan, D. K. Bhattacharyya and J. K. Kalita, "Network Anomaly Detection: Methods, Systems and Tools," in IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 303-336, First Quarter 2014.
  • [16] Bob Lantz, (2018, June 01) “Mininet.” [Online]. Available: http://mininet.org/download/.

Anomaly Detection in Software-Defined Networking Using Machine Learning

Year 2019, , 748 - 756, 31.01.2019
https://doi.org/10.29130/dubited.433825

Abstract

In recent years, the Software-Defined Networking (SDN) approach has emerged that aims to make computer
networks more flexible. Although the SDN application on Google's internal network demonstrates the usefulness
of the Software-Defined Network approach and the promise of future technology, security is a vital concern that
cannot be ignored. In the SDN architecture, the attacker can now attack the network from any of the three planes
because the Data Plane is separated from the Control Plane. Machine learning algorithms are methods used to
detect attacks and intrusions on computer networks and can also be used for SDN. In this study, a new testbed has
been implemented for anomaly detection using machine learning algorithms in SDN. The developed system
analyzes flows passing through the OpenFlow supported switch and tries to detect abnormal situations using the
decision tree machine learning algorithm. The results show that the system constructed using the decision tree
algorithm works successfully against Distributed Denial of Service (DDoS) attacks.

References

  • [1] Jonathan Crane. (2017, October 09). “Outage Prevention: Taking Humans Out Of The IT Equation,” Forbes, [Online]. Available https://www.forbes.com/sites/ciocentral/2012/10/22/outageprevention-taking-humans-out-of-the-it-equation/#3603b7504dd1.
  • [2] Kathleen Hickey. (2017, October 09). “What’s behind most data center outages? [Online]. Available: https://gcn.com/articles/2016/02/09/data-center-outages.aspx.
  • [3] Press Release. (2017, October 09). “Global Survey: Complexity, Change and Human Factors Cause Network Outages - The Data Center Journal,” 2016 [Online]. Available: http://www.datacenterjournal.com/global-survey-complexity-change-human-factors-cause-networkoutages/.
  • [4] J. Networks Inc. “What’s Behind Network Downtime? Proactive Steps to Reduce Human Error and Improve Availability of Networks” May, 2008.
  • [5] Rachel King. (2017, October 09). “Amazon Web Services Outage Caused by Human Error: A Typo | Fortune,” 2017 [Online]. Available: http://fortune.com/2017/03/02/amazon-cloud-outage/.
  • [6] E. Description, “Cisco Certified Network Associate,” 2016.
  • [7] ONF. (2018, June 13) “Software-Defined Networking (SDN) Definition - Open Networking Foundation.” [Online]. Available: https://www.opennetworking.org/sdn-definition/.
  • [8] ONF. (2018, June 05) “Single Point of Failure. Not. - Open Networking Foundation.” [Online]. Available: https://www.opennetworking.org/news-and-events/blog/single-point-of-failure-not/.
  • [9] E. Banks. (2018, June 05) “SDN FAQ | Network World.” [Online]. Available: https://www.networkworld.com/article/2167706/lan-wan/lan-wan-sdn-faq.html.
  • [10] A. Mestres et al., “Knowledge-Defined Networking,” ACM SIGCOMM Computer Communication Review, vol. 47, no. 3, 2017.
  • [11] Y. L. Chen, (2018, June 05) “OpenDaylight Summit 2016: OpenDaylight Machine Learning & Artifici...” [Online]. Available: https://opendaylightsummit2016.sched.com/event/80Nz.
  • [12] R. Braga, E. Mota, and A. Passito, “Lightweight DDoS Flooding Attack Detection Using NOX / OpenFlow Network-Based Mechanisms Using SDN Network-Based Mechanisms Using SDN,” pp. 408–415, 2018.
  • [13] L. Dongsoo, “Improving Detection Capability of Flow-based IDS in SDN,” M.S. thesis, Department of Computer Science, KAIST University, Daejeon, South Korea, 2015.
  • [14] SDxCentral, (2018, June 02) “What are SDN Southbound APIs? - Where they are used.” [Online]. Available: https://www.sdxcentral.com/sdn/definitions/southbound-interface-api/.
  • [15] M. H. Bhuyan, D. K. Bhattacharyya and J. K. Kalita, "Network Anomaly Detection: Methods, Systems and Tools," in IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 303-336, First Quarter 2014.
  • [16] Bob Lantz, (2018, June 01) “Mininet.” [Online]. Available: http://mininet.org/download/.
There are 16 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Articles
Authors

Soumaine Bouba Mahamat

Celal Çeken

Publication Date January 31, 2019
Published in Issue Year 2019

Cite

APA Bouba Mahamat, S., & Çeken, C. (2019). Anomaly Detection in Software-Defined Networking Using Machine Learning. Duzce University Journal of Science and Technology, 7(1), 748-756. https://doi.org/10.29130/dubited.433825
AMA Bouba Mahamat S, Çeken C. Anomaly Detection in Software-Defined Networking Using Machine Learning. DÜBİTED. January 2019;7(1):748-756. doi:10.29130/dubited.433825
Chicago Bouba Mahamat, Soumaine, and Celal Çeken. “Anomaly Detection in Software-Defined Networking Using Machine Learning”. Duzce University Journal of Science and Technology 7, no. 1 (January 2019): 748-56. https://doi.org/10.29130/dubited.433825.
EndNote Bouba Mahamat S, Çeken C (January 1, 2019) Anomaly Detection in Software-Defined Networking Using Machine Learning. Duzce University Journal of Science and Technology 7 1 748–756.
IEEE S. Bouba Mahamat and C. Çeken, “Anomaly Detection in Software-Defined Networking Using Machine Learning”, DÜBİTED, vol. 7, no. 1, pp. 748–756, 2019, doi: 10.29130/dubited.433825.
ISNAD Bouba Mahamat, Soumaine - Çeken, Celal. “Anomaly Detection in Software-Defined Networking Using Machine Learning”. Duzce University Journal of Science and Technology 7/1 (January 2019), 748-756. https://doi.org/10.29130/dubited.433825.
JAMA Bouba Mahamat S, Çeken C. Anomaly Detection in Software-Defined Networking Using Machine Learning. DÜBİTED. 2019;7:748–756.
MLA Bouba Mahamat, Soumaine and Celal Çeken. “Anomaly Detection in Software-Defined Networking Using Machine Learning”. Duzce University Journal of Science and Technology, vol. 7, no. 1, 2019, pp. 748-56, doi:10.29130/dubited.433825.
Vancouver Bouba Mahamat S, Çeken C. Anomaly Detection in Software-Defined Networking Using Machine Learning. DÜBİTED. 2019;7(1):748-56.