Skip to main content
Top
Published in: Neural Computing and Applications 5/2019

03-03-2018 | S.I. : Emerging Intelligent Algorithms for Edge-of-Things Computing

LION IDS: A meta-heuristics approach to detect DDoS attacks against Software-Defined Networks

Authors: D. Arivudainambi, Varun Kumar K.A, S. Sibi Chakkaravarthy

Published in: Neural Computing and Applications | Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Most of the enterprises are transforming their conventional networks into Software-Defined Network (SDN) to avail the cost efficiency and network flexibility. But recent attacks and security breaches against SDNs expose the security weakness of the technology. Distributed Denial of Service (DDoS) is the most common attack launched against various SDN architecture layers. Hence, DDoS has been claimed to be the most dangerous attack and threat to SDN. The existing mitigation techniques are traffic volumetric methods, entropical methods and traffic flow analysis methods. They depend on traffic sampling to achieve truly inline against DDoS detection accuracy in real time. However, traffic sampling-based methods are expensive with chances for incomplete approximation of underlying traffic patterns being very high. Early detection of DDoS attack in the controller is critical and requires highly adaptive and accurate methods. In this paper, an effective and accurate DDoS detection method using Lion optimization algorithm is proposed. The proposed detection technique is robust enough to detect DDoS attack within the least magnitude of attack traffic. Further, to evaluate the performance, the proposed method is compared with the state-of-the-art techniques. The outcome of this paper is current method limitation and scope for improvement depicted from overall study and analysis. The experimental results have proved that the proposed method outperforms the existing state-of-the-art methods with 96% accuracy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference Wang Bo, Jin X, Cheng Bo (2012) Lion pride optimizer: an optimization algorithm inspired by lion pride behavior. Sci China Inf Sci 55(10):2369–2389MathSciNetCrossRefMATH Wang Bo, Jin X, Cheng Bo (2012) Lion pride optimizer: an optimization algorithm inspired by lion pride behavior. Sci China Inf Sci 55(10):2369–2389MathSciNetCrossRefMATH
5.
go back to reference Yazdani Maziar, Jolai F (2016) Lion optimization algorithm (LOA): a nature-inspired metaheuristic algorithm. J Comput Des Eng 3(1):24–36 Yazdani Maziar, Jolai F (2016) Lion optimization algorithm (LOA): a nature-inspired metaheuristic algorithm. J Comput Des Eng 3(1):24–36
7.
go back to reference Jakaria AHM, Rashidi B, Rahman MA, Fung C, Yang W (2017) Dynamic DDoS defense resource allocation using network function virtualization. In: SDN-NFV Sec’17, Mar 22–24, 2017, ACM, Scottsdale, AZ, USA Jakaria AHM, Rashidi B, Rahman MA, Fung C, Yang W (2017) Dynamic DDoS defense resource allocation using network function virtualization. In: SDN-NFV Sec’17, Mar 22–24, 2017, ACM, Scottsdale, AZ, USA
8.
go back to reference Chen H-H, Huang S-K (2016) LDDoS attack detection by using Ant colony optimization. J Inf Sci Eng 32(4):995–1020 Chen H-H, Huang S-K (2016) LDDoS attack detection by using Ant colony optimization. J Inf Sci Eng 32(4):995–1020
10.
go back to reference Chan YTF, Shoniregun CA, Akmayeva GA (2008) A novel approach in securing DDoS attack. In: Proceedings of the 5th international conference on soft computing as transdisciplinary science and technology, pp 59–64 Chan YTF, Shoniregun CA, Akmayeva GA (2008) A novel approach in securing DDoS attack. In: Proceedings of the 5th international conference on soft computing as transdisciplinary science and technology, pp 59–64
11.
go back to reference Zhang P, Wang H, Hu C, Lin C (2016) On denial of service attacks in Software Defined Networks. IEEE Network 30(6):28–33CrossRef Zhang P, Wang H, Hu C, Lin C (2016) On denial of service attacks in Software Defined Networks. IEEE Network 30(6):28–33CrossRef
16.
go back to reference Mirkovic J, Reiher P (2004) A taxonomy of DDoS attack and DDoS defense mechanisms. In: ACM SIGCOMM computer communications, vol 34(2) Mirkovic J, Reiher P (2004) A taxonomy of DDoS attack and DDoS defense mechanisms. In: ACM SIGCOMM computer communications, vol 34(2)
17.
go back to reference Schuchard M, Mohaisen A, Foo Kune D, Hopper N, Kim Y, Vasserman EY (2010) Losing control of the internet: using the data plane to attack the control plane. In: CCS’10, 2010, Chicago, IL, USA. ACM 978-1-4503-0244-9/10/10 Schuchard M, Mohaisen A, Foo Kune D, Hopper N, Kim Y, Vasserman EY (2010) Losing control of the internet: using the data plane to attack the control plane. In: CCS’10, 2010, Chicago, IL, USA. ACM 978-1-4503-0244-9/10/10
18.
go back to reference Mehmood T, Rais HBM (2015) SVM For network anomaly detection using ACO feature subset. In: 2015 International symposium on mathematical sciences and computing research (iSMSC). 978-1-4799-7896-0/15 Mehmood T, Rais HBM (2015) SVM For network anomaly detection using ACO feature subset. In: 2015 International symposium on mathematical sciences and computing research (iSMSC). 978-1-4799-7896-0/15
22.
go back to reference SanieeAbadeh M, Habibi J, Lucas C (2007) Intrusion detection using a fuzzy genetics-based learning algorithm. J Netw Comput Appl 30(1):414–428CrossRef SanieeAbadeh M, Habibi J, Lucas C (2007) Intrusion detection using a fuzzy genetics-based learning algorithm. J Netw Comput Appl 30(1):414–428CrossRef
Metadata
Title
LION IDS: A meta-heuristics approach to detect DDoS attacks against Software-Defined Networks
Authors
D. Arivudainambi
Varun Kumar K.A
S. Sibi Chakkaravarthy
Publication date
03-03-2018
Publisher
Springer London
Published in
Neural Computing and Applications / Issue 5/2019
Print ISSN: 0941-0643
Electronic ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-018-3383-7

Other articles of this Issue 5/2019

Neural Computing and Applications 5/2019 Go to the issue

S.I. : Emerging Intelligent Algorithms for Edge-of-Things Computing

A new and efficient firefly algorithm for numerical optimization problems

S.I. : Emerging Intelligent Algorithms for Edge-of-Things Computing

EoT-driven hybrid ambient assisted living framework with naïve Bayes–firefly algorithm

S.I. : Emerging Intelligent Algorithms for Edge-of-Things Computing

Tuberculosis (TB) detection system using deep neural networks

Premium Partner