Skip to main content
Top

2022 | OriginalPaper | Chapter

Supervised Machine Learning Algorithms Based on Classification for Detection of Distributed Denial of Service Attacks in SDN-Enabled Cloud Computing

Authors : Anupama Mishra, Neena Gupta

Published in: Cyber Security, Privacy and Networking

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Software-defined network (SDN) is a networking technology that separates the data and control planes and enables centralized network control. This technique encapsulates lower-level functionality, allowing network managers to configure, manage, and regulate network behavior. While centralized monitoring is an important benefit of SDN  , it can also be a serious security risk. The attacker gains access to the entire system if he successfully penetrates the central controller. Therefore, integration of SDN with the cloud itself provides insecurity to the cloud consumers. To skillfully implement DDoS over the controller, an attacker must gain access to multiple systems to launch multiple DDoS attacks. These DDoS attacks will deplete the controller’s resources, causing its services to be unavailable. In order to detect controller attacks early on, it is critical to expand the coverage of the network. There are many existing techniques. However, relatively little research has been done in the area of SDN. A number of solutions fall under this category, including the use of machine learning algorithms for the task of classifying connections as either valid or invalid. To detect suspicious traffics and connections, we employ classification supervised machine learning algorithms, the Naive Bayes and support vector machine (SVM), which also achieved a promising result in order to verify the proposed work.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hussein A, Chadad L, Adalian N, Chehab A, Elhajj IH, Kayssi A (2020) Software-defined networking (SDN): the security review. J Cyber Secur Technol 4(1):1–66CrossRef Hussein A, Chadad L, Adalian N, Chehab A, Elhajj IH, Kayssi A (2020) Software-defined networking (SDN): the security review. J Cyber Secur Technol 4(1):1–66CrossRef
2.
go back to reference Mishra A, Gupta N, Gupta BB (2020) Security threats and recent countermeasures in cloud computing. In: Modern principles, practices, and algorithms for cloud security. IGI Global, pp 145–161 Mishra A, Gupta N, Gupta BB (2020) Security threats and recent countermeasures in cloud computing. In: Modern principles, practices, and algorithms for cloud security. IGI Global, pp 145–161
3.
go back to reference Hou J, Fu P, Cao Z, Xu A (2018) Machine learning based DDos detection through NetFlow analysis. In: MILCOM 2018–2018 IEEE military communications conference (MILCOM), Los Angeles, pp 1–6 Hou J, Fu P, Cao Z, Xu A (2018) Machine learning based DDos detection through NetFlow analysis. In: MILCOM 2018–2018 IEEE military communications conference (MILCOM), Los Angeles, pp 1–6
4.
go back to reference Rahman O, Quraishi MAG, Lung C (2019) DDoS attacks detection and mitigation in SDN using machine learning. IEEE world congress on services (SERVICES). Milan, Italy 2019, pp 184–189 Rahman O, Quraishi MAG, Lung C (2019) DDoS attacks detection and mitigation in SDN using machine learning. IEEE world congress on services (SERVICES). Milan, Italy 2019, pp 184–189
5.
go back to reference Pise N, Kulkarni P (2016) Algorithm selection for classification problems. SAI computing conference (SAI). London 2016, pp 203–211 Pise N, Kulkarni P (2016) Algorithm selection for classification problems. SAI computing conference (SAI). London 2016, pp 203–211
6.
go back to reference Al-Sharif ZA et al (2020) Live forensics of software attacks on cyberphysical systems. Future Gener Comput Syst 108:1217–1229 Al-Sharif ZA et al (2020) Live forensics of software attacks on cyberphysical systems. Future Gener Comput Syst 108:1217–1229
7.
go back to reference Zhang Z, Sun R, Zhao C, Wang J, Chang CK, Gupta BB (2017) CyVOD: a novel trinity multimedia social network scheme. Multim Tools Appl 76(18):18513–18529CrossRef Zhang Z, Sun R, Zhao C, Wang J, Chang CK, Gupta BB (2017) CyVOD: a novel trinity multimedia social network scheme. Multim Tools Appl 76(18):18513–18529CrossRef
8.
go back to reference Mishra A, Gupta N (2019) Analysis of cloud computing vulnerability against DDoS. In: 2019 International conference on innovative sustainable computational technologies (CISCT). IEEE, pp 1–6 Mishra A, Gupta N (2019) Analysis of cloud computing vulnerability against DDoS. In: 2019 International conference on innovative sustainable computational technologies (CISCT). IEEE, pp 1–6
9.
go back to reference Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for consumer Internet of Things devices. IEEE security and privacy workshops (SPW). San Francisco, pp 29–35 Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for consumer Internet of Things devices. IEEE security and privacy workshops (SPW). San Francisco, pp 29–35
10.
go back to reference Bhushan K, Gupta BB (2019) Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J Ambient Intell Hum Comput 10(5):1985–1997CrossRef Bhushan K, Gupta BB (2019) Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J Ambient Intell Hum Comput 10(5):1985–1997CrossRef
11.
go back to reference Alsmirat MA et al (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multim Tools Appl 78(3):3649–3688 Alsmirat MA et al (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multim Tools Appl 78(3):3649–3688
12.
go back to reference Al-Qerem A et al (2020) IoT transaction processing through cooperative concurrency control on fogcloud computing environment. Soft Comput 24(8):5695–5711 Al-Qerem A et al (2020) IoT transaction processing through cooperative concurrency control on fogcloud computing environment. Soft Comput 24(8):5695–5711
13.
go back to reference Gupta S, Gupta BB (2015) PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications. In: Proceedings of the 12th ACM international conference on computing frontiers, pp. 1–8 Gupta S, Gupta BB (2015) PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications. In: Proceedings of the 12th ACM international conference on computing frontiers, pp. 1–8
14.
go back to reference Das S, Mahfouz AM, Venugopal D, Shiva S (2019) DDoS intrusion detection through machine learning ensemble. In: 2019 IEEE 19th international conference on software quality, reliability and security companion (QRS-C), Sofia, Bulgaria, 2019, pp 471–477 Das S, Mahfouz AM, Venugopal D, Shiva S (2019) DDoS intrusion detection through machine learning ensemble. In: 2019 IEEE 19th international conference on software quality, reliability and security companion (QRS-C), Sofia, Bulgaria, 2019, pp 471–477
15.
go back to reference Dahiya A, Gupta BB (2020) A reputation score policy and Bayesian game theory based incentivised mechanism for DDoS attacks mitigation and cyber defense. Future Gener Comput Syst Dahiya A, Gupta BB (2020) A reputation score policy and Bayesian game theory based incentivised mechanism for DDoS attacks mitigation and cyber defense. Future Gener Comput Syst
16.
go back to reference Dincalp U, Güzel MS, Sevine O, Bostanci E, Askerzade I (2018) Anomaly based distributed denial of service attack detection and prevention with machine learning. In: 2nd international symposium on multidisciplinary studies and innovative technologies (ISMSIT). Ankara 2018, pp 1–4 Dincalp U, Güzel MS, Sevine O, Bostanci E, Askerzade I (2018) Anomaly based distributed denial of service attack detection and prevention with machine learning. In: 2nd international symposium on multidisciplinary studies and innovative technologies (ISMSIT). Ankara 2018, pp 1–4
17.
go back to reference Khuphiran P, Leelaprute P, Uthayopas P, Ichikawa K, Watanakeesuntorn W (2018) Performance comparison of machine learning models for DDoS attacks detection. In: 22nd International computer science and engineering conference (ICSEC). Chiang Mai, Thailand 2018, pp 1–4 Khuphiran P, Leelaprute P, Uthayopas P, Ichikawa K, Watanakeesuntorn W (2018) Performance comparison of machine learning models for DDoS attacks detection. In: 22nd International computer science and engineering conference (ICSEC). Chiang Mai, Thailand 2018, pp 1–4
18.
go back to reference Dahiya A, Gupta BB (2020) Multi attribute auction based incentivized solution against DDoS attacks. Comput Secur 92:101763 Dahiya A, Gupta BB (2020) Multi attribute auction based incentivized solution against DDoS attacks. Comput Secur 92:101763
Metadata
Title
Supervised Machine Learning Algorithms Based on Classification for Detection of Distributed Denial of Service Attacks in SDN-Enabled Cloud Computing
Authors
Anupama Mishra
Neena Gupta
Copyright Year
2022
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-8664-1_15