Skip to main content
Erschienen in: Neural Computing and Applications 5/2019

03.03.2018 | S.I. : Emerging Intelligent Algorithms for Edge-of-Things Computing

LION IDS: A meta-heuristics approach to detect DDoS attacks against Software-Defined Networks

verfasst von: D. Arivudainambi, Varun Kumar K.A, S. Sibi Chakkaravarthy

Erschienen in: Neural Computing and Applications | Ausgabe 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Most of the enterprises are transforming their conventional networks into Software-Defined Network (SDN) to avail the cost efficiency and network flexibility. But recent attacks and security breaches against SDNs expose the security weakness of the technology. Distributed Denial of Service (DDoS) is the most common attack launched against various SDN architecture layers. Hence, DDoS has been claimed to be the most dangerous attack and threat to SDN. The existing mitigation techniques are traffic volumetric methods, entropical methods and traffic flow analysis methods. They depend on traffic sampling to achieve truly inline against DDoS detection accuracy in real time. However, traffic sampling-based methods are expensive with chances for incomplete approximation of underlying traffic patterns being very high. Early detection of DDoS attack in the controller is critical and requires highly adaptive and accurate methods. In this paper, an effective and accurate DDoS detection method using Lion optimization algorithm is proposed. The proposed detection technique is robust enough to detect DDoS attack within the least magnitude of attack traffic. Further, to evaluate the performance, the proposed method is compared with the state-of-the-art techniques. The outcome of this paper is current method limitation and scope for improvement depicted from overall study and analysis. The experimental results have proved that the proposed method outperforms the existing state-of-the-art methods with 96% accuracy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Wang Bo, Jin X, Cheng Bo (2012) Lion pride optimizer: an optimization algorithm inspired by lion pride behavior. Sci China Inf Sci 55(10):2369–2389MathSciNetCrossRefMATH Wang Bo, Jin X, Cheng Bo (2012) Lion pride optimizer: an optimization algorithm inspired by lion pride behavior. Sci China Inf Sci 55(10):2369–2389MathSciNetCrossRefMATH
5.
Zurück zum Zitat Yazdani Maziar, Jolai F (2016) Lion optimization algorithm (LOA): a nature-inspired metaheuristic algorithm. J Comput Des Eng 3(1):24–36 Yazdani Maziar, Jolai F (2016) Lion optimization algorithm (LOA): a nature-inspired metaheuristic algorithm. J Comput Des Eng 3(1):24–36
7.
Zurück zum Zitat Jakaria AHM, Rashidi B, Rahman MA, Fung C, Yang W (2017) Dynamic DDoS defense resource allocation using network function virtualization. In: SDN-NFV Sec’17, Mar 22–24, 2017, ACM, Scottsdale, AZ, USA Jakaria AHM, Rashidi B, Rahman MA, Fung C, Yang W (2017) Dynamic DDoS defense resource allocation using network function virtualization. In: SDN-NFV Sec’17, Mar 22–24, 2017, ACM, Scottsdale, AZ, USA
8.
Zurück zum Zitat Chen H-H, Huang S-K (2016) LDDoS attack detection by using Ant colony optimization. J Inf Sci Eng 32(4):995–1020 Chen H-H, Huang S-K (2016) LDDoS attack detection by using Ant colony optimization. J Inf Sci Eng 32(4):995–1020
10.
Zurück zum Zitat Chan YTF, Shoniregun CA, Akmayeva GA (2008) A novel approach in securing DDoS attack. In: Proceedings of the 5th international conference on soft computing as transdisciplinary science and technology, pp 59–64 Chan YTF, Shoniregun CA, Akmayeva GA (2008) A novel approach in securing DDoS attack. In: Proceedings of the 5th international conference on soft computing as transdisciplinary science and technology, pp 59–64
11.
Zurück zum Zitat Zhang P, Wang H, Hu C, Lin C (2016) On denial of service attacks in Software Defined Networks. IEEE Network 30(6):28–33CrossRef Zhang P, Wang H, Hu C, Lin C (2016) On denial of service attacks in Software Defined Networks. IEEE Network 30(6):28–33CrossRef
16.
Zurück zum Zitat Mirkovic J, Reiher P (2004) A taxonomy of DDoS attack and DDoS defense mechanisms. In: ACM SIGCOMM computer communications, vol 34(2) Mirkovic J, Reiher P (2004) A taxonomy of DDoS attack and DDoS defense mechanisms. In: ACM SIGCOMM computer communications, vol 34(2)
17.
Zurück zum Zitat Schuchard M, Mohaisen A, Foo Kune D, Hopper N, Kim Y, Vasserman EY (2010) Losing control of the internet: using the data plane to attack the control plane. In: CCS’10, 2010, Chicago, IL, USA. ACM 978-1-4503-0244-9/10/10 Schuchard M, Mohaisen A, Foo Kune D, Hopper N, Kim Y, Vasserman EY (2010) Losing control of the internet: using the data plane to attack the control plane. In: CCS’10, 2010, Chicago, IL, USA. ACM 978-1-4503-0244-9/10/10
18.
Zurück zum Zitat Mehmood T, Rais HBM (2015) SVM For network anomaly detection using ACO feature subset. In: 2015 International symposium on mathematical sciences and computing research (iSMSC). 978-1-4799-7896-0/15 Mehmood T, Rais HBM (2015) SVM For network anomaly detection using ACO feature subset. In: 2015 International symposium on mathematical sciences and computing research (iSMSC). 978-1-4799-7896-0/15
22.
Zurück zum Zitat SanieeAbadeh M, Habibi J, Lucas C (2007) Intrusion detection using a fuzzy genetics-based learning algorithm. J Netw Comput Appl 30(1):414–428CrossRef SanieeAbadeh M, Habibi J, Lucas C (2007) Intrusion detection using a fuzzy genetics-based learning algorithm. J Netw Comput Appl 30(1):414–428CrossRef
Metadaten
Titel
LION IDS: A meta-heuristics approach to detect DDoS attacks against Software-Defined Networks
verfasst von
D. Arivudainambi
Varun Kumar K.A
S. Sibi Chakkaravarthy
Publikationsdatum
03.03.2018
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 5/2019
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-018-3383-7

Weitere Artikel der Ausgabe 5/2019

Neural Computing and Applications 5/2019 Zur Ausgabe

S.I.: Emerging Intelligent Algorithms for Edge-of-Things Computing

Fault classification and detection in wind turbine using Cuckoo-optimized support vector machine

S.I. : Emerging Intelligent Algorithms for Edge-of-Things Computing

EoT-driven hybrid ambient assisted living framework with naïve Bayes–firefly algorithm

S.I. : Emerging Intelligent Algorithms for Edge-of-Things Computing

Abnormal event detection with semi-supervised sparse topic model