Convolution Neural Network Machine Learning Algorithm Prediction Model for Intrusion Detection

Authors

  • Prof. Sapna Jain Choudhary  Shri Ram Group of Institutions, Jabalpur, Madhya Pradesh, India
  • Noor Un Nihar  Shri Ram Group of Institutions, Jabalpur, Madhya Pradesh, India

Keywords:

IDS , DL , ML , IDS, SDN, CNN.

Abstract

Software Defined Networking (SDN) is evolving as a brand-new approach to the growth and innovation of the Internet. Since SDN can offer controllable, dynamic, and affordable networking, it is anticipated to be the Internet's ideal future. A rare chance to achieve network security in a more effective and flexible way is presented by the introduction of SDN. Because it has centralised control, SDN has the advantage of better network security provisioning as compared to traditional networks. However, in order to increase SDN security, it is necessary to address a number of additional network security challenges brought about by the SDN architecture's flexibility. The centralised controller, the control-data interface, and the control-application interfaces are the SDN's original structural weaknesses. Intruders may take advantage of these weaknesses.to conduct several types of attacks. A crucial component of network architecture known as the Network Intrusion Detection System (NIDS) is utilised to identify network intrusions and secure the entire network. Using Deep Learning (DL) methods, we suggest an SDN-based NIDS (DeepIDS) in this thesis to look for anomalies in the SDN architecture. First, using various flow features, we assess the capability of DL for flow-based anomaly identification. We demonstrate through studies that the DL technique has the capacity to detect flow-based anomalies in the SDN context. We also suggest a Gated Recurrent Unit Recurrent Neural Network to boost DeepIDS's detection rate. Our experimental findings demonstrate that the suggested model considerably increases the detection rate without degrading network performance. The effectiveness of our system in terms of precision, throughput, latency, and resource utilisation demonstrates that DeepIDS does not negatively impact the OpenFlow controller's performance, making it a workable strategy. Finally, we present an unsupervised method to address the issue of an unlabelled and unbalanced dataset. This method results in a significant reduction in processing time while producing a high detection rate. Through thorough experimental evaluations, we determine that our suggested strategy we conclude that our proposed approach exhibits a strong potential for intrusion detection in the SDN environments.

References

  1. J. Kim, H. Kim, M. Shim, and E. Choi, ‘‘CNN-based network intrusion detection against denial-of-service attacks,’’ Electronics, vol. 9, p. 916, Jun. 2022.
  2. R.PalanikumarandK.Ramasamy,‘‘Softwaredefinednetworkbasedself- diagnosing faulty node detection scheme for surveillance applications,’’ Comput. Commun., vol. 152, pp. 333–337, Feb. 2020.
  3. Y. Goto, B. Ng, W. K. G. Seah, and Y. Takahashi, ‘‘Queueing analysis of software defined network with realistic OpenFlow–based switch model,’’ Comput. Netw., vol. 164, Dec. 2019, Art. no. 106892.
  4. A. Shaghaghi, M. A. Kaafar, R. Buyya, and S. Jha, ‘‘Software-defined network (SDN) data plane security: Issues, solutions, and future direc- tions,’’ in Handbook of Computer Networks and Cyber Security, B. Gupta, G. Perez, D. Agrawal, and D. Gupta, Eds. Cham, Switzerland: Springer, 2020, doi: 10.1007/978-3-030-22277-2_14.
  5. K. Bhushan and B. B. Gupta, ‘‘Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud com- puting environment,’’ J. Ambient Intell. Hum. Comput., vol. 10, no. 5, pp. 1985–1997, May 2019.
  6. defined networks: A survey,’’ IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2317–2346, 4th Quart., 2015.
  7. H. Wang and W. Li, ‘‘DDosTC: A transformer-based network attack detection hybrid mechanism in SDN,’’ Sensors, vol. 21, no. 15, p. 5047, Jul. 2021.
  8. S.BoukriaandM.Guerroumi,‘‘IntrusiondetectionsystemforSDNnet- work using deep learning approach,’’ in Proc. Int. Conf. Theor. Applicative Aspects Comput. Sci. (ICTAACS), Dec. 2019, pp. 1–6.
  9. Q. Niyaz, W. Sun, and A. Y. Javaid, ‘‘A deep learning based DDoS detection system in software-defined networking (SDN),’’ EAI Endorsed Trans. Secur. Saf., vol. 4, no. 12, p. e2, 2016.
  10. T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, ‘‘Deep learning approach for network intrusion detection in software defined networking,’’ in Proc. Int. Conf. Wireless Netw. Mobile Commun. (WINCOM), Oct. 2016, pp. 258–263.
  11. S. K. Dey and M. M. Rahman, ‘‘Flow based anomaly detection in soft- ware defined networking: A deep learning approach with feature selection method,’’ in Proc. 4th Int. Conf. Electr. Eng. Inf. Commun. Technol. (iCEE- iCT), Sep. 2018, pp. 630–635.
  12. T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, ‘‘Deep recurrent neural network for intrusion detection in SDN-based networks,’’ in Proc. 4th IEEE Conf. Netw. Softwarization Workshops (Net- Soft), Jun. 2018, pp. 202–206.
  13. J. Li, Z. Zhao, and R. Li, ‘‘Machine learning-based IDS for software- defined 5G network,’’ IET Netw., vol. 7, no. 2, pp. 53–60, Mar. 2017. [14] P. Ding, J. Li, L. Wang, M. Wen, and Y. Guan, ‘‘HYBRID-CNN:
  14. An efficient scheme for abnormal flow detection in the SDN-based smart grid,’’ Secur. Commun. Netw., vol. 2020, pp. 1–20, Aug. 2020.
  15. A.AbubakarandB.Pranggono,‘‘Machinelearningbasedintrusiondetec- tion system for software defined networks,’’ in Proc. 7th Int. Conf. Emerg. Secur. Technol. (EST), Sep. 2017, pp. 138–143.

Downloads

Published

2022-08-30

Issue

Section

Research Articles

How to Cite

[1]
Prof. Sapna Jain Choudhary, Noor Un Nihar "Convolution Neural Network Machine Learning Algorithm Prediction Model for Intrusion Detection" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 9, Issue 4, pp.210-216, July-August-2022.