首页> 外文会议>IEEE International Systems Conference >Anomaly Detection Technique for Intrusion Detection in SDN Environment using Continuous Data Stream Machine Learning Algorithms
【24h】

Anomaly Detection Technique for Intrusion Detection in SDN Environment using Continuous Data Stream Machine Learning Algorithms

机译:使用连续数据流机床学习算法的SDN环境中入侵检测的异常检测技术

获取原文

摘要

Software Defined Networks (SDN) present some security weakness due to the separation between control and data planes. Thus, some operational security mechanisms have been designed to deal with malicious code in SDN. However, most of those approaches require a signature basis and present the inability to anticipate novel malicious activity. Other anomaly based approaches are inefficient due to the possibility of an attacker simulates legitimate traffic, which causes lots of false alarms. Thus, in this paper, we present an anomaly based approaches that uses machine learning algorithms over continuous data stream for intrusion detection in a SDN environment. Our approach is to overcome the main challenges that happen when developing an anomaly based system using machine learning algorithms. For characterising the anomalies, we have analysed a type of DDoS attack classified as infrastructure attack that considers the impact of both bandwidth and resource depletions. This type of attack imposes a high affect to the whole SDN. In fact, there are two types of attacks. The bandwidth depletion attack targets the channel between the switches and the controller through either UDP or HTTP flooding. Another way to exhaust outgoing and ingoing bandwidths is through ICMP flooding. The resource depletion attack attempts to exhaust the flow table of switches through SYN flooding. From experiments, we notice that the solution obtains 97.83% accuracy, 99% recall, 80% precision and 2.3% FPR for 10% DDoS attacks on the normal traffic. These results show the effectiveness of the proposed technique.
机译:由于控制和数据平面之间的分离,软件定义的网络(SDN)呈现了一些安全弱点。因此,一些操作安全机制旨在处理SDN中的恶意代码。然而,大多数方法都需要签名基础并呈现无法预测新的恶意活动。由于攻击者模拟合法流量的可能性,其他基于异常的方法效率低下,这导致了许多误报。因此,在本文中,我们介绍了一种基于异常的方法,该方法使用机器学习算法在SDN环境中用于入侵检测的连续数据流。我们的方法是克服使用机器学习算法开发基于异常系统时发生的主要挑战。为了表征异常,我们已经分析了一种类型的DDOS攻击,分类为基础架构攻击,考虑了带宽和资源耗尽的影响。这种类型的攻击对整个SDN施加了高影响力。事实上,有两种类型的攻击。带宽耗尽攻击通过UDP或HTTP泛洪来定位交换机和控制器之间的频道。通过ICMP洪水来排出出来和摄入带宽的另一种方法。资源耗尽攻击试图通过SYN泛滥排出交换机的流动表。从实验中,我们注意到解决方案的准确度为97.83%,重新召回了97.83%,精度80%,2.3%的FPR在正常流量上的10%DDOS攻击。这些结果表明了所提出的技术的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号