Show simple item record

dc.contributor.authorFakolujo, Oluwapelumi
dc.contributor.authorQureshi, Amna
dc.date.accessioned2024-08-16T15:56:26Z
dc.date.accessioned2024-09-02T09:53:17Z
dc.date.available2024-08-16T15:56:26Z
dc.date.available2024-09-02T09:53:17Z
dc.date.issued2023-08
dc.identifier.citationFakolujo O and Qureshi A (2023) Analysis of detection systems in a Software-Defined Network. In: Arai, K. (ed.) Intelligent Computing. SAI 2023. Lecture Notes in Networks and Systems. Vol 739. Springer.en_US
dc.identifier.isbn978-3-031-37962-8
dc.identifier.urihttp://hdl.handle.net/10454/19980
dc.descriptionYesen_US
dc.description.abstractSoftware-Defined Networking (SDN), a novel and innovative networking technology, offers programmability and flexibility within networks and centralized control of those networks. The separation of data and control planes, as well as the concentration of all control provisioning options within a SDN controller, are two of the most significant ways in which SDN improves on traditional network deployments. However, because different planes in an SDN network are separated, the network contains several attack vectors that malicious users could exploit. Distributed Denial-of-Service (DDoS) attacks pose a unique threat to SDN because they can disrupt connections between the controller and data plane devices. Therefore, developing and implementing intrusion detection systems (IDS) in SDN is necessary. This paper investigates IDS in software-defined networks for effectively detecting DDoS attacks using signature-based and machine learning (ML)-based approaches. Mininet and OpenDayLight are used to simulate an SDN environment in which normal and attack traffic is generated to assess intrusion detection techniques. The Snort IDS is employed as the signature-based IDS in this study, while the ML algorithms, Random Forest (RF), J48, Naive Bayes (NB), and Support Vector Machine (SVM) are used to implement the ML-based IDS. The IDS are examined using SDN-generated traffic, with the InSDN-NB model surpassing all other ML models and Snort IDS with 98.86% prediction accuracy and a train time of 1.46s.en_US
dc.languageen
dc.language.isoenen_US
dc.publisherSpringer
dc.subjectSoftware Defined Networken_US
dc.subjectDDoSen_US
dc.subjectIntrusion Detection Systemen_US
dc.subjectMachine learningen_US
dc.subjectSnorten_US
dc.titleAnalysis of detection systems in a Software-Defined Networken_US
dc.status.refereedYesen_US
dc.date.Accepted2023
dc.date.application2023-08-20
dc.typeBook chapteren_US
dc.type.versionAccepted manuscripten_US
dc.identifier.doihttps://doi.org/10.1007/978-3-031-37963-5_91en_US
dc.rights.licenseUnspecifieden_US
dc.date.updated2024-08-16T15:56:27Z
refterms.dateFOA2024-09-02T09:54:18Z
dc.openaccess.statusopenAccessen_US


Item file(s)

Thumbnail
Name:
Fakolujo_&_Qureshi_2023.pdf
Size:
1.012Mb
Format:
PDF
Thumbnail
Name:
978-3-031-37963-5_91.pdf
Size:
2.526Mb
Format:
PDF
Description:
To keep suppressed - published ...

This item appears in the following Collection(s)

Show simple item record