Analysis of detection systems in a Software-Defined Network
dc.contributor.author | Fakolujo, Oluwapelumi | |
dc.contributor.author | Qureshi, Amna | |
dc.date.accessioned | 2024-08-16T15:56:26Z | |
dc.date.accessioned | 2024-09-02T09:53:17Z | |
dc.date.available | 2024-08-16T15:56:26Z | |
dc.date.available | 2024-09-02T09:53:17Z | |
dc.date.issued | 2023-08 | |
dc.identifier.citation | Fakolujo O and Qureshi A (2023) Analysis of detection systems in a Software-Defined Network. In: Arai, K. (ed.) Intelligent Computing. SAI 2023. Lecture Notes in Networks and Systems. Vol 739. Springer. | en_US |
dc.identifier.isbn | 978-3-031-37962-8 | |
dc.identifier.uri | http://hdl.handle.net/10454/19980 | |
dc.description | Yes | en_US |
dc.description.abstract | Software-Defined Networking (SDN), a novel and innovative networking technology, offers programmability and flexibility within networks and centralized control of those networks. The separation of data and control planes, as well as the concentration of all control provisioning options within a SDN controller, are two of the most significant ways in which SDN improves on traditional network deployments. However, because different planes in an SDN network are separated, the network contains several attack vectors that malicious users could exploit. Distributed Denial-of-Service (DDoS) attacks pose a unique threat to SDN because they can disrupt connections between the controller and data plane devices. Therefore, developing and implementing intrusion detection systems (IDS) in SDN is necessary. This paper investigates IDS in software-defined networks for effectively detecting DDoS attacks using signature-based and machine learning (ML)-based approaches. Mininet and OpenDayLight are used to simulate an SDN environment in which normal and attack traffic is generated to assess intrusion detection techniques. The Snort IDS is employed as the signature-based IDS in this study, while the ML algorithms, Random Forest (RF), J48, Naive Bayes (NB), and Support Vector Machine (SVM) are used to implement the ML-based IDS. The IDS are examined using SDN-generated traffic, with the InSDN-NB model surpassing all other ML models and Snort IDS with 98.86% prediction accuracy and a train time of 1.46s. | en_US |
dc.language | en | |
dc.language.iso | en | en_US |
dc.publisher | Springer | |
dc.subject | Software Defined Network | en_US |
dc.subject | DDoS | en_US |
dc.subject | Intrusion Detection System | en_US |
dc.subject | Machine learning | en_US |
dc.subject | Snort | en_US |
dc.title | Analysis of detection systems in a Software-Defined Network | en_US |
dc.status.refereed | Yes | en_US |
dc.date.Accepted | 2023 | |
dc.date.application | 2023-08-20 | |
dc.type | Book chapter | en_US |
dc.type.version | Accepted manuscript | en_US |
dc.identifier.doi | https://doi.org/10.1007/978-3-031-37963-5_91 | en_US |
dc.rights.license | Unspecified | en_US |
dc.date.updated | 2024-08-16T15:56:27Z | |
refterms.dateFOA | 2024-09-02T09:54:18Z | |
dc.openaccess.status | openAccess | en_US |