0% found this document useful (0 votes)
61 views10 pages

Survey On SDN Based Network Intrusion Detection System Using Machine

This document summarizes a research article that surveys machine learning and deep learning approaches for software-defined networking (SDN) based network intrusion detection systems (NIDS). It discusses how SDN enables innovative NIDS applications and how machine learning/deep learning can be implemented in SDN controllers to enhance network monitoring and security. The survey reviews works that have integrated anomaly detection algorithms and deep learning in SDN controllers for NIDS. It focuses on depicting SDN as a platform for implementing NIDS with machine/deep learning beyond existing reviews.

Uploaded by

Muthamil0593
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views10 pages

Survey On SDN Based Network Intrusion Detection System Using Machine

This document summarizes a research article that surveys machine learning and deep learning approaches for software-defined networking (SDN) based network intrusion detection systems (NIDS). It discusses how SDN enables innovative NIDS applications and how machine learning/deep learning can be implemented in SDN controllers to enhance network monitoring and security. The survey reviews works that have integrated anomaly detection algorithms and deep learning in SDN controllers for NIDS. It focuses on depicting SDN as a platform for implementing NIDS with machine/deep learning beyond existing reviews.

Uploaded by

Muthamil0593
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/322421793

Survey on SDN based network intrusion detection system using machine


learning approaches

Article in Peer-to-Peer Networking and Applications · March 2019


DOI: 10.1007/s12083-017-0630-0

CITATIONS READS

439 12,070

4 authors, including:

Nasrin Sultana Wei Peng


La Trobe University La Trobe University
3 PUBLICATIONS 440 CITATIONS 26 PUBLICATIONS 838 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Nasrin Sultana on 30 October 2018.

The user has requested enhancement of the downloaded file.


Peer-to-Peer Networking and Applications
https://doi.org/10.1007/s12083-017-0630-0

Survey on SDN based network intrusion detection system using machine


learning approaches
Nasrin Sultana 1 & Naveen Chilamkurti 1 & Wei Peng 2 & Rabei Alhadad 1

Received: 29 July 2017 / Accepted: 26 December 2017


# Springer Science+Business Media, LLC, part of Springer Nature 2018

Abstract
Software Defined Networking Technology (SDN) provides a prospect to effectively detect and monitor network security
problems ascribing to the emergence of the programmable features. Recently, Machine Learning (ML) approaches have been
implemented in the SDN-based Network Intrusion Detection Systems (NIDS) to protect computer networks and to overcome
network security issues. A stream of advanced machine learning approaches – the deep learning technology (DL) commences to
emerge in the SDN context. In this survey, we reviewed various recent works on machine learning (ML) methods that leverage
SDN to implement NIDS. More specifically, we evaluated the techniques of deep learning in developing SDN-based NIDS. In
the meantime, in this survey, we covered tools that can be used to develop NIDS models in SDN environment. This survey is
concluded with a discussion of ongoing challenges in implementing NIDS using ML/DL and future works.

Keywords NIDS . Machine learning . Deep learning . SDN

1 Introduction

Network Intrusion Detection systems (NIDS) have been de- caused by malicious insiders, denial of services and web-
veloped rapidly in academia and industry in response to the based attacks. Organizations can lose their intellectual proper-
increasing cyber-attacks against governments and commercial ty with such malicious software crept into the system which
enterprises globally. The annual cost of cybercrime is contin- may lead to disruptions to a country’s critical national infra-
uously rising [1]. The most devastating cyber crimes are those structure. Organizations deploy a firewall, antivirus software,
and an intrusion detection system (NIDS) to secure computer
systems from unauthorised access [3].
This article is part of the Topical Collection: Special Issue on Software
One of the focused areas to resolve cyber-attacks quickly is
Defined Networking: Trends, Challenges and Prospective Smart
Solutions to detect the attack process early [1] from the network using
Guest Editors: Ahmed E. Kamal, Liangxiu Han, Sohail Jabbar, and Liu NIDS. Network intrusion detection systems (NIDS) are de-
Lu signed to detect malicious activities including virus, worm,
DDoS attacks. The critical success factors for NIDS are ab-
* Naveen Chilamkurti normality detection speed, accuracy and reliability. Machine
[email protected]
learning techniques (ML) is applied to develop NIDS to im-
Nasrin Sultana
prove detection accuracy [5] and low false alarm rate [4]. As
[email protected] an advanced stream of ML, deep learning (DL) approaches
have been adopted in the field of NIDS. The recent develop-
Wei Peng
[email protected] ment focuses on leveraging a new network architecture, name-
ly, the software-defined network (SDN) to implement NIDS
Rabei Alhadad
[email protected]
with machine learning approaches [6].
Software-defined network is an emerging architecture that
1
Department of Computer Science and IT, La Trobe University, decouples network control and forwarding functions so that the
Melbourne, Australia network control can be directly programmable [7]. The segre-
2
Department of Accounting and Business Analytics, La Trobe gation of the control plane from the data plane enables easy
University, Melbourne, Australia network management [2]. This feature of SDN is facilitating
Peer-to-Peer Netw. Appl.

innovative applications, dictating a new networking paradigm abnormalities, which are categorized into statistical methods,
capable of implementing NIDS [9]. Machine learning and deep data-mining methods and machine learning based methods
learning (ML/DL) approaches can be implemented in the SDN [11]. NIDS can be implemented using three detection tech-
controllers to enhance network monitoring and security [6]. niques: the signature based detection and the anomaly based
Several research works have been done to implement detection [33]. A signature based NIDS is limited to detecting
NIDS, with integrated deep learning algorithms using SDN from known malicious threats. A combination of the packet
controller before. In [6], the authors integrated anomaly algo- header and packet content inspection rules are applied to the
rithm in to open flow switches using a controller. They con- detection system from the anomalous traffic flows through
structed a deep neural network to simplify the features of signature specification. Anomaly detection techniques are de-
normal and abnormal traffic. To evaluate their model, they signed to automatically understand attacks which are un-
also implemented deep learning algorithms. In [8], the authors known and unpredictable for signature-based NIDS [11].
proposed an SDN based DDoS detection system comprises of Machine learning methods are one of the examples of anom-
three modules. The three modules are implemented on the top aly based intrusion detection techniques.
of the controller and deep learning approach was used for There are some evaluation criteria to compare the perfor-
feature extractor and traffic classification. In [38], the authors mance of algorithms in NIDS such as accuracy, false negative
proposed a lightweight DDoS flooding attack detection solu- rate (FNR), false positive rate (FPR), time used, memory con-
tion, which uses emulation to build a NOX based network in sumption and kappa statistics [33]. Accuracy, FNR and FPR
SDN using self-organized map (SOM). are often used as evaluation criteria for the NIDS [33]. A
There are many review papers covering ML/DL methods comparison of three detection method based on different per-
in various domains. Little has been done around NIDS based formance criteria for NIDS shown in Table 1.
on SDN. We focus on depicting SDN as a platform for We focused on reviewing the state-of-the-art machine
implementing NIDS with ML/DL approaches beyond the learning algorithms in implementing NIDS in this section.
reach of existing review works.
The remainder of this paper has organized as follows: 2.1 Machine learning in network intrusion detection
Section 2 introduces NIDS followed by a general discussion system
of ML approaches and subsequently ML/DL based NIDS ob-
servation. Section 3 provides an overview of SDN architecture The domain of Machine learning (ML) is dedicated to devel-
and applications. We also review SDN-based NIDS imple- oping systems that can automatically learn from the data [12]
mentation and observation. In Section 4, research challenges and identify hidden patterns without being explicitly pro-
associated with applying to ML/DL to SDN-based NIDS are grammed to do so [10]. ML algorithms is categorized by the
discussed. Section 5 concludes the paper with future works. learning style they employ and by the functional similarity of
how they work [10]. Figure 2 presents an overview of machine
learning approaches based on their learning styles. Machine
2 Network intrusion detection system (NIDS) learning techniques are regarded as efficient methods to im-
and evaluation prove detection rate, reduce false alarm rate, and in the mean-
time, decrease computation and communication cost [13].
An Intrusion Detection System (IDS) is developed in a net- The machine learning approaches can be categorized
work to detect threats from monitoring packets transmitted into supervised, unsupervised learning and semi-
though. IDSs detect anomalous and malicious activities from supervised learning [3].
inside and outside intruders [10]. An IDS need to deal with In supervised learning, the algorithms learn representa-
problems such as vast network traffic volumes and highly tions from labelled input data to predict unknown cases.
uneven data distribution. Examples of supervised machine learning algorithms are sup-
The primary function of an IDS is to monitor information port vector machine (SVM) for classification problems and
sources, such as computers or networks, for unauthorised access random forest for classification and regression problems [12].
activities. IDSs collect data from different systems and network Support vector machine (SVM) algorithms are widely
sources and analyse the data for possible threats [10]. IDSs are used in NIDS research due to its powerful classification
further developed into network intrusion detection systems power and practicality in computation. They are suitable
(NIDS) and host-based intrusion detection systems (HIDS). for high dimensional data, but selecting a reasonable kernel
Figure 1 shows a general overview of IDSs based on the imple- function is critical. It is resource hungry, demanding com-
mented detection techniques and the deployment environment. putational processing units and memory [10]. The Random
As shown in Fig. 1, intrusion detection system can be im- forest algorithm [14] as a powerful ensemble supervised
plemented using different methods and techniques. A number learning approach to deal effectively with uneven data,
of detection mechanisms have been developed to detect however it is subjective to over-fitting.
Peer-to-Peer Netw. Appl.

Fig. 1 Overview of intrusion


detection system

In the unsupervised learning scheme, the algorithms method Spectral Graph Transducer and Gaussian Fields ap-
learn the structure and representations from unlabeled input proach, used to detect unknown attacks and one semi-
data. The goal of an unsupervised learning algorithm is to supervised clustering method MPCK-means used to improve
model the fundamental structure or distribution in the data to the performance of the detection system [21].
predict unknown data [12]. Examples of unsupervised learn- Deep Learning algorithms are a modern update to artifi-
ing algorithms are feature reduction techniques like principal cial neural networks that exploit abundant, affordable compu-
component analysis (PCA) and clustering techniques, for ex- tation [22]. Deep learning permits an algorithm to learn rep-
ample, self-organizing map (SOM). resentation of data with various levels of generalization. These
Principal Component Analysis (PCA) is an algorithm that methods have been applied to visual object recognition, object
is used to significantly speed up unsupervised feature learning detection, detecting network intrusion and many other do-
[32]. Many researchers use PCA for feature selection before mains [23]. A deep learning algorithm can be trained as a
applying classification [15]. The clustering algorithms such as supervised and unsupervised way [12].
K-means and other distance-based learning algorithms are Deep Learning algorithm in a supervised way:
used for anomaly detection. A self-organizing map (SOM) is Convolutional neural network (CNN) [23] is normally trained
an artificial neural network that was used to reduce payload in in a supervised way. CNN is now the benchmark model for the
NIDS [16]. The disadvantage of using clustering algorithms in computer vision purpose. The CNN architecture used to
anomaly detection is that the clustering algorithms are subjec- structure 2D images [24] and a most important acknowledge-
tive to initial conditions, for example centroid and may pro- ment of CNN is face recognition [23].
duce high false positive rate [17].
Semi-supervised learning is a type of supervised learning & Deep Learning algorithm in an unsupervised way: An
that also use unlabeled data for training. The training data con- autoencoder [25] is used to learn a representation
sist of a small amount of labeled data and a large number of (encoding) for a set of data for the purpose of dimension-
unlabeled data. It is suitable for circumstances when large ality reduction. A Deep Belief Network (DBN) [26] can
amounts of labelled data are unavailable, for example, photo learn to reconstruct its inputs when trained with a set of
archives where only some of the images are labelled (e.g. a examples in an unsupervised way. The layers then act as
person) and most of them are unlabeled [18]. The Semi- feature detectors on inputs. After this learning step, a DBN
supervised support vector machine [19], was used to enhance is further trained in a supervised way to perform classifi-
the accuracy of NIDS [20]. Two semi-supervised classification cation. DBNs, such as restricted Boltzmann machines

Table 1 Comparison detection


method [33] Detection technique Alarm Rate Speed Flexibility Reliability Scalability Robustness

Signature Low High Low High Low Low


Anomaly High Low High Moderate High High
Peer-to-Peer Netw. Appl.

Fig. 2 Overview of machine learning approaches

(RBMs) [27] or auto-encoders apply to dimensionality classification accuracy abilities to gather knowledge from
reduction, regression, collaborative filtering, feature learn- training data.
ing and topic modelling, etc.
& Deep Learning algorithm in a supervised or unsupervised ML/DL Approach used for NIDS: In [14], eight tree based
way: Recurrent neural network (RNN) [28] algorithms are classification algorithms are evaluated in predicting net-
considered as a supervised or unsupervised learning meth- work events. The decision tree algorithm is used for fea-
od. RNNs can leverage internal memory to process ran- ture selection and a random forest algorithm is applied as
dom orders of inputs. Speech recognition is a typical ap- a classifier for NSL-KDD dataset. [33] deployed a princi-
plication for RNN [29]. RNN is good at prediction of pal component analysis (PCA) algorithm for feature selec-
character in the text and also can learn dependencies and tion and a support vector machine as a classifier to select
actual evidence which is stored for a long time [23]. the optimum feature subset. [15] implemented flexible
NIDS using self-taught learning on NSL-KDD data for
network intrusion and developed a sparse encoder for fur-
2.2 ML-based NIDS observation ther reduction. They also used soft-max regression as a
classifier and evaluated their model independently on
ML/DL techniques have been used to develop NIDSs, training and test datasets with an accuracy on training
such as Artificial Neural Networks (ANN), Support data 92.48%. Most of the approaches used training data
Vector Machines (SVM), Naive-Bayesian (NB), Random for both training and testing purpose, [15] used separate
Forests (RF), self-organizing map (SOM) etc. [15]. [30] training and testing data for training and testing which
implemented a NIDS based on a restricted Boltzmann provides accuracy of detection techniques. [31],
machine (RBM) for feature reduction and a support vector experimented that if they tested their proposed classifier
machine (SVM) for classification. The accuracy of the in different training data, performance degraded. [14], ex-
system is approximately 87%. [31] developed a network periments showed a random tree model holds the high
anomaly detection system using discriminative RBM in accuracy and low false alarm rate in detection system as
conjunction with generative models with good a classifier.
Peer-to-Peer Netw. Appl.

3 Software-defined networking (SDN) based switches are Juniper, HP etc. and virtual switches such a
NIDS OpenvSwitch.
2) Control Layer: Control layer is also known as the con-
One of the features in the Software-Defined Networking (SDN) trol plane; it consists of a set of software-based SDN
architecture is the separation of control plane to data plane, controllers providing a combined control functionality
which makes packet forwarding simple [2]. The centralized through open APIs to supervise the network forwarding
controller of SDN has the real-time feedback control capability behavior through a public interface. Three communica-
[34], and open interfaces which offer modular plug-in features. tion interfaces allow the controllers to interact: south-
The centralized controller provides an abstract network view, bound, northbound and east/westbound interfaces.
defining tasks by APIs and greater programmability of the net- Southbound APIs achieves communication between the
work [9]. It can integrate security devices within the network controller and the physical networking hardware. SDN
topology [35], which can lead to increase in accuracy, detecting North Bound Interfaces (NBI) communicate between
security incidents and simplify management. SDN application and control layer that provide general
In this section, we first introduce the architecture of SDN network overviews. The east-westbound interfaces using
and applications, followed by SDN-Based NIDS observation mainly to communicate between controller to expand
using ML/DL. controls within a domain.
3) Application layer: The upper layer, application layer
consists of the end user business application such as net-
3.1 SDN architecture and applications work monitoring and security applications.

Open Networking Foundation (ONF) [7] is one of the suitable Using extended features of SDN, number of SDN applica-
architecture for SDN; it is divided into three main functional tions have been developed to increase flexibility of a network,
layers. These are infrastructure layer, control layer, and appli- reduce the total time to market and total cost of ownership of
cation layer. Figure 3, illustrate the overview of SDN archi- future IT network infrastructures. SDN has found applications
tecture, as shown in Fig. 3, the upper layer is the application in a wide range of networking avenues. Furthermore, due to
layer; the control plane is in the middle and data plane is the the recent increase in the number of cyber-attacks, SDN archi-
lower layer which is also known as infrastructure layer. tecture has been used for rapid development and deployment
of new services. In this section, some of the key applications
1) Infrastructure Layer: Infrastructure layer is also known of SDN are discussed [36].
as data plane. It mainly consists of forwarding devices
(FEs) including physical switches which interconnected & Wireless Communication: The programmability fea-
through wired or wireless media. Examples of physical ture of SDN paradigm introduces new applications to

Fig. 3 SDN Architecture ( [2])


Soware-Defined Networking

Network Applicaons

Intrusion Applicaon Layer


MAC Roung Load
Detecon
Learning Algorithm Balancer
System

SDN Controller Control Layer

Infrastructure
Layer
Peer-to-Peer Netw. Appl.

mobile communication networks. SDN has the poten- and provides flexibility to program network devices and elim-
tial to fine tune mobile communication performance. inates hardware dependency. A brief overview and compari-
The SDN architecture can be applied to wireless net- son of different solution for NIDS using SDN platform is
work environments such as wireless cellular commu- shown in Table 2.
nication, wireless mesh network, Wi-Fi access net- An SDN network with software switch implementations
work and internet of things (IoT) etc. Leveraging and programmable feature can be developed using simulation
SDN, IoT paradigm can also introduce scalability. and emulation platforms. Open Flow is one of the most pop-
Thus, by simplifying management and traffic engi- ular protocol standard [39, 40] that allows the implementation
neering in wireless mesh networks and deploying of the SDN concept in both hardware and software environ-
crowd-sharing models, SDN creates opportunities for ments. There are other simulation tools, such as NS-2, Mininet
network connectivity and bandwidth sharing [36]. [37], NS-3, OMNeT++ [38, 40, 41]. The vital part of an SDN
& Data centers: In a data center environment, optimal traffic networks the SDN controller, also known as a network oper-
engineering, network control, and policy implementations ating system. SDN controller is responsible for concentrating
are required when operating at large scales. Using SDN communications with all programmable elements of the net-
based traffic orchestration, we can reduce network latency, work, providing a combined view of the network. Currently,
and introduce security in an automated and dynamic fash- there are several SDN controllers such as NOX [42] and POX
ion in the data centers [36]. [43, 44]. Figure 4, an SDN-based NIDS architecture as
& SDN-Based Cloud: Combining cloud techniques and depicted.
SDN paradigm provides a close integration of applications It can be observed that compare to ML, researchers started
in the cloud. With the network programmable interfaces to apply deep learning techniques in the field of NIDS. Deep
and automation, SDN is a good tool to defeat cloud intru- learning is capable of automatically finding a correlation in the
sion. Thus, SDN increases the service scalability in cloud data, so it is a prospective method for the next generation of
environments [37]. intrusion detection techniques [10]. DL based approaches
& Residential environment: SDN framework allows users outperformed existing machine learning techniques when ap-
and service providers’ greater visibility into residential plied to various classification problems in SDN networks [8].
and small office networks. SDN can implement anomaly Most of the supervised ML algorithms are good at classifica-
detection systems in a SOHO network using programma- tion tasks, but not in modelling logic. DL based approaches
bility for greater accuracy and scalability [4]. outperformed existing machine learning techniques in logic
modelling. As attacks are unknown, unsupervised learning
algorithms such as stacked autoencoder, RNN and hybrid
3.2 SDN-based NIDS observation using ML/DL based algorithms will be the best for NIDS implementation
in SDN platform.
SDN-based Intrusion detection system using ML/DL ap- In recent years, researchers are implementing ML based
proach shows many advantages in terms of security enforce- NIDS in SOHO networks using SDN environment and it
ment, virtual management, and Quality of Service (QoS). was found that the IDS accuracy has greatly improved due
SDN provides us a chance to strengthen our network security to ML based algorithms and scalability of SDN.

Table 2 Comparison of SDN-based NIDS using DL approach

Publication Method Usage Comparison

Syed Akbar Mehdi et al. [4] Used four anomaly algorithms TRW-CB Anomaly Detection Standardized programmability and can
algorithm, rate limiting, maximum predict anomalies in SOHO Network
entropy detector and NETAD.
Rodrigo Braga et al. [38] Used self-organizing maps an unsupervised Lightweight DDoS Efficient at detecting DDoS attacks but
artificial neural network. Flooding Attack not have any flow rules installed.
Tuan A Tang et al. [6] Used deep learning approached for Anomaly Detection Does not scale well commercial product
flow-based anomaly detection or an alternative solution for
signature-based IDS
Quamar Niyaz et al. [8] Used stack auto-encoder, deep learning DDoS Detection System Can detect any DDoS attack, but has a
for feature reduction Controller bottleneck in a vast network.
Damian Jankowski et al. [59] Used self-organizing map and learning Intrusion Detection Can detect U2R attacks that include
vector quantization. deep packet inspection technique.
Peer-to-Peer Netw. Appl.

Controller
NIDS
(Server Soware)

Open Flow Switch Open Flow Switch

Internet Firewall

Fig. 4 Model of Intrusion detection system in SDN architecture (After [6])

4 Research challenges to a significant amount of incoming and forwarding data.


Reduce controller bottleneck to implement NIDS is anoth-
There are some challenges while developing a flexible and er research challenge [37].
efficient NIDS using ML/DL in SDN based networks [5].
In [49] authors compared Feature-Selection Methods for
& A predominant challenge is to choose appropriate feature- Intrusion Detection and they outlined the main disadvantages
selection methods that can precisely determine the rele- of various feature learning systems is their complexity and are
vance of features to the intrusion detection task and the expensive to implement. In recent years, there has been active
redundancy between these features [45]. Therefore, how research works on feature selection, where they use various
to determine the optimum number of model parameters feature selection methods such as principal feature analysis,
and how to improve the computational realism is a chal- Bi-Layer behavioural-based feature selection approach, and
lenge in ML/DL [33]. Random Forest to reduce feature [50–52]. In [53], support
& The existing intrusion detection dataset is not accurate vector data description (SVDD) is used to automatically select
for research predications for academic research as they the optimal feature combination for anomaly detection by ap-
require proper classification of data. Network re- plying feature selection techniques.
searchers use synthetic data sets for network intrusion At present, the researchers are using some new data sets
detection due to lack of better and more realistic that are used around the world by universities, private industry
datasets. It is essential to create datasets to ensure con- and independent researchers. These databases are developed
sistent and accurate evaluation of intrusion detection by research institutes like the University of New Brunswick
systems. For testing and evaluation of intrusion detec- ISCX 2012 Intrusion Detection, Evaluation Data Set [54], and
tion, several datasets are available. However, the most the CIC DOS Dataset [55]. The ADFA-LD12 dataset is a
widely used evaluation datasets are the KDD Cup 1999 worthy successor for the KDD dataset [56], and the UNSW-
and its modified version, the NSL-KDD dataset for NB15 dataset [57] was also used for academic research pur-
network-based intrusion detection systems [46]. pose. WSN-DS [58] specialised dataset for wireless sensor
& SDN-Based NIDS Challenges, the fundamental network (WSN) is developed to detect and classify four types
challenge of SDN-based NIDS is how to handle packet of denial of service (DoS) attacks in wireless sensor network.
processing flows in an efficient way which is a big chal-
lenge to implement NIDS using ML/DL approach with
high volume of data [47]. 5 Conclusion and future work
& SDN itself may be a target of various attacks such as
DDoS. Forged traffic flows, vulnerabilities in switches, In this paper, we provided an overview of programmable net-
and attacks on the control plane are primary potential works and examined the emerging field of Software-Defined
threat vectors in SDN. All these attacks can have a devas- Networking (SDN). We also outlined various intrusion detec-
tating impact on the overall network [48]. So, it is neces- tions mechanisms using ML/DL approaches. We emphasized
sary to improve SDN security itself. software-defined networking (SDN) technology as a platform
& With the application of SDN in larger networks, the net- using ML/DL approaches to detect vulnerabilities and monitor
work controllers could face a performance bottleneck due networks.
Peer-to-Peer Netw. Appl.

The use of deep learning has gained importance due to its stories/downloads/sdnresources/technical-reports/TR_SDN-
ARCH-Overview-1.1-11112014.02.pdf. Accessed 27 June 2017
efficiency in evaluating network security. Similarly, new
8. Niyaz Q, Sun W, Javaid AY (2016) A deep learning based DDoS
methods of deep learning are increasing faster and efficient detection system in software defined networking (SDN). CoRR
in data taxation. Various issues need to be considered while abs/1611.07400. https://doi.org/10.4108/eai.28-12-2017.153515
implementing NIDS, since the nature of the attacks are dy- 9. Sezer S, Scott-Hayward S, Chouhan PK (2013) Are we ready for
SDN? Implementation challenges for software-defined networks.
namic. So, adaptability of detection method is required.
In: IEEE Communication Magazine, vol. 51, no. 7, pp 36–43.
Developing a feature selection method with classifiers which https://doi.org/10.1109/MCOM.2013.6553676
reduces the dimensions of the dataset is an ongoing challenge. 10. Atkinson RC, Bellekens XJ, Hodo E, Hamilton A, Tachtatzis C
This is another field of research to classify proper dataset (2017) Shallow and deep networks intrusion detection system: a
taxonomy and survey. CoRR, arXiv preprint arXiv:1701.02145.
using DL techniques.
2017 Jan 9
To design a centralized SDN controller, that can monitor 11. Survey of Current Network Intrusion Detection Techniques https://
and implement real-time intrusion detection in high-speed net- www.cse.wustl.edu/~jain/cse571-07/ftp/ids/. Accessed 26 June 2017
works is a possible future direction and will be a challenging 12. Supervised and unsupervised machine learning algorithms http://
machinelearningmastery.com/supervised-and-unsupervised-
task. Most of the SDN-based NIDS architectures developed to
machine learning-algorithms/. Accessed 20 June 2017
identify mostly malicious activities in the SOHO network 13. Zamani M, Movahedi M (2015) Machine learning techniques for
[39]. It is appropriate to note that none of the approaches intrusion detection. CoRR, arXiv preprint arXiv:1312.2177. 2017
implementing SDN-based NIDS are applied to critical infra- Jan 9
structure and high-speed network infrastructure. We think that 14. Thaseen S, Kumar Ch (2013) An analysis of supervised tree based
classifiers for intrusion detection system. In: Proceedings of the
with greater accuracy and scalability of SDN, the researchers international conference on pattern recognition, informatics and
can achieve ML/DL based NIDS on critical infrastructure. mobile engineering (P RIME). Pp. 21–22
We believe that this comprehensive survey could help 15. Niyaz Q, Sun W, Javaid AY, Alam M (2016) A deep learning
R&D people to understand the development of NIDS in approach for network intrusion detection system. International con-
ference wireless networks and mobile communications
SDN context using DL approach. (WINCOM)
16. Zanero S, Savaresi SM (2004) Unsupervised learning techniques
for an intrusion detection system. In: Proceedings of the ACM
symposium on applied computing. Pages 412–419
17. Syarif I, Prugel-Bennett A, Wills G (2012) Unsupervised clustering
approach for network anomaly detection. In: Benlamri R (eds)
References Networked Digital Technologies. NDT 2012. Communications in
Computer and Information Science, vol 293. Springer, Berlin,
1. Hewlett Packard Enterprise (2015) 2015 cost of cyber crime study: Heidelberg
global, independently conducted by Ponemon institute LLC publi- 18. Tsai C, Hsu Y, Lin C, Lin W (2009) Intrusion detection by machine
cation, Ponemon Institute research report. Avaiable https://www. learning: a review. Expert Syst Appl 36:11994–12000
accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/ 19. Bennett KP, Demiriz A (2017) Semi-supervised support vector ma-
PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf. Accessed 26 chines. Neural Comput & Applic 28(5):969–978
June 2017 20. Haweliya J, Nigam B (2014) Network intrusion detection using
semi supervised support vector machine. Int J Comput Appl 85, 9
2. Kreutz D, Ramos FMV, Verissimo PE, Rothenberg CE,
21. Chen C, Gong Y, Tian Y (2008) Semi-supervised learning methods
Azodolmolky S (2015) Software-defines network- a comprehen-
for network intrusion detection. Int Conf Sys, Man Cybern, IEEE.
sive survey. Published in Proceedings of the IEEE, 103, 1
https://doi.org/10.1109/ICSMC.2008.4811688
3. Aburomman AA, Reza MBI (2016) Survey of learning methods in
22. Deep learning stand to benefit to data analytics and HPC expertise
intrusion detection systems. International conference on advances
http://www.cio.com/article/3180184/analytics/deep-learning-
in electrical, electronic and system Engineering(ICAEES),
stands-to- benefit-from-data-analytics-and-high-performance-com-
Putrajaya, pp 362–365. https://doi.org/10.1109/ICAEES.2016.
puting-hpc-expertise.html. Accessed 3 July 2017
7888070
23. LeCun Y, Bengio Y, Hinton G (2015) Deep learning review.
4. Mehdi SA, Khalid J, Khaiyam SA (2011) Revisiting traffic anom- Weekly journal of science in nature international. Nature 521, doi:
aly detection using software defined networking. In: Sommer R, https://doi.org/10.1038/nature14539
Balzarotti D, Maier G (eds) Recent Advances in Intrusion 24. Convolutional Neural Networks (2017) http://eric-yuan.me/cnn/.
Detection. RAID 2011. Lecture Notes in Computer Science, vol Accessed 10 July 2017
6961. Springer, Berlin, Heidelberg 25. Deng L, Yu D (2014) Deep learning methods and applications.
5. Garcı´a-Teodoroa P, Dı´az-Verdejo J, Macia´-Ferna’ndez G, Va´ Microsoft Research. Available https://www.microsoft.com/en-us/
zquez E (2009) Anomaly-based network intrusion detection: research/publication/deep-learning-methods-and-applications/.
Techniques, systems and challenges. J Comput Secur 28(1-2):18– Accessed 10 July 2017
28 26. Alom MZ, Bontupalli VR, Taha TM (2015) Intrusion detection
6. Tuan TA, Mhamdi L, Mclernon D, Zaidi SAR, Ghogho M (2016) using deep belief networks. Aerospace and electronics conference,
Deep learning approach for network intrusion detection in software NAECON. IEEE
defined networking. Int Conf Wirel Netw Mob Commun. https:// 27. Tutorial http://ufldl.stanford.edu/tutorial/supervised/
doi.org/10.1109/WINCOM.2016.7777224 ConvolutionalNeuralNetwork/. Accessed June 15 2017
7. Open Networking Foundation (2013) SDN architecture overview, 28. Vyas A (2017) Deep learning in natural language processing^ in
Version 1.0. Available https://www.opennetworking.org/images/ mphasis, deep learning- NL_whitepaper
Peer-to-Peer Netw. Appl.

29. Hughes T, Mierle K (2013) Recurrent neural networks for voice computing & systems, at SBS Staten technical campus, Ferozepur,
activity detection IEEE International Conference on Acoustics, Punjab, India, volume: 1
Speech and Signal Processing, Vancouver, BC, pp 7378–7382. 45. Nguyen HT, Petrovic S, Franke K (2010) A comparison of feature-
https://doi.org/10.1109/ICASSP.2013.6639096 selection methods for intrusion detection. In: Kotenko I, Skormin V
30. Salama MA, Eid HF, Ramadan RA, Darwish A, Hassanien AE (eds) Computer Network Security. MMM-ACNS 2010. Lecture
(2011) Hybrid intelligent intrusion detection scheme. Soft comput- Notes in Computer Science, vol 6258. Springer, Berlin,
ing in industrial applications in advances in intelligent and soft Heidelberg, pp 242–255
computing book series (AINSC, volume 96), pp 293–303 46. Gogoil P, Bhuyan MH (2012) Packet and flow-based network in-
31. Fiore U, Palmieri F, Castiglione A, Santis AD (2013) Network trusion dataset. International conference on contemporary comput-
anomaly detection with the restricted Boltzmann machine. ing IC3, pp 322–334
Neurocomputing 122(25):13–23 47. Hu F, Hao Q, Bao K (2014) A survey on software-defined network
32. Eid HFA, Darwish A, Hassanien AE, Abraham A (2010) Principal and openFlow: from concept to implementation. IEEE communi-
components analysis and support vector machine based intrusion cation surveys & tutorial 16:4
detection system. International conference intelligent systems de- 48. Alom MZ, Bontupall VR, Taha TM (2015) Intrusion detection
sign and applications (ISDA) using deep belief networks. In: Aerospace and electronics confer-
33. Wang L, Jones R (2017) Big data analytics for network intrusion ence, NAECON
detection: a survey. Int J Netw Commun. https://doi.org/10.5923/j. 49. Coates A, Lee H, Ng Andrew Y (2011) An analysis of single-layer
ijnc.20170701.03 networks in unsupervised feature learning. In: Proceedings of the
34. Open Networking Foundation (2014) SDN architecture, Issue 1 fourteenth international conference on artificial intelligence and sta-
June 2014 ONF TR-502 tistics, PMLR 15:215–223
35. Nunes BAA, Mendonca M, Nguyen XN, Obraczka K and Turletti 50. Lu Y, Cohen I, Zhou XS, Tian Q (2014) Feature selection using
T (2014) A Survey of Software-Defined Networking: Past, Present, principal feature analysis. Pattern Recogn Lett 49:33–39
and Future of Programmable Networks. In IEEE Communications
51. Eid HF, Salama MA, Hassanien AE, Kim TH (2011) Bi-layer be-
Surveys & Tutorials, vol 16, no. 3, pp 1617–1634, Third Quarter
havioral based feature selection approach for network intrusion
2014. https://doi.org/10.1109/SURV.2014.012214.00180
classification. Commun Comput Inf Sci Book Ser 259:195–203
36. Bakshi T (2017) State of the art and recent research advances in
52. Hasan MAM, Nasser M, Ahmad S, Molla KH (2016) Feature se-
software defined networking. In Wireless Communications and
lection for intrusion detection using random forest. In: Journal of
Mobile Computing, 2017, 1530-8669, Hindawi Publishing
information security, pp 129–140
Corporation
37. Yan Q, Yu FR, Gong Q and Li J (2016) Software-defined networking 53. Kloft M, Brefeld U, Dussel P, Gehl C, Laskov P (2008) Automatic
(SDN) and distributed denial of service (DDoS) attacks in cloud com- feature selection for anomaly detection. In: Proceedings of the 1st
puting environments: A survey, some research issues, and challenges. ACM workshop on AISec, Pages 71–76, Alexandria, Virginia,
IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp 602– ACM New York, USA
622 Firstquarter 2016. https://doi.org/10.1109/COMST.2015.2487361 54. Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward
38. Braga R, Mota E, Passito A (2010) Lightweight DDoS flooding developing a systematic approach to generate benchmark datasets
attack detection using NOX/OpenFlow. 35th Annual IEEE confer- for intrusion detection. Comput Secur 31(3):357–374
ence on local computer networks, Denver, Colorado 55. University of New Brunswick (2017) [Online] available http://
39. Open Networking Foundation, Jun (2014) [Online]. Available: www.unb.ca/cic/research/datasets/dos-dataset.html. Accesses 22
https://www.opennetworking.org/. Accessed 10 July 2017 June 2017
40. Prete LR, Shinoda AA, Schweitzer CM, De Oliveira RLS (2014) 56. Creech G, Hu J (2013) Generation of a new IDS test dataset: time to
Simulation in an SDN network scenario using the POX controller. retire the KDD collection. Wirel Commun Netw Conf (WCNC).
2014 I.E. Colombian Conference on Communications and https://doi.org/10.1109/WCNC.2013.6555301
Computing (COLCOM), Bogota, pp 1–6. https://doi.org/10.1109/ 57. Nour M, Slay J (2016) The evaluation of network anomaly detec-
ColComCon.2014.6860403 tion systems: statistical analysis of the UNSW-NB15 data set and
41. Open Flow [Online]. Available: http://www.openflow.org/. the comparison with the KDD99 data set. Inf Secur J: A Glob
Accessed 12 July 2017 Perspec, pp 1–14
42. NOX. [Online]. Available: http://www.noxrepo.org/nox/about- 58. Almomani I, Al-Kasasbeh B, Al-Akhras M (2016) WSN-DS: a
nox/. Accessed 12 July 2017 dataset for intrusion detection systems in wireless sensor networks.
43. POX. [Online]. Available: http://www.noxrepo.org/pox/about-pox. J Sens 16p
Accessed 12 July 2017 59. Jankowski D, Amanowwicz M (2016) On efficiency of selected
44. Kaur S, Singh J, Ghumman NS (2014) Network programmability machine learning algorithms for intrusion detection in software de-
using POX controller. International conference on communication, fined networks. Int J Electron Telecommun, 62(3):247–252

View publication stats

You might also like