SDN Network DDOS Detection Using ML
SDN Network DDOS Detection Using ML
SDN Network DDOS Detection Using ML
3 4
Dandamudi Swetha Malli Sahithi
Dept. of Computer Science Engineering GVPCEW (JNTUK) Dept. of Computer Science Engineering GVPCEW (JNTUK)
Visakhapatnam, India Visakhapatnam, India
Abstract:- This paper describes a technique that uses the II. METHODOLOGY
Ryu Controller and Mininet to identify and mitigate
Distributed Denial of Service (DDoS) threats in Software We built a virtual network environment utilizing
Defined Networks (SDN). Using Mininet, the suggested Mininet, a well-known network emulator, and Ryu
method entails building a virtual network topology with Controller for network administration in order to assess the
connected switches and hosts. The Ryu Controller efficacy of our suggested method. The network structure
gathers traffic data while Mininet simulates several allowed for the simulation of several attack scenarios
DDoS attack types, such as ICMP flood, land assault, because it consisted of switches and hosts connected by
TCP SYN flood, and UDP attacks. The Ryu Controller virtual links. ICMP flood, TCP SYN flood, UDP flood, and
collects both benign and DDoS traffic into a dataset that LAND attack were created by mimicking actual threat
is used to build a machine learning (ML) model that can scenarios with the aid of tools such as hping. The Ryu
detect DDoS attacks in real time. Controller collected and processed traffic data, including
malicious and benign flows, and then put the information
Keywords:- Software-Defined Networking, DDoS , Ryu into a structured dataset for additional study.
Controller, Mininet Simulation, Machine Learning , ICMP
Flooding, Land Attack Simulation, TCP SYN Flooding, UDP Ryu Controller
Flooding, Network Security Enhancement, Anomaly Ryu Controller:is an open-source python based
Detection, Traffic Classification, Real-time Monitoring, programmable controller, which is used to define the rules
Network Topology Emulation. and logic for the switches to follow in the methodology.
I. INTRODUCTION Mininet
Mininet is a network simulator and creates a virtual
The Distributed Denial of Service (DDoS) attacks are a network topology with controller, switches and hosts, in this
serious threat to network performance and availability in work a single openVswitch with 10 and 25 hosts are created
conventional networking systems. These attacks usually for multiple tests.
entail sending a large amount of malicious traffic over
network resources, blocking access to services for Hping3
authorized users. SDN, or software-defined networking, has Hping3 is a packet generator which generates TCP/IP
become a prominent paradigm for improving network traffic in the network, it is mostly used to test network
security.SDN enables dynamic reconfiguration of network security. Normal and attack traffic scripts are written to
devices and centralized management by severing the control generate traffic automatically using this tool .
plane from the data plane.
IDS
There are many benefits to using SDN for DDoS IDS: intrusion detection systems (IDS) provide
detection and mitigation, such as improved visibility, proactive defense against hostile activity by analyzing
scalability, and flexibility in response to changing threats. In system behavior and network traffic patterns to identify
this work, we present an approach that uses widely-used anomalies. ML-based intrusion detection systems are able to
tools like Ryu Controller and Mininet to identify and adapt and detect previously undiscovered threats with
mitigate DDoS attacks by utilizing the capabilities of SDN increased accuracy and efficiency because they are
along with an Intrusion Detection System using Machine constantly learning from changing threat environments.
Learning.
A. Abbreviations and Acronyms version and confirm the installation type in:- -ovs-vsctl –
SDN: Software Defined Network, ML:Machine version.
Learning IDS: Intrusion Detection System , DDOS:
Distributed Deniel Of Service.ICMP: Internet Control To view the stages of detection and mitigation.
Message Protocol,UDP: User Datagram Protocol,LAND:
Local Area Network Denial,TCP-SYN: Transmission Ryu Controller
Control Protocol - SYNchronize Ryu Controller must be installed. Since Ryu is a
Python-based controller, installing it requires installing PIP
B. Simulation Platform Setup for Python in order to install Python packages. Enter the
This Section involves the steps and procedure to install following commands into the terminal to install PIP and the
all the packages and software required to implement the Ryu controller.
project. The Platform setup is done on Ubuntu 20.04.1 LTS
operating system. The project demonstration and simulation Mininet
was using the following tools:- Mininet is a network simulator and creates virtual
network topology for software defined networks.
Openflow Protocol For SDN
Ryu Controller Sudo apt-get install mininet -mn –version.
Mininet
Hping3. Hping3
Hping3 is a network packet generator and traffic
Openflow protocol generator for TCP/IP protocol, mostly used for network
Openflow protocol For SDN or OpenVswitch has to be testing . Iperf is network traffic performance tool to generate
installed as it is the standard protocol for software defined traffic and monitor it.
network- Switch (2009).1 Open Terminal and type in the
following command:- -sudo apt-get install openvswitch- Sudo apt-get install iperf -sudo apt-get install hping3
switch Give yes(Y) where ever it is asked, and to check the
In addition to the SDN-based detection and mitigation mechanisms implemented using the Ryu Controller, the experimental
design includes the integration of an Intrusion Detection System (IDS) to augment threat detection capabilities. The IDS serves as
an additional layer of defense, complementing the SDN-based approach by providing advanced threat detection and anomaly
analysis capabilities. essential data on pharmaceutical the batch. Incorporating IDS into the experimental setup enriches the
research methodology by providing a comprehensive evaluation of hybrid security approaches that combine both traditional and
SDN-based security measures.
Purpose:
The frontend setup using the Flask framework
facilitates user interaction and real-time DDoS detection by
providing a user-friendly interface to input instances and
receive predictions from trained machine learning models.
Implementation:
Input Interface:
Design an input interface where users can input
features representing network traffic instances for DDoS Fig 6 Types of Attack Performed in the Generated Dataset
detection. Provide form fields or input boxes for entering
relevant features such as packet rates, packet sizes, and V. CONCLUSION
protocol types.
In conclusion, our project underscores the potential of
Prediction Integration: SDN and machine learning in fortifying network defenses
Integrate the trained machine learning models into the against DDoS attacks. By combining the agility of SDN
Flask application to enable real-time prediction of DDoS with the intelligence of machine learning, we present a
attacks. Utilize Flask's routing mechanisms to handle proactive and adaptive approach to DDoS detection and
incoming requests, preprocess input data, and invoke model mitigation. The integration of real-time detection
predictions. capabilities with user-friendly interfaces paves the way for
effective collaboration between network administrators and
Output Display: automated security systems, fostering a resilient and secure
Display the prediction results on the frontend interface network infrastructure. Furthermore, our project emphasizes
to inform users whether the input instance is classified as a the importance of collaborative defense mechanisms and
DDoS attack or benign traffic. Provide clear and intuitive community engagement in combating cyber threats. By
visualizations or messages to convey the prediction outcome sharing insights, best practices, and threat intelligence within
effectively. the cybersecurity community, we can collectively enhance
our defenses and adapt to emerging threats more effectively.
The integration of machine learning algorithms and the
setup of a frontend using the Flask framework enhance the Open-source tools such as the Ryu Controller and
experimental design by enabling real-time DDoS detection machine learning libraries foster collaboration and
and user interaction. By leveraging trained models and knowledge sharing, enabling researchers and practitioners to
intuitive interfaces, the experiment aims to demonstrate the collaborate on innovative solutions for network security it is
feasibility and practicality of deploying SDN-based DDoS imperative to consider the ethical implications and
detection solutions in operational environments. responsible deployment of advanced security technologies
in real-world settings. While SDN and machine learning
offer powerful capabilities for DDoS detection and
mitigation, their deployment must be guided by ethical
principles, privacy concerns, and regulatory compliance.
Ensuring transparency, accountability, and fairness in
algorithmic decision- making processes is essential to
maintain trust and integrity in network security operations.