Detection of TCP, UDP and ICMP DDOS Attacks in SDN Using Machine Learning Approach
Detection of TCP, UDP and ICMP DDOS Attacks in SDN Using Machine Learning Approach
Abstract: Software Defined Networking (SDN) is an architecture for the network to control centrally through programmed
software applications. SDN enables the programming behaviour of the network centrally over software programs with the
help of open Application interfaces. We can change the parameters of network connections in a dynamic manner. In
conventional network, it is impossible to change the settings in a dynamic way, as it is a fixed connection. In SDN, the Control
plane is controlled by software is at the center which links the application layer and infrastructure layer. Software-Defined
Networking (SDN) has proved its efficiency in countering attacks by providing network surveillance and online configuration
of the network. DDoS attack is a malicious attack in which the attacker floods the target server from various sources. This
project uses SDN intrusion dataset for training. This project focuses on the implementation of a compatible way for finding
the DDoS detriment in SDN employing multiple Machine Learning (ML) approaches.
Keywords: DDoS attack, Machine Learning, Software-Defined Networking.
I. INTRODUCTION
Software Defined Networking (SDN) is widely used
interconnected criterion that is dynamic, less cost,
extensible, by preparing it better suited to various devices
or different network projects. The network or
interconnection control and advancing activities are
segregated in this architecture, by permitting network
control straightforwardly programmable and the Fig 1: Architecture of SDN.
framework components are preoccupied for applications In SDN, we can modify the specifications of network
and organization administrations. It is critical to construct connections on the fly. On the basis of controller's
a Intrusion Detection System (IDS) based on network that decisions, the data plane transports network traffic. The
detect DDoS detriment using information from network control plane determines traffic flow by enumerate routing
traffic flows (SDN). In SDN, the control planes (CP) are tables. The application plane controls other applications
separated by network devices. This technology different such like load balancers, firewall, & Quality of Service
from traditional network design in its operation. Because (QoS) apps. Creating an Intrusion Detection System (IDS)
the traditional network is a fixed link, it is not possible to is based on a network and utilizes modern networking
adjust dynamically. technologies like SDN is of utmost importance. This
964
Detection of TCP, UDP and ICMP DDOS attacks in SDN Using Machine Learning approach
system should be able to find DDoS attacks by analysing for detecting DDoS attacks. The modularity aspect allows
data from network traffic flows that are managed by SDN. us to improve each component separately, namely pre-
DDoS attacks are dangerous attacks from various OSI processing, the flow collector, detection, and flow
layers. DDoS attacks continue to cause countless issues in management modules.
today's network infrastructures. These are usually high- This approach allows experimenting with alternatives ML
volume and expensive attacks. Artificial intelligence detection techniques to counter different DDoS attacks.
approaches such as machine learning can, however, And also, this research looked into the most common and
identify them. Control programmes in a logically harmful transport layer to do damage by DDoS, UDP
centralized controller will manage numerous routers Flood and SYN Flood. Because a large quantity of traffic
across the network. DDoS attacks have grown in passes through the controller in the SDN control layer, a
frequency and severity over time, as well as in good security system is required to analyse and identify
sophistication. The modularity aspect allows us to adapt suspicious traffic. Furthermore, the approaches KNN, RF,
and improve any component of the architecture separately, DT, and SVM were successful for various sorts of attacks.
such as the flow collector, and detection.
Using artificial intelligence methodologies, this study
provides a scalable and extensible SDN-based architecture
II. RELATED WORKS
S.No AUTHOR TITLE PROPOSED SYSTEM LIMITATIONS
NAME
1. Mario Long Short Term Memory and The system proposed in this paper However, this work was
Lemes Fuzzy Logic for finding aims to characterise network traffic, subjected to few high-
Proença, Jr. Anomaly and Mitigation in detect DDoS attacks, and mitigate volume damages. Up-to-
(proenca@ Software-Defined Network. Port scan in an SDN environment. date datasets are not
uel.br) used.
2. N. N. Tuan A DDoS detriment mitigation This work proposed a DDoS attack The datasets used in this
scheme in ISP networks using mitigation strategy for TCP-SYN paper are not up to date
ML by SDN and ICMP flood attacks in SDN- and explored only few
based (ISP) networks using an ML types of DDoS attacks.
approach, namely,
K_Nearest_Neighbor and
X_G_Boost.
965
Journal of Survey in Fisheries Sciences 10(4S) 964-971 2023
3. T. V. Phan Q-MIND: Loosing stealthy This research published Q-MIND, a This work explored only
DoS detriment in SDN with a machine ML defence application, to few classification
machine-learning based defense find and mitigate DoS damage in Methods and this work
framework SDN. only detects whether
attack is DDoS attack or
not. This work does not
explored types of DDoS
attacks.
4. M. Semi-supervised ML approach Writers presented an online ordered This study did not use
Idhammad for finding DDoS semi-supervised ML process in up-to-date datasets and a
finding DDoS by network Entropy smaller number of
estimation, Co-clustering, Data Gain methods are explored.
Ratio, and Extra-Trees algorithm.
5. X. Liang A long short-term memory To address this paper a guided This work explored only
framework for finding DDoS DDoS, find scheme by LSTM is slow rate DDoS attacks.
detection published. Only explored a single
classifier.
6. Amit DDoS detriment at the DDoS detriment on the application This paper presents a
Praseed application layer: Problems and or framework layer have begun. detailed explanation and
research perspectives for They make legitimate application classifications of
safeguarding web applications layer requests, making existing application layer
defence mechanisms difficult to DDoS to help
detect. researchers better
understand of attacks.
7. M. Elsayed A Deep-Learning Model for The authors published DDoSNet, an This work does not focus
Detecting Network Attacks intrusion detecting system against on testing the proposed
DDoS damage in SDN framework, in model's performance on
this paper. other datasets.
III. PROPOSED SYSTEM This work focuses on the following DDoS attack:
This section discusses about proposed work for finding of 1) TCP-SYN FLOOD ATTACK: It is a type of DDoS
DDoS damage using ML approaches in SDN. The attacks where intruder rapidly initialises a connection
presented work makes uses machine learning techniques without finalizing it to web server. The server must use
which are SVM, Decision tree, k Nearest Neighbours, resources to wait for poorly opened connections, which
Random Forest. The advantage of using this ML might cause the system to become unresponsive to routine
algorithms is their less complexity. traffic.
966
Detection of TCP, UDP and ICMP DDOS attacks in SDN Using Machine Learning approach
967
Journal of Survey in Fisheries Sciences 10(4S) 964-971 2023
C. EXPERIMENTAL ANALYSIS: attacks webserver is hosted on one host and attack will be
The Efficiency of the ML algorithms used in the generated from another host and one more host is
suggested system was assessed in a Mininet and Ryu employed to notice the reachability of web-server while
controllers-based SDN test environment. attack in progress. Each trained ML algorithm is
evaluated in SDN testbed in similar manner
H-host
C -controller
Fig 5: Emulated SDN network topology
A simple web server (SimpleHTTPServer) will be S-switch
running on any of hosts and DDoS attacks will be Fig 6: Recall comparison ML Models
performed on that webserver. To perform attacks a F1-score comparison of Machine Learning Models:
standard tool hping3 is used. Hping3 can be used to All the ML models in the proposed work have achieved
perform TCP-SYN, UDP, ICMP attacks. During DDoS the same F1-score which is 99.99.
968
Detection of TCP, UDP and ICMP DDOS attacks in SDN Using Machine Learning approach
969
Journal of Survey in Fisheries Sciences 10(4S) 964-971 2023
detection system using machine learning approaches,’’ [23]. P. Nirmala, T. Manimegalai, J. R. Arunkumar,
Peer-Peer Netw. Appl., vol. 12, no. 2, pp. 493–501, Jan. S. Vimala, G. Vinoth Rajkumar, Raja Raju, "A
2019. Mechanism for Detecting the Intruder in the Network
[14]. Dr.Anusuya Ramasamya, Dr.M.Sundar Rajanb, through a Stacking Dilated CNN Model", Wireless
Dr.J.R.Arunkumar ”Segmentation of Spatial and Communications and Mobile Computing, vol. 2022,
Geometric Information from Floorplans using CNN Article ID 1955009, 13 pages, 2022.
Model” Turkish Journal of Computer and Mathematics https://doi.org/10.1155/2022/1955009.
Education Vol.12 No.9 (2021), 1909-1920 [24]. M. S. Elsayed, N.-A. Le-Khac, S. Dev, and A.
[15]. R. Swami, M. Dave, and V. Ranga, ‘‘Software- D. Jurcut, ‘‘DDoSNet: A deep-learning model for
defined networking-based DDoS defense mechanisms,’’ detecting network attacks,’’ in Proc. IEEE 21st Int. Symp.
ACM Comput. Surv., vol. 52, no. 2, p. 28, 2019. ‘A World Wireless, Mobile Multimedia Netw.’
[16]. C. Birkinshaw, E. Rouka, and V. G. Vassilakis, (WoWMoM), Aug. 2020, pp. 391–396.
‘‘Implementing an intrusion detection and prevention [25]. Prathima, C., Muppalaneni, N.B., Kharade, K.G.
system using software-defined networking: Defending (2022). Deduplication of IoT Data in Cloud Storage. In:
against port-scanning and denial-of-service attacks,’’ J. Satyanarayana, C., Gao, XZ., Ting, CY., Muppalaneni,
Netw. Comput. Appl., vol. 136, pp. 71–85, Jun. 2019. N.B. (eds) Machine Learning and Internet of Things for
[17]. P. Wang, L. T. Yang, X. Nie, Z. Ren, J. Li, and Societal Issues. Advanced Technologies and Societal
L. Kuang, ‘‘Data-driven software defined network attack Change. Springer, Singapore.
detection: State-of-the-art and perspectives,’’ Inf. Sci., https://doi.org/10.1007/978-981-16-5090-1_13
vol. 513, pp. 65–83, Mar. 2020. [26]. Muppalaneni, N.B., Prathima, C. (2021). A
[18]. M. Idhammad, K. Afdel, and M. Belouch, Secure Smart Shopping Cart Using RFID Tag in IoT. In:
‘‘Semi-supervised machine learning approach for DDoS Shakya, S., Balas, V.E., Haoxiang, W., Baig, Z. (eds)
detection,’’ Appl. Intell., vol. 48, no. 10, pp. 3193–3208, Proceedings of International Conference on Sustainable
2018. Expert Systems. Lecture Notes in Networks and Systems,
[19]. Rajan, M.S., Arunkumar, J.R., Anusuya, R., vol 176. Springer, Singapore.
Mesfin, A. (2021). Earliest-Arrival Route: A Global https://doi.org/10.1007/978-981-33-4355-9_52
Optimized Communication for Networked Control [27]. Dr. Sivakumar .C (2023), “Design of
Systems. vol 384. Springer, Cham. Acceptance Sampling based Network Intrusion Detection
https://doi.org/10.1007/978-3-030-80621-7_10. system using Deep Learning Techniques”, Journal of
[20]. Arunkumar, J. R., Anusuya, R., Rajan, M. S., & Survey in Fisheries Sciences, 10(1S) 3817-3821.
Prabhu, M. R. (2020). Underwater wireless information [28]. C. Silpa , Dr.I. Suneetha , Dr.G. Reddy
transfer with compressive sensing for energy efficiency. Hemantha , Ram Prakash Reddy Arava, Y. Bhumika,
Wireless Personal Communications, 113(2), 715–725 “Medication Alarm: A Proficient IoT-Enabled
[21]. Priyadarshini and R. K. Barik, ‘‘A deep learning Medication Alarm for Age Old People to the Betterment
based intelligent framework to mitigate DDoS attack in of their Medication Practice”, Journal of Pharmaceutical
fog environment,’’ J. King Saud Univ.-Comput. Inf. Sci., Negative Results, vol. 13, no. 4, pp. 1041–1046, Nov.
pp. 1–7, Apr. 2019. 2022.
[22]. V. Punitha, C. Mala, and N. Rajagopalan, ‘‘A [29] Infectious diseases of Rice plants classified using a
novel deep learning model for detection of denial of deep learning-powered Least Squares Support Vector
service attacks in HTTP traffic over internet,’’ Int. J. Ad Machine Model,Goluguri,N.V.R.,Suganya Devi, K.,
Hoc Ubiquitous Comput., vol. 33, no. 4, pp. 240–256, Prathima,C.H.Indian Journal of Computer Science and
2020.
970
Detection of TCP, UDP and ICMP DDOS attacks in SDN Using Machine Learning approach
971