An Ensemble-Based Approach For Effective Distributed Denial of Service Attack Detection in Software Defined Networking
An Ensemble-Based Approach For Effective Distributed Denial of Service Attack Detection in Software Defined Networking
Corresponding Author:
Hasan Abdulkader
Department of Software Engineering, Faculty of Engineering, Haliç University
Istanbul, Turkey
Email: [email protected], [email protected]
1. INTRODUCTION
With the rapid increase in internet availability, the need for enhanced security measures has become
more crucial compared to the past. Among the significant challenges is the accurate detection of distributed
denial of service (DDoS) malicious flows to prevent resource failures caused by discarding these malicious
flows [1]. The current mitigation strategies rely on appliances, including firewalls [2], but these approaches
utilize predefined security policies that often fall short in detecting and classifying novel attack patterns and
responding appropriately [3]. Software defined networking (SDN) has emerged as a promising technique for
mitigating DDoS attacks by offering centralized control and programmability.
The effectiveness of SDN-based DDoS detection and mitigation methods largely hinges on the
accuracy of their underlying detection models [4]. Ensemble classification, which combines the outputs of
multiple classifiers to improve accuracy, has shown potential in various domains, including network intrusion
detection [5]. This study proposes an ensemble classification method to enhance the accuracy of DDoS attack
detection in SDN.
SDN is a technology that enhances network management by allowing programmable network
configuration to optimize performance. SDN is structured into three layers: the application layer, the control
layer, and the data plane. The application layer communicates its requirements for network resources to the
control layer through application programming interfaces (API), while the control layer communicates with
the data plane through south bound API. SDN separates network packets from the routing process, allowing
for centralized intelligence in the control layer [6], [7]. This layer can have one or more controllers and is the
brain of the SDN network. Centralized traditional static network architecture, SDN offers greater flexibility
and easier troubleshooting, but its centralized architecture presents challenges in security, elasticity, and
scalability [8].
DDoS attack detection has been studied merely in research and academic references. There have
been numerous proposals to address DDoS attacks in networks, which have been organized into different
categories. The proposed methods can be broadly divided into two types: those that rely on machine learning
and those that are based on statistics [9], [10].
A DDoS attack involves flooding a network with malicious traffic, overwhelming the resources such
as servers and bandwidth, and rendering the network inaccessible. As per the 2020 annual internet report by
Cisco, it is projected that the global count of DDoS attacks will increase twofold, reaching 15.4 million by
the year 2023 [11]. The report emphasizes the need to focus on preventing DDoS attacks, which have caused
denial of service (DoS) in major companies like CNN, Netflix, and Twitter in the past [12]. The main
objective of a security operation center (SOC) is to effectively identify and eliminate malicious DDoS flows,
ensuring the protection of network resources and maintaining service availability. This research paper
specifically concentrates on enhancing the precision of DDoS flow detection, which will be implemented
within the centralized SDN controller, whether it is physical or conceptual in nature.
Dong and Sarem [13] created a network structure to initiate a DDoS attack on a host, consisting of
one server and ten clients for network connectivity. They employed an enhanced k-nearest neighbors (KNN)
algorithm to uncover the DDoS attack. These algorithms yielded a favorable prediction rate of 0.912 each.
Indexing and abstracting services depend on the accuracy of the title, extracting from it keywords useful in
cross-referencing and computer searching. An improperly titled paper may never reach the audience for
which it was intended, so be specific.
Diaz et al. [14] devised a structure to identify and mitigate low-rate distributed denial-of-service
(LR-DDoS) attacks in SDN. Within this framework, a machine learning-based intrusion detection system
(IDS) has been incorporated, which exhibits a remarkable detection rate of 95%. The performance of the
architecture was assessed in a simulated environment that closely resembles actual production networks. As a
result, the IDS effectively thwarted all detected attacks.
Polat et al. [15] presented a model to detect DDoS attacks using machine learning techniques
including support vector machine (SVM), KNN, Naïve Bayes, and artificial neural networks (ANN). Two
datasets of SDN were utilized, containing instances of normal network conditions and instances of DDoS
attacks, in order to capture their distinct characteristics. Additionally, a new dataset was generated by
applying a feature selection approach to the existing dataset. The results of the study showed that the KNN
classifier achieved an accuracy rate of 98.3%, surpassing the efficiency of previous models.
Rahman et al. [16] conducted a study where they utilized various machine learning algorithms,
including J48, random forest, SVM, and KNN, to detect and prevent DDoS attacks in SDN network. They
incorporated a script to assist in the mitigation and reduction of attacks and evaluated multiple models to
identify the most suitable one for the proposed network. The findings demonstrated that J48 exhibited
superior performance compared to the other algorithms, particularly in terms of training and testing time.
Nadeem et al. [17] conducted a study to compare different machine learning classifiers, such as
KNN, Naïve Bayes, random forest, decision trees (DT), and SVM. The classifiers were assessed in terms of
their accuracy, precision, recall, and specificity. The findings revealed that the random forest classifier, with
feature subset elimination, outperformed the other algorithms in detecting DDoS flood attacks in the context
of SDN.
Meti et al. [18] conducted a machine learning algorithm comprising Naïve Bayes, neural networks,
and SVM. Machine learning models were introduced to detect DDoS flood attacks in SDN. The proposed
algorithm achieved accuracies of 70% for Naïve Bayes, 80% for neural networks, and 80% for SVM.
Ahmad et al. [19] proposed the use of machine learning techniques for mitigating SDN DoS and
DDoS attacks. Their objective was to derive significant insights by evaluating machine learning algorithms
for security detection in forthcoming communication networks. Furthermore, they assessed these approaches
based on their influence on the controller during DDoS attacks. The research revealed that SVM achieved an
impressive accuracy rate of 97.5%.
Tan et al. [20] proposed a method for detecting and mitigating SDN DDoS attacks. Their approach
involved monitoring the network to identify unexpected flows by utilizing a detection state specifically
designed for DDoS on the data layer. They employed machine learning techniques such as k-means and
KNN algorithms to detect abnormal flows based on the detection trigger mechanism and rate asymmetry
characteristics of the streams. Subsequently, the controller implemented appropriate countermeasures to
respond to the attacks. The authors successfully enhanced the accuracy and efficiency of detection while
mitigating SDN threats by introducing a novel framework that combines control plane and data plane
cooperative detection techniques. In this paper suggests enhancing the security of DDoS attack detection in
SDN controller by utilizing ensemble learning machine learning techniques.
This paper contributes to research on DDoS attacks detection using an innovative approach of
ensemble learning. The composition of ensemble learning namely random forest, gradient boosting, and
logistic regression has been tested and optimized to deliver high performance proved by computer
simulation. Also, the paper made use of a recent dataset [21] published in 2020 issue from a network
simulation using Mininet emulating ten topologies made up with switches connected to a unique controller.
23 features collected for the sake of SDN network traffic classification into benign and malicious patterns. In
our work we analyze the importance of all features, including alphabetic and structured features after
converting them into numeric format. This step reveals that some converted features have significantly much
more vital than less important features in the original dataset. Our research continues by selecting the 5 most
important features to leverage the problem of DDoS attacks classification.
The paper is structured into five sections: section 1 is the present introduction. Details of the dataset
processing, machine learning models, and the research methodology are developed in section 2. Section 3
presents the results and discussion of founding. Finally, section 4 concludes the paper.
2. METHOD
This section will cover the proposed model in four subsections, which are proposed approach,
dataset, feature extraction, selection, and machine learning models. The first subsection explains the
proposed methodology consisting in using ensemble of machine learning such as a powerful tool to leverage
complex problems. Machine learning models simulated in this research are presented in subsections 2.1 and
2.4. Subsections 2.2 and 2.3 develop the dataset attributes and features characteristics.
2.2. Dataset
The proposed approach made use of the DDoS attack SDN dataset, which had been collected by
Bennett University. The dataset had been specifically designed for SDN and was generated using the Mininet
emulator. It fulfilled the objective of traffic categorization, utilizing machine learning and deep learning
algorithms. The simulation, various types of traffic were generated, including legitimate transmission control
protocol (TCP), user datagram protocol (UDP), and internet control message protocol (ICMP) traffic. In
addition to malicious TCP Syn attacks, UDP flood attacks, and ICMP attacks were also included. The
dataset, as depicted in Table 1, consisted of 23 attributes [21].
An ensemble-based approach for effective distributed denial of service attack ... (Mohammed Majid Ahmed)
2022 ISSN: 2252-8938
Figure 2. The suggested ensemble learning method for detecting DDoS attacks
An ensemble-based approach for effective distributed denial of service attack ... (Mohammed Majid Ahmed)
2024 ISSN: 2252-8938
1⁄
𝑑(𝑥, 𝑦) = (∑𝑑𝑟=1|𝑥𝑟 − 𝑧𝑟 |𝑝 ) 𝑝 (2)
where 𝑑(𝑥, 𝑦) represents the Minkowski distance between two points 𝑥 and 𝑦, xi and yi denote the values of
the i-th feature (or dimension) of points 𝑥 and 𝑦, respectively and 𝑝 is a parameter that controls the degree of
the Minkowski distance. It is a positive real number.
‖𝑥1 − 𝑥2 ‖2 represents the squared Euclidean distance between the new data point x and the support vector xi
and γ is a hyperparameter that controls the width of the kernel and affects the smoothness of the decision
boundary. It is a positive real number.
A variety of evaluation metrics, such as accuracy, precision, and recall, have been selected to
evaluate the effectiveness of machine learning classifiers. These metrics are calculated using a confusion
matrix. Assessing the performance of these classifiers is vital for accurately detecting attacks in the SDN
controller. The mathematical representation of these metrics is provided as (4) to (7):
𝑇𝑃+𝑇𝑁
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = (4)
𝑇𝑃+𝐹𝑁+𝑇𝑁+𝐹𝑃
𝑇𝑃
𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 = (5)
𝑇𝑃+𝐹𝑃
𝑇𝑃
𝑅𝑒𝑐𝑎𝑙𝑙 = (6)
𝑇𝑃+𝐹𝑁
2×𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛×𝑅𝑒𝑐𝑎𝑙𝑙
𝐹1 = (7)
𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛+𝑅𝑒𝑐𝑎𝑙𝑙
Table 4 presents the simulation outcomes for each classifier. All metrics were evaluated in a
computer simulation after adequate training of the machine learning models. These results correspond to a
simulation conducted under the specified conditions described in this section. Based on the simulation
results, it is evident that the proposed model exhibits a high level of accuracy in detecting DDoS attacks,
surpassing 99%. This accuracy rate is exceptionally high, demonstrating the model's effectiveness.
Furthermore, the application of ensemble techniques further enhances accuracy, approaching nearly 100%.
This improvement in accuracy, pinpointed in Table 5, is particularly noteworthy and highlights the
significance of the boosting ensemble approach in enhancing the model's performance.
4. CONCLUSION
The impact of DDoS attacks on networks is a significant concern, as they have the potential to cause
complete disruption if not effectively addressed. These attacks are growing in complexity and can easily
evade traditional protection techniques. To tackle network security challenges, machine learning techniques
are being implemented in SDN. The DT, KNN, and SVM algorithms are employed to construct implicit or
explicit models from available data. These models enable systems to learn from the data without explicit
programming, uncover hidden patterns, and gain valuable insights. By leveraging machine learning, it is
possible to enhance the effectiveness of network features, thereby contributing to the intelligent mitigation of
DDoS attacks. Among the employed machine learning algorithms, ensemble learning achieved the best
results with an accuracy of 99%, outperforming the other algorithms. In the future, there will be an emphasis
on creating a mitigation module specifically designed for the studied attacks in this research. Developing an
efficient and cost-effective mitigation plan entails tackling various obstacles. One such challenge involves
guaranteeing the termination of all dubious communications by leveraging SDN's programmability capability,
which can be achieved through the implementation of blocking rules in edge switches. Moreover, optimizing the
utilization of controllers and switching resources to implement mitigation policies, reducing the response time of
the mitigation system, and ensuring scalability of the solution are all important factors to consider in the process.
REFERENCES
[1] A. A. Alashhab, M. S. M. Zahid, M. A. Azim, M. Y. Daha, B. Isyaku, and S. Ali, “A survey of low rate DDoS detection techniques
based on machine learning in software-defined networks,” Symmetry, vol. 14, no. 8, pp. 1-30, 2022, doi: 10.3390/sym14081563.
[2] K. M. Sudar, M. Beulah, P. Deepalakshmi, P. Nagaraj, and P. Chinnasamy, “Detection of distributed denial of service attacks in
SDN using machine learning techniques,” in 2021 International Conference on Computer Communication and Informatics,
ICCCI 2021, IEEE, 2021, pp. 1-5, doi: 10.1109/ICCCI50826.2021.9402517.
[3] A. Shirmarz, A. Ghaffari, R. Mohammadi, and S. Akleylek, “DDOS attack detection accuracy improvement in software defined
network (SDN) using ensemble classification,” in 14th International Conference on Information Security and Cryptology,
ISCTURKEY 2021, IEEE, 2021, pp. 111–115, doi: 10.1109/ISCTURKEY53027.2021.9654403.
[4] J. Wang and L. Wang, “SDN-defend: a lightweight online attack detection and mitigation system for DDoS attacks in SDN,”
Sensors, vol. 22, no. 21, pp. 1-21, 2022, doi: 10.3390/s22218287.
[5] A. A. Aburomman and M. B. I. Reaz, “A survey of intrusion detection systems based on ensemble and hybrid classifiers,”
Computers and Security, vol. 65, pp. 135–152, 2017, doi: 10.1016/j.cose.2016.11.004.
[6] A. Shirmarz and A. Ghaffari, “Automatic software defined network (SDN) performance management using TOPSIS decision-
making algorithm,” Journal of Grid Computing, vol. 19, no. 2, pp. 1-21, 2021, doi: 10.1007/s10723-021-09557-z.
[7] A. Shirmarz and A. Ghaffari, “An adaptive greedy flow routing algorithm for performance improvement in software-defined network,”
International Journal of Numerical Modelling: Electronic Networks, Devices and Fields, vol. 33, no. 1, 2020, doi: 10.1002/jnm.2676.
[8] S. Saraswat, V. Agarwal, H. P. Gupta, R. Mishra, A. Gupta, and T. Dutta, “Challenges and solutions in software defined networking:
a survey,” Journal of Network and Computer Applications, vol. 141, pp. 23–58, Sep. 2019, doi: 10.1016/j.jnca.2019.04.020.
[9] I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani, “Developing realistic distributed denial of service (DDoS) attack
dataset and taxonomy,” in 2019 International Carnahan Conference on Security Technology (ICCST), IEEE, 2019, pp. 1-8, doi:
10.1109/CCST.2019.8888419.
An ensemble-based approach for effective distributed denial of service attack ... (Mohammed Majid Ahmed)
2026 ISSN: 2252-8938
[10] M. Al-Farttoosi and H. Abdulkader, “Botnet mobile detection using machine & deep learning techniques,” in 2022 Iraqi
International Conference on Communication and Information Technologies, IICCIT 2022, IEEE, Sep. 2022, pp. 82–87, doi:
10.1109/IICCIT55816.2022.10010653.
[11] Cisco, “Cisco annual internet report (2018-2023),” White Paper Cisco Public, pp. 1–35, 2020.
[12] Deloitte, “Defending against distributed denial of service (DDoS) attacks,” Deloitte Canada. [Online]. Available:
https://www2.deloitte.com/ca/en/pages/risk/articles/DDoSattacks.html (accessed Sep. 24, 2023).
[13] S. Dong and M. Sarem, “DDoS attack detection method based on improved KNN with the degree of DDoS attack in software-
defined networks,” IEEE Access, vol. 8, pp. 5039–5048, 2020, doi: 10.1109/ACCESS.2019.2963077.
[14] J. A. P. -Diaz, I. A. Valdovinos, K. K. R. Choo, and D. Zhu, “A flexible SDN-based architecture for identifying and mitigating low-
rate DDoS attacks using machine learning,” IEEE Access, vol. 8, pp. 155859–155872, 2020, doi: 10.1109/ACCESS.2020.3019330.
[15] H. Polat, O. Polat, and A. Cetin, “Detecting DDoS attacks in software-defined networks through feature selection methods and
machine learning models,” Sustainability, vol. 12, no. 3, pp. 1-16, 2020, doi: 10.3390/su12031035.
[16] O. Rahman, M. A. G. Quraishi, and C. H. Lung, “DDoS attacks detection and mitigation in SDN using machine learning,” in
2019 IEEE World Congress on Services, SERVICES 2019, IEEE, 2019, pp. 184–189, doi: 10.1109/SERVICES.2019.00051.
[17] M. W. Nadeem, H. G. Goh, V. Ponnusamy, and Y. Aun, “Ddos detection in sdn usingmachine learning techniques,” Computers,
Materials and Continua, vol. 71, no. 1, pp. 771–789, 2022, doi: 10.32604/cmc.2022.021669.
[18] N. Meti, D. G. Narayan, and V. P. Baligar, “Detection of distributed denial of service attacks using machine learning algorithms
in software defined networks,” in 2017 International Conference on Advances in Computing, Communications and Informatics,
ICACCI 2017, IEEE, Sep. 2017, pp. 1366–1371, doi: 10.1109/ICACCI.2017.8126031.
[19] A. Ahmad, E. Harjula, M. Ylianttila, and I. Ahmad, “Evaluation of machine learning techniques for security in SDN,” in 2020
IEEE Globecom Workshops, IEEE, 2020, pp. 1-6, doi: 10.1109/GCWkshps50303.2020.9367477.
[20] L. Tan, Y. Pan, J. Wu, J. Zhou, H. Jiang, and Y. Deng, “A new framework for DDoS attack detection and defense in SDN
environment,” IEEE Access, vol. 8, pp. 161908–161919, 2020, doi: 10.1109/ACCESS.2020.3021435.
[21] N. Ahuja, G. Singal, and D. Mukhopadhyay, “DDOS attack SDN dataset”, Mendeley Data, V1, 2020, doi: 10.17632/jxpfjc64kr.1.
[22] N. Ashodia and K. Makadiya, “Detection of DDoS attacks in SDN using machine learning,” in 2022 International Conference on
Electronics and Renewable Systems (ICEARS), IEEE, 2022, pp. 1322–1327, doi: 10.1109/ICEARS53579.2022.9751879.
[23] M. H. H. Khairi et al., “Detection and classification of conflict flows in SDN using machine learning algorithms,” IEEE Access,
vol. 9, pp. 76024–76037, 2021, doi: 10.1109/ACCESS.2021.3081629.
[24] P. Hadem, D. K. Saikia, and S. Moulik, “An SDN-based intrusion detection system using SVM with selective logging for IP
traceback,” Computer Networks, vol. 191, pp. 1-11, 2021, doi: 10.1016/j.comnet.2021.108015.
[25] F. Khashab, J. Moubarak, A. Feghali, and C. Bassil, “DDoS attack detection and mitigation in SDN using machine learning,” in
Proceedings of the 2021 IEEE Conference on Network Softwarization: Accelerating Network Softwarization in the Cognitive Age,
NetSoft 2021, IEEE, 2021, pp. 395–401, doi: 10.1109/NetSoft51509.2021.9492558.
[26] M. Huang and B. Zhao, “A DDoS attack detection algorithm based on improved grid search to optimize SVM in SDN
environment,” in 2023 IEEE 2nd International Conference on Electrical Engineering, Big Data and Algorithms, EEBDA 2023,
IEEE, 2023, pp. 218–222, doi: 10.1109/EEBDA56825.2023.10090555.
[27] M. Kavitha, M. Suganthy, A. Biswas, R. Srinivsan, R. Kavitha, and A. Rathesh, “Machine learning techniques for detecting
DDoS attacks in SDN,” in International Conference on Automation, Computing and Renewable Systems, ICACRS 2022 -
Proceedings, IEEE, 2022, pp. 634–638, doi: 10.1109/ICACRS55517.2022.10029110.
[28] A. K. Kurakula, K. Akhila, M. Bhavya, and M. V. Sai, “Detecting distributed DoS attacks on SDN using machine learning (ML)
methods,” in International Conference on Innovative Data Communication Technologies and Application, ICIDCA 2023 -
Proceedings, IEEE, 2023, pp. 767–772, doi: 10.1109/ICIDCA56705.2023.10099680.
BIOGRAPHIES OF AUTHORS