0% found this document useful (0 votes)
27 views17 pages

Main Paper

Uploaded by

elian kid micke
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views17 pages

Main Paper

Uploaded by

elian kid micke
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Engineering Applications of Artificial Intelligence 123 (2023) 106432

Contents lists available at ScienceDirect

Engineering Applications of Artificial Intelligence


journal homepage: www.elsevier.com/locate/engappai

Towards a machine learning-based framework for DDOS attack detection in


software-defined IoT (SD-IoT) networks
Jalal Bhayo a , Syed Attique Shah b ,∗, Sufian Hameed a , Awais Ahmed c , Jamal Nasir a ,
Dirk Draheim d
a
Department of Computer Science, National University of Computer and Emerging Sciences (NUCES-FAST), 75160, Karachi, Pakistan
b
School of Computing and Digital Technology, Birmingham City University, STEAMhouse, B47RQ, Birmingham, United Kingdom
c University of Electronic Science and Technology of China (UESTC), 610056, Sichuan, China
d Information Systems Group, Tallinn University of Technology, 12618 Tallinn, Estonia

ARTICLE INFO ABSTRACT


Keywords: The Internet of Things (IoT) is a complex and diverse network consisting of resource-constrained sen-
Internet of things (IoT) sors/devices/things that are vulnerable to various security threats, particularly Distributed Denial of Services
DDoS attacks (DDoS) attacks. Recently, the integration of Software Defined Networking (SDN) with IoT has emerged as a
Software defined networks (SDN)
promising approach for improving security and access control mechanisms. However, DDoS attacks continue to
SDN-WISE
pose a significant threat to IoT networks, as they can be executed through botnet or zombie attacks. Machine
Intrusion detection system (IDS)
Machine learning
learning-based security frameworks offer a viable solution to scrutinize the behavior of IoT devices and compile
a profile that enables the decision-making process to maintain the integrity of the IoT environment. In this
paper, we present a machine learning-based approach to detect DDoS attacks in an SDN-WISE IoT controller.
We have integrated a machine learning-based detection module into the controller and set up a testbed
environment to simulate DDoS attack traffic generation. The traffic is captured by a logging mechanism added
to the SDN-WISE controller, which writes network logs into a log file that is pre-processed and converted
into a dataset. The machine learning DDoS detection module, integrated into the SDN-WISE controller, uses
Naive Bayes (NB), Decision Tree (DT), and Support Vector Machine (SVM) algorithms to classify SDN-IoT
network packets. We evaluate the performance of the proposed framework using different traffic simulation
scenarios and compare the results generated by the machine learning DDoS detection module. The proposed
framework achieved an accuracy rate of 97.4%, 96.1%, and 98.1% for NB, SVM, and DT, respectively. The
attack detection module takes up to 30% usage of memory and CPU, and it saves about 70% memory while
keeping the CPU free up to 70% to process the SD-IoT network traffic with an average throughput of 48
packets per second, achieving an accuracy of 97.2%. Our experimental results demonstrate the superiority of
the proposed framework in detecting DDoS attacks in an SDN-WISE IoT environment. The proposed approach
can be used to enhance the security of IoT networks and mitigate the risk of DDoS attacks.

1. Introduction Therefore, there is a high demand to rapidly address these rising secu-
rity concerns, or IoT applications will face inevitable threats. However,
With the advancing Internet of Things (IoT) innovations, there is ex- due to the heterogeneous nature of IoT devices, it is challenging to
ponential growth in the inclusion of various kinds of ‘‘things’’/ devices/ deploy security mechanisms (Yaqoob et al., 2019).
sensors/ objects into the Internet. These resource-constrained ‘‘things’’ The number of Internet-connected devices in the IoT environment
can be an easy target for attackers to launch various types of attacks, in- is expected to exceed 100 billion by the end of 2025 (Taylor et al.,
cluding Denial-of-Service (DoS), Man-In-The-Middle (MITM), and mal- 2015). The proliferation of heterogeneous devices and objects in IoT
ware attacks. In the last decade, the escalating usage of heterogeneous environments has uncovered deficiencies in security protocols and
IoT devices has extended challenges related to security, performance, mechanisms within IoT frameworks (Chernyshev et al., 2017). These
accessibility, and scalability. With this growing IoT dilemma, more security loopholes make IoT devices easy targets, and more ambi-
connected devices mean more assault vectors and more conceivable tious attacks on IoT devices have been long predicted. For example,
outcomes for attackers to target (Wang et al., 2020; Ali et al., 2020). there are reported incidents of seizing access control of various IoT

∗ Corresponding author.
E-mail addresses: [email protected] (J. Bhayo), [email protected] (S.A. Shah), [email protected] (S. Hameed),
[email protected] (A. Ahmed), [email protected] (D. Draheim).

https://doi.org/10.1016/j.engappai.2023.106432
Received 8 July 2022; Received in revised form 9 April 2023; Accepted 5 May 2023
Available online 23 May 2023
0952-1976/© 2023 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license
(http://creativecommons.org/licenses/by/4.0/).
J. Bhayo, S.A. Shah, S. Hameed et al. Engineering Applications of Artificial Intelligence 123 (2023) 106432

devices in the home or mechanical ecosystems to exfiltrate sensitive adaptive polling-based samples with Snort IDS were proposed on the
data of individuals. Moreover, IoT devices are dynamically recruited data plane, along with the deep-learning Stacked Auto-encoders (SAE)
into botnet armed forces for multi-stage Distributed Denial of Services on the control plane (Ujjan et al., 2020). The active mode of the
(DDoS) attacks (Hallman et al., 2017). Today, the definition of a proposed framework is significantly more effective than the passive
DDoS attack gets more and more complicated as cybercriminals utilize mode with respect to preprocessing and DDoS detection in the traffic
combinations of high-volume attacks. It is becoming more challenging selector method. The framework seems to be useful in combination with
to detect infiltration that targets applications and existing network se- conventional security mechanisms to optimize the results and detection
curity infrastructures such as firewalls and intrusion prevention systems time. However, the SAD-F framework is based on a traditional network
(IPS). and suffers from dynamic reprogramming and central management
Attacks on IoT devices are increasing, as according to the report control. Our framework is also based on ML algorithms, but aided by
of a security vendor, 100 million IoT attacks have been detected in SDN, i.e., it provides a unique solution to SD-IoT networks. Hameed
the first half of 2019. Cybersecurity and anti-virus provider Kaspersky and Ali (2018) propose the HADEC framework for live flooding-based
spotted 105 million attacks from 276 thousand unique IP addresses in DDoS attack detection using MapReduce and Hadoop. HADEC takes
the first six months of 2019 (Over 100 Million, 2021). According to less than 5 min to process 1 GB of the log file having 15.83 GB
the same report, the most common malware types have been Mirai and generated live traffic. According to the results, HADEC takes low-
Nyadrop and the majority of IoT devices have been affected in China time attack detection, near real-time, but it is more CPU intensive,
(30%), Brazil (19%) and Egypt (12%) (Over 100 Million, 2021). Cicero, and the capturing phase consumes 77% of the overall detection time.
a network security company, has noticed a dramatic increase in the Instead, our framework is based on SD-IoT, which provides dynamic
frequency of attack attempts against its customers (Corero, 2020). Dyn, and programmable features. Additionally, with the help of supervised
a provider of Domain Name System (DNS) services, was attacked in machine learning classifiers, it efficiently detects DDoS attacks in much
October 2016 by two large and complex DDoS attacks against its DNS less time. Similarly, Yin et al. (2018) proposed an SD-IoT framework for
infrastructure (DDoS attack, 2016). Due to the attack, large numbers of security against DDoS attacks. The framework consists of DDoS attack
Internet platforms and services – including well-known brands such as detection and mitigation algorithms based on the cosine similarity
Spotify, Netflix, Reddit, and Twitter – experienced significant service vector of incoming packet messages at the boundary of SD-IoT switches
outages. Another report indicates that DDoS attacks during the global to determine the DDoS attack based on the threshold of the cosine sim-
pandemic year 2020 significantly increased in number as compared to ilarity vector. The algorithms work only on packet-in messages; while,
our proposed architecture focuses on a machine learning classifier that
the previous years (DDoS Attacks Spiked, 2021). The report also reveals
uses distinct network attributes to classify the DDoS attack traffic from
different projections of DDoS attacks that depict more complex and
the SD-IoT network traffic flow. In this regard, we investigated different
high-frequency attacks as compared to prior years.
IDS applications for IoT networks including a time-efficient IDS (Zhang
The Software-Defined Networking (SDN) paradigm opens tremen-
et al., 2020) which is based on SD-IoT, Counter-based DDoS attack
dous opportunities to manage and secure IoT. SDN aims at creating
detection IDS (Bhayo et al., 2020), and other machine learning–based
network architectures that are more agile, flexible, and smart, making
IDS for IoT (Verma and Ranga, 2020). The main objective of these IDS
them different from the traditional networking architecture (Bhayo
is to detect attacks in IoT networks and to ensure security in the IoT
et al., 2022). An IoT network is different from a traditional net-
domain.
work at various levels. Characteristic differences are in processing
SDN-IoT could face challenges in terms of performance, interoper-
power, scalability, energy consumption, etc., which, however, also
ability, scalability, dependability, and security (Xie et al., 2018). Fur-
creates a significant management challenge for IoT networks. SDN has
thermore, SDN poses a great challenge in network management (Ghaf-
emerged as a promising network model with exponential growth in
far et al., 2021). Despite of rapid increase in research in the area
network management and configuration complexity (Siddiqui et al.,
of applications SDN-IoT using machine learning, it is facing multi-
2022; Khalid et al., 2023). SDN seeks to effectively turn network
ple open and on-demand challenges including but not limited to (a)
design and operations to become more agile and to efficiently improve Unavailability of quality datasets for appropriate training, (b) Un-
network functions (Hameed et al., 2021; Bawany and Shamsi, 2019). awareness of distributed and scalable multi-controller platforms, (c)
The SDN paradigm has unique features that provide a dynamic and pro- Continuous improvement of network security, and (d) Incremental
grammable network with centralized management, where the network deployment of SDN. The fusion of SDN and IoT brings several ad-
is abstracted from the upper-layer applications. SDN controller provides vantages, including intelligent routing, efficient data processing and
centralized network intelligence and helps network administrators to analysis, centralized application and resource management, and dy-
monitor, protect, and optimize network resources dynamically and namic network reconfiguration. These benefits are derived from SDN’s
programmatically configure network traffic patterns (Ahmad et al., programmable and centralized network infrastructure, which simplifies
2015). The SDN controller cannot only manage the IoT heterogeneous network management, enhances flexibility, and enables the implemen-
system but can also monitor the incoming and outgoing traffic. tation of innovative network services and applications in a scalable and
Recently, machine learning (ML) is widely used to aid in various cost-effective manner.
aspects related to instruction detection and other security and threat Developing and improving ML and SDIoT-based frameworks that
analysis. ML supports diverse network traffic-generated datasets and a address the potential security challenges associated with IoT devices
number of data features that can be helpful to get better insights once is an overlooked aspect in the current literature. Our proposed frame-
properly analyzed (Di Mauro et al., 2021). In integration with ML, the work is based on software-defined IoT and includes dynamic and
Software-Defined Internet of Things (SD-IoT) can offer various solutions re-programmable characteristics that enable the SD-IoT network to
to tackle the security challenges faced by IoT devices. Cui et al. (2019) perform security services. The framework detects DDoS attacks with
utilized a support vector machine (SVM) algorithm to train the attack high accuracy and detection rates by incorporating machine learning
detection module in the SDN for classifying DDoS attack patterns. They methods. Our suggested framework for the SD-IoT network is based
highlight the importance of cognitive-inspired computing with entropy on machine learning and consists of three distinct independent compo-
technique using entropy values as a feature vector. The implemented nents: (1) A data-plane module made up of Sensor OpenFlow Switches
mechanism quickly detects and mitigates DDoS attacks and therefore (SOFS) and IoT devices; (2) An IoT controller module comprised of
restores back to normal communication in time. In this study, we use adjusted SDN-WISE that manages and controls the SD-IoT network; and
naive Bayes and Decision Tree (DT) along with an SVM classifier to (3) A machine learning-based DDoS attack detection module consisting
get more improved and competitive results. In order to detect huge of various supervised learning-based classifiers for classifying malicious
amounts of SDN malicious traffic and DDoS attacks, the sFlow and and legitimate traffic flow.

2
J. Bhayo, S.A. Shah, S. Hameed et al. Engineering Applications of Artificial Intelligence 123 (2023) 106432

The proposed framework provides an innovative solution to one of Table 1


the biggest challenges faced by SD-IoT networks i.e., DDoS attacks. List of most common abbreviations.

Industries such as healthcare, finance, and transportation are heavily Acronym Full term(s)
reliant on IoT networks to transmit sensitive data. Any security breach AI Artificial Intelligence
in these networks could have devastating consequences. With the inte- ANN Artificial Neural Network
BNE Bayesian–Nash Equilibrium
gration of SDN and IoT, the proposed framework provides a promising
CAIDA Center for Applied Internet Data Analysis
solution for better security and access control mechanisms. By imple- C-DAD Counter-based DDoS detection
menting a machine learning-based security framework to scrutinize IoT DT Decision Tree
devices’ movements and compile a profile, the framework can detect DNN Deep Neural Network
abnormal traffic and prevent DDoS attacks in SD-IoT networks. With DoS Denial-of-Service
the rapid development of various IoT domains such as Smart Cities, DDoS Distributed Denial of Services
DNS Domain Name System
Smart vehicles, etc., security application development for IoT networks IoT Internet of Things
is one of the essential parts of these domains (Siddiqui et al., 2023). The IDPS Intrusion Detection and Prevention System
proposed framework’s applications extend beyond industries to smart k-NN k-Nearest Neighbor
cities and cloud computing data centers. With the rapid increase in IoT ML Machine Learning
devices used in smart cities, the risk of cyber-attacks and DDoS attacks MITM Man-in-the-Middle
NB Naive Bayes
are a growing concern. By deploying the proposed framework, admin-
RF Random Forest
istrators can prevent service disruptions and improve the reliability of SOFS Sensor OpenFlow Switches
smart city applications. SDN Software Defined Networking
The main contributions of this research are given as follows: SDN-WISE Software Defined Networking solution for Wireless Sensor Networks
SD-IoT Software-Defined Internet of Things
• A novel framework designed for an implemented system based on SVM Support Vector Machine
machine learning and Software-defined IoT with dynamic and re- WSN Wireless Sensor Networks
programmable features is presented for the effective and timely
detection of DDoS attacks.
• The ML-based module runs on top of the SDN-WISE controller and
• Distinguishing a genuine and sufficient selection of features that
consists of different supervised learning classifiers such as Naive
can be used to construct efficient models for differentiating DDoS
Bayes, SVMs, and Decision Trees (DT)s to efficiently determine
attacks from normal traffic.
the malicious traffic flow. DT has an accuracy ratio of 98.1%,
• Assessing the viability of the various machine-learning
whereas Naive Bayes and SVM have an accuracy rate of 97.4%
and 96.1%, respectively. approaches employed in the discovery process.
• The proposed framework thoroughly analyzes the given param- Statistical approaches can be used to detect suspicious patterns
eters such as IoT nodes, attack nodes, payload size, and packet in resource utilization in response to DDoS attacks. The issue with
frequency with the selected classifiers to measure the perfor- statistics-based identification is that it is not conceivable to discover the
mance of an SD-IoT network through outcome factors such as CPU typical network packet distribution. Or maybe, it must be reproduced as
usage, attack detection time, and memory usage. According to the a uniform distribution (Lee et al., 2008). A few strategies which apply
results, the early detection of malicious traffic within the SD IoT data mining methods can acquire a high success rate in recognizing
network is a major advantage in the prevention of high levels the attacks. In any case, these techniques generally cannot be utilized
of exploitations and the isolation of IoT devices from malicious
as a part of real-time computing (Xu et al., 2007). One advantage of
nodes.
clustering over statistical methods is that they are not dependent on
Table 1 presents the most used acronyms in this paper. The rest any prior knowledge about the data distribution. Numerous factors can
of the paper has the following structure. Section 2 presents the re- be utilized to recognize common network patterns. However, obtain-
lated work. Section 3 discusses the proposed ML- and SD-IoT-based ing fundamental characteristics from a massive network is critical for
framework and explains each component of the framework in detail. modeling network behaviors that are distinct from normal traffic.
Section 4 discusses the testbed experimental setup and explains the Numerous studies have been conducted on the problem of feature
results gathered during the experiments and finally Section 5 presents extraction. For example, Chhabra et al. (2013) selected eight relative
the conclusion. values as features independent of the network stream. Haddadi et al.
(2010) suggest and investigate recognizable evidence of successful
2. Related work network features for attack detection testing, applying the principal
component analysis (PCA) technique to determine an optimal set of
Several studies in the existing literature have analyzed DDoS attacks
capabilities. Software-Defined Networking (2020) examined the ap-
and contributed various protection mechanisms (Tayyab et al., 2020;
plication of multivariate relationship analysis to DDoS discovery and
Snehi and Bhandari, 2021; Alamri and Thayananthan, 2020). The most
developed a strategy for recognizing flooding attacks using co-variance
broadly utilized defense methods are identifying and mitigating DDoS
analysis. They used the majority of the flag bits in the TCP header’s flag
attacks, traffic separation, and trace-back the DDoS source. DDoS detec-
field as highlights in the co-variance investigation presentation. The
tion solutions are effectively separating typical streams of activity from
researchers demonstrated the effectiveness of the proposed technique in
unusual streams of activity. Traffic separation solutions obstruct sub-
stantial movement, while trace-back mechanisms must be compelling detecting SYN flooding attacks, a critical sort of DDoS attack, however,
under sponsored activity performed for the most part after the assault. the technique faces a severe hurdle because there is no guarantee
A large portion of current DDoS identification systems has constrained that the six flags are substantial or sufficient attributes for reliably
achievements considering the accompanying difficulties: (a) the attack distinguishing all sorts of DDoS attacks.
frequently uses legit requests to overload the target itself, making it A variety of statistics and machine learning techniques can be
difficult to distinguish an attack movement from normal activity, (b) employed to detect the unusual changes in resource use associated
quick ongoing recognition is troublesome due to the enormous measure with DDoS attacks. Both techniques, however, have their limitations.
of information associated with the current network (Suresh and Anitha, For example, one obvious limitation of statistics-based detection is the
2011). inability to determine the usual network packet circulation. This issue
Two critical and challenging research concerns in identifying DDoS can be resolved by employing clustering methodology to construct
attacks are as follows: the standard examples, as one of the advantages of clustering tactics

3
J. Bhayo, S.A. Shah, S. Hameed et al. Engineering Applications of Artificial Intelligence 123 (2023) 106432

over measurement procedures is that they are not dependent on any been conducted to benchmark the datasets, including NSL-KDD, UNSW-
previously known information transmission. While machine learning NB15, and UNB ISCX 12, to get accuracy with satisfactory false-positive
algorithms, which are frequently derived from the overlapping field of rates. However, this research is based on a traditional network, while
information mining, have been shown to be quite accurate at identify- our research is based on a supervised machine learning approach using
ing DDoS attacks, they also have their own limits. For example, these SD-IoT for IoT networks for getting more efficient performance.
systems demand a significant learning period, and as a result, these In da Costa et al. (2019), Kelton et al. investigate the contemporary
techniques cannot be used progressively at the moment. Regardless techniques used for intrusion detection based on machine learning for
of these constraints, solutions to the DDoS recognition problem will the IoT. The research reveals valuable techniques for achieving a better
emerge from either or both of these domains and major research effort recognition rate for malicious traffic. Some methods can reduce the
is being directed in this direction. Lee et al. (2008), for example, false-positive rates but with increased classification and training time.
used a multiclass SVM characterization model to detect DDoS threats. Therefore, it is perceived that false-positive rates are still a problem
In the solution proposed by Xu et al. (2007), a collection of new for the researcher for further future work to minimize false-positive
features was also presented, including the establishment of relative rates. The authors surveyed the machine learning-based work, which
values as a critical component of an extended arrangement of discovery summarizes the different papers mostly based on TCP/IP and few
data. Additionally, they presented another method of detecting DDoS are related to IPv6 over Low-Power Wireless Personal Area Networks
attacks through the use of attack force. In Ahmed et al. (2020), Ahmed (6LowPAN). According to this study, further research is needed to
et al. presented a scalable Spark-based live DDoS detection framework, improve the false-positive rate for DDoS detection in IoT networks. In
termed SAD-F, which is capable of analyzing potential DDoS attacks this context, we will provide a methodology for detecting DDoS attacks
without any time delays, as the framework’s performance has been over the SD-IoT network that is based on supervised machine learning.
tested against both live and passive traffic. SAD-F first captures live Pande et al. (2020) generates DDoS attacks through the ping of death
netflow traffic by using (Wireshark) live traffic capturing feature, then technique and detects DDoS attacks with machine learning techniques.
preprocesses it to extract required information, and finally uses ML- The experiment is conducted with the random forest (RF) machine
Spark algorithms to run detection algorithms for DDoS flooding attacks. learning classifier to classify DDoS traffic using the WEKA tool. The
SAD-F tackles the difficult problems of the traditional approach in terms model is trained with a supervised learning algorithm and gets 97.76%
of scalability, memory inefficiencies, and processes by parallel data results for classification using the NSL-KDD dataset. We also use the
processing with better efficiency and low latency. Bhayo et al. (2020) WEKA tool and RF classifier; however, we additionally added other
explored various research gaps and security challenges associated with supervised learning classifiers such as SVM and DT and Naive Bayes.
the IoT and proposed a solution for counter-based DDoS detection The testing conducted in our research is distinctive because it is based
(C-DAD) in SD-IoT networks. However, this architecture is built on on the IEEE 802.15.4 protocol with the help of SD-IoT.
a counter-based approach, whereas our research relies on machine SDN despite being a potential network architecture that gives op-
learning algorithms that efficiently detect DDoS attacks against trained erators more control over a network infrastructure, its architectural
malicious patterns. entities pose several security risks and targets which makes it vulner-
In Suresh and Anitha (2011), the authors introduced a new prob- able to DDoS attacks. To tackle this problem, authors in Sahoo et al.
abilistic packet inspection (PPM) model called TTL-based PPM plot, (2020) use SDN’s centralized control to identify DDoS attacks on the
in which each bundle is separated with a probability inversely pro- control layer. They proposed an evolutionary SVM model from machine
portional to the separation traversed by the parcel up to this point, learning to detect malicious traffic. Further, this article integrated the
enabling a casualty source to track back the attack source. Nguyen Genetic Algorithm(GA), ‘‘KPCA: Kernel Principal Component Analy-
and Choi (2010) have developed an Anti-DDoS structure based on k- sis’’ to improve SVM identification accuracy (GA). The experimental
NN (k-nearest neighbor) classification for proactively identifying DDoS findings demonstrate that the proposed model provides more accurate
attacks. They used the k-NN approach to categorize the system’s state classification and greater generalization than single-SVM. In addition,
during each DDoS attack session. While the k-NN strategy is superior the proposed model can be implemented within the controller in order
for assault discovery, it is computationally expensive for continuous to build security rules that block potential attacks. Additionally, Radial
use as the number of concurrent operations increases. Eskin et al. Basis Function N-RBF is employed to speed up the learning process.
(2002) performed anomaly detection using an SVM classifier in which Experimental results also show that KPCA outperforms Principal Com-
the feature space is mapped into another component space. Similarly, ponent Analysis (PCA) on the DDoS dataset. Their model outperforms
Yuan and Mills (2005), the author catches the traffic pattern of a DDoS the baseline model in accuracy by 0.9897%.
attack using cross-relationship analysis. Nagtilak et al. (2020) propose DDoS attacks have always threatened network security. Since its
to enhance the DDoS attack detection model based on deep learning inception, both industry and academia have been exploring DDoS
for the IoT system. The detection model detects the attack in less detection and defense. DDoS detection and mitigation methods have
time and provides better future extraction and good performance than been developed so far. Most methods cannot efficiently detect a small
conventional algorithms. The model takes advantage of deep learning number of attacks and fail to minimize false alarms. In Agarwal et al.
to train massive generated data and efficiently detect DDoS attacks in (2022), the authors present a novel approach to DDoS mitigation using
IoT systems. a deep neural network (FS-WOA-DNN) — a new feature selection-
Du and Wang (2019) proposed a honeypot strategy for DDoS attacks whale optimization technique. The input dataset undergoes a min–max
in the industrial Internet of things using SDN. SDN provides dynamic normalization approach in the pre-processing phase to replace all of
protection through a honeypot strategy to efficiently control the ma- the input within a predetermined range. Following normalization, the
licious attacker. They also propose a pseudo-honeypot game (PHG) data is sent into the proposed FS-WOA to help pick the finest features
strategy that protects from anti-honeypot-based attacks and proves for classification. A deep neural network classifier is applied to the
several Bayesian–Nash Equilibrium (BNE) groups in the PHG strategy. data to determine whether it is ‘‘normal’’ or ‘‘attacked,’’ based on the
This strategy-based method improves energy consumption and IoT selected features. The normal data is encrypted using homomorphic
security. Idhammad et al. (2018) present a semi-supervised Machine methods and safely stored in the cloud, thus strengthening the security
learning-based approach to detect DDoS attacks. The author uses co- of the proposed architecture. The proposed algorithm was simulated
clustering, information gain ratio, network entropy estimation, and and validated using the MATLAB tool and the results indicate that it
extra trees classifier to classify DDoS traffic accurately. The supervised can find DDoS attacks with a 95.35% accuracy rate.
algorithms are used to reduce the false-positive rates and unsupervised In a recent study (Agrawal et al., 2022), authors proposed a novel
models for classifying malicious traffic. Different experiments have approach towards DDoS detection. They suggested a Modified version

4
J. Bhayo, S.A. Shah, S. Hameed et al. Engineering Applications of Artificial Intelligence 123 (2023) 106432

Table 2
Comparison of existing literature on DDoS attack detection techniques.
Study Traditional DDoS detection techniques Machine learning DDoS detection techniques
CPU utilization Memory utilization Detection time Throughput CPU utilization Memory utilization Detection time Throughput
Bhayo et al. (2020) Yes Yes Yes Yes No No No No
Gillani et al. (2018) No No Yes Yes No No No No
Van Adrichem et al. (2014) Yes No Yes Yes No No No No
Cui et al. (2016) Yes No No No No No No No
Ahmed and Kim (2017) Yes Yes No No Yes Yes Yes Yes
Patil et al. (2019) No Yes Yes No No No No No
Chen et al. (2019) No No No No No No Yes No
Mohammadi et al. (2019) Yes Yes Yes No No No No No
Ahmed et al. (2020) No No No No Yes Yes Yes Yes
Hameed and Ali (2018) Yes Yes Yes Yes No No No No

Table 3
Threat model analysis for SD-IoT.
Vulnerability Attack type Detection approaches
Unencrypted data stored Ransomware attack Differential area analysis (Davies et al., 2021)
Targeted interference Jamming attack Unsupervised learning with clustering
(Karagiannis and Argyriou, 2018)
Default, weak, or guessable passwords Bruteforce attack IDS using attack patterns (Raikar and Meena,
2021)
Firmware access Privilege escalation attack Multi-feature-based behavior of privilege
escalation attack detection method (Shen et al.,
2020)
Memory corruption Buffer overflow Bio-inspired based approach (Hamidouche
exploitation et al., 2019)
XSS IoT sensor device Botnet N-BaIoT (Meidan et al., 2018)
Directory traversal HTTP attack Edge Intelligence (EI)-enabled HTTP anomaly
detection framework (An et al., 2021)
Lack of device management DoS, DDoS C-DAD (Bhayo et al., 2020)
Insecure network services Malware Fuzzy pattern tree methods for malware
detection (Dovom et al., 2019)
Security and privacy Eavesdropping attacks ML-based detection technique (Xiao et al.,
2018)

of a Deep Belief Neural Network (M-DBNN) to achieve low false- 3. Machine learning-based proposed framework for secure SD-IoT
positive rates and high prediction accuracy. The Center for Applied
Internet Data Analysis (CAIDA) ‘‘DDoS Attack 2007’’ dataset is used 3.1. Security analysis for the proposed framework
to test the proposed model. The method achieves an accuracy of 87%,
and its results are compared to those obtained by using a deep neural Security analytics is an approach that focuses on data analysis to
network (DNN), SVM, an artificial neural network (ANN), and a neural produce proactive security solutions. Security analytic-based frame-
network (NN). High detection accuracy with minimal false positives is works are frequently designed to detect threats over models or appli-
a key feature of the suggested approach. cations. Various solutions can be found focusing on security threats
SDN is an approach that utilizes software programs to centrally and to IoTs on different levels, including network-level, devices-level, and
intelligently control network design. Separating the control plane of application-level. However, in this research, we have analyzed solu-
network devices from the data plan simplifies network management. tions that mostly investigate communication environment-level threats.
IoT devices are used in different applications in large numbers and are
In Adeniji et al. (2023), the authors use SVM to detect DDoS attacks
vulnerable to various threats, as shown in Table 3. From the literature,
in IPv6-enabled SDNs. The 20-min test generated 500,000 normal and
we have found several techniques to detect intrusion detection. Table 4
attack traffic packets. The packet data was re-processed and 25% of the
presents a comprehensive list of available techniques, which were eval-
data was trained on SVM. The SVM detected 100% potential attacks
uated through security analyses to showcase the existing approaches
with 99.69% accuracy.
and facilitate comprehension of the research problem.
These solutions defined in the existing literature, detect and prevent
For the test-bed we designed an SD-IoT network topology that
DDoS attacks through algorithm-based approaches. Simulating them consists of three main components, including the SDNWISE Controller,
through a programmable and open-source network can help understand IoT Controller, and IoT nodes as shown in Fig. 1. The IoT network
and solve DDoS attacks. The abstract ideas from the relevant research is divided into different clusters, consisting of SOFS and IoT nodes.
work can assist a great deal in developing machine learning and SD-IoT- The SD-IoT network is designed with normal malicious nodes in each
based environments. After an extensive literature review and to the best cluster. In this regard, malicious traffic is generated via malicious nodes
of our knowledge, we concluded that the SDN-IoT had been repeatedly to detect the DDoS attack. The malicious nodes are programmed to
explored for DDoS detection in two different ways, which we defined generate flooding traffic for DDoS attacks towards the target node.
as, (1) Traditional DDoS detection techniques and (2) Machine learning This research only focuses on flooding-based network traffic to
DDoS detection techniques. Further, both techniques are explored ac- generate huge network traffic for DDoS attacks. The SD-IoT network
cording to the related existing literature with different parameters, such consists of an SDNWISE controller and IoT nodes that generate n-
as CPU utilization, memory-utilization, detection-time, and throughput 1 message traffic in the SD-IoT network. The normal nodes forward
as shown in Table 2. legitimate traffic in the SD-IoT network as per the network behavior

5
J. Bhayo, S.A. Shah, S. Hameed et al. Engineering Applications of Artificial Intelligence 123 (2023) 106432

Table 4
Comparative analysis different approaches for attack detection.
Detection approach Short description Reasoning (Pros/Cons)
Statistics-based It examines network traffic and processes the data using –Requires extensive statistical understanding.
complicated statistical techniques. –Simple but less precise.
Pattern-based It tries to recognize the data’s characteristics, shapes, and –Easy to implement.
patterns. –A hash function could be used for identification.
Rule-based To detect a potential attack on suspicious network traffic, –Rules require pattern matching and rule-based systems can be
it employs an attack ‘‘signature’’. computationally costly.
–A huge number of rules are required to determine all potential
threats.
–Low rate of false positives.
–High rate of detection.
State-based It analyzes a series of events to detect any potential –Probabilistic and self-learning.
attack. –Low false positive rate.
Heuristic-based Identifies any abnormal activity that is out of the –Exploratory and evolutionary learning is required.
ordinary.
ML-based approach Machine learning models are composed of a collection of –The implementation of ML models is typically straightforward, but
rules, procedures, or sophisticated ‘‘transfer functions’’ the pros and cons of using such models depend on the specific
that may be used to discover significant data patterns or characteristics of the algorithm in question.
forecast behaviors.

Fig. 1. A general illustration of SD-IoT network topology.

of the particular application. Furthermore, we can also customize the traffic to detect DDoS packets. A detailed explanation of these modules
normal node traffic pattern as per application requirements. We con- is discussed in the subsequent sections.
ducted different experiments to evaluate results with other parameters,
including attack node, packet frequency, and simulation. We vary the 3.2. SD-IoT and IoT nodes
packet flooding ratio with varying numbers in the packet frequency
parameter to detect the DDoS attack. We also conducted experiments
IoT involves several heterogeneous devices, which require a unique
with attack node parameters to compromised IoT nodes with different
set of access systems and safety mechanisms. Traditional security ap-
flooding packet rates. The main objective of this research is to detect
proaches such as intrusion detection and prevention systems (IDPS)
the DDoS attack at an early stage. The main advantage of this method
is to evaluate and analyze the experiment’s result more deeply with and Firewalls are deployed at the web edge devices to shield the net-
different outcome parameters, including CPU and Memory utilization, work from outside attacks. SDN, an intelligent networking paradigm,
network throughput, and attack detection time. offers new solutions to understand and solve issues identified with
As illustrated in Fig. 2, the proposed framework is composed of IoT. By applying SDN, network configuration and management can be
three modules: (1) A dataplane module, composed of an SD-IoT net- simplified significantly. Wide acknowledgment for SDN demonstrates
work, Sensor OpenFlow Switch (SOFS), and IoT devices; (2) An IoT con- that SDN can build a tighter association among the objects in an IoT
troller module composed of an adjusted SDN-WISE; and (3) a machine network. Each IoT device has an IoT specialist that interfaces with
learning-based DDoS attack detection module. The SD-IoT network the IoT controller. SDN separates the network management operation
module is composed of IoT nodes and is responsible for managing into network management and packet forwarding at the data plan.
incoming IoT traffic and serving as a gateway between the source SDN has OpenFlow-based switches that forward the packets according
IoT node and the controller. The SDN-WISE controller module is re- to the flow table; however, the unknown packet or switch with no
sponsible for managing traffic and instructs switches where to send flow information about the received packet forwards to the controller
packets. The machine learning detection module classifies IoT node for further assistance. The controller forwards rules about unknown

6
J. Bhayo, S.A. Shah, S. Hameed et al. Engineering Applications of Artificial Intelligence 123 (2023) 106432

Fig. 2. Proposed ML-based DDoS attack detection framework for SD-IoT networks.

Table 5
Implementation of the adjusted WISE flow table.
Matching rule Action Statistics
Op. Size S Addr. Value Type M S Addr. Value TTL Counter
= 1 1 0 0 Modify 1 1 0 1 122 23
= 1 1 0 1 Modify 1 1 0 0 122 120
– 0 – – – Forward 0 0 0 D 122 143
– 0 – – – Drop 0 0 – – 100 42
– 0 – – – Forward 0 0 0 D 100 32

packets; it also modifies the policies and reprograms the network by communication between nodes. But, packets generated by the nodes
installing new software or packages. are not being recorded, which means that they are needed for var-
The SD-IoT network consists of IoT nodes and a customized Sensor ious security measures to be implemented. We adjusted the existing
Openflow Switch (SOFS). It can detect, break down and gather infor- framework of the SDN-WISE network by customizing the sink module
mation to accomplish the client targets. All of the IoT nodes should be to the IoT controller and adding SOFS in the SD-IoT network. The pro-
enlisted with the IoT controller along with the points of interest such posed framework overcomes the above-discussed issues and integrates
as their question identifiers, addresses, imparting system conventions, machine learning-based security services into the SD-IoT network. The
and basic systems. SOFS is a customized OpenFlow flow switch that framework contains a logging module that logs all incoming packets
performs packet forwarding according to the flow table. A request is in the forwarding layer. These logs are recorded in the controller’s
issued to the Control plane if no entry in the WIreless SEnsor Networks directory. To implement the detection module, it is necessary to have
(WISE) Flow Table matches the current packet. Each node must know information about the communication between nodes as well as the
its optimal next hop towards a node in order to contact the Control communication’s frequency.
plane. Through beaconing, this value is determined in a distributed The IoT controller receives the traffic from the SD-IoT network
and checks if the traffic is known and reliable, then forwards it to
manner utilizing the Topology Discovery (TD) layer. The SDNWISE
the WISE Flow entry component, which further forwards the packets
Flow table has similar functionalities to the OpenFlow table used in
according to flow entry. The decision making for these choices are
the traditional SDN network. Table 5 shows the three components of
reflected in the remote physical system utilizing the SDN controller. IoT
the SDNWISE table: Matching Rule, Action, and Statistics (Galluccio
controller on getting the association from its IoT operator will fabricate
et al., 2015). There are three matching conditions against each flow
the sending rules depending on the systems administration conventions
entry, and each matching condition has five fields: Operator, Size, State
deployed and convey these guidelines to the SDN controller. Once the
(S), Offset (Addr), and value. These matching conditions are matched
IoT controller gets the address or identifier of the destination, it needs
against the rule until the end; if the WISE table does not find the to identify its source in the network. This is achieved through IoT
matching rule, it will build the Request Packet and forward it to the agents registered with the IoT controller by comparing their identi-
controller via the sink node. The packet will only be forwarded to the fier or address. As illustrated in Fig. 3, the SDN-WISE framework is
outgoing interface if the condition is matched. composed of three modules: the SDN-WISE controller module, the Sink
module, and the IoT Nodes module.
3.3. SDN-WISE and IoT controller
3.3.1. SDN-WISE controller module
While existing frameworks provide an efficient network topology The SDN controller controls the switches via OpenFlow protocol for
for nodes linked to an IoT network, they lack a mechanism for logging traffic forwarding. It also pushes rules into Openflow-based switches

7
J. Bhayo, S.A. Shah, S. Hameed et al. Engineering Applications of Artificial Intelligence 123 (2023) 106432

be established. The SDN controller handles these messages to build


the topology from the REPORT messages and responds to REQUEST
messages using the shortest path from the topology. The SDN controller
keeps reading messages from the serial interface. If the message is a
REPORT message, it extracts the information from the message and uses
it to construct the whole topology. Similarly, if the message is a flow
REQUEST, it extracts the source and destination of the requested path.
Then, it computes the shortest path from the source to destination using
Dijkstra’s algorithm (Barbehenn, 1998; Jiang et al., 2014) and replies
with a RESPONSE message in case a path exists.

Policy engine. The policy engine ensures that packets meet particular
requirements. It helps to reduce the complexity of SDN management. It
sustains the Quality of Service(QoS) of a specific flow to enforce design
constrain. The policy engine handles efficiently in the SDN paradigm.

Network stats. Network administrators must monitor network status for


security audit, including network problem tracking, troubleshooting,
Fig. 3. Existing SDN-WISE framework for SD-IoT network.
future planning, network scaling, etc. In this regard, the SDN controller
provides flow information and derived network statistics to high-level
SDN applications. Either gathered using the southbound protocol or
to make a decision when network traffic hits them. Switches need to
from an external source, such as an IPFIX (Internet Protocol Flow
maintain such rules in the flow table. As per flow, such rules are called
Information Export) (Hofstede et al., 2014) probe. The SDN controllers
‘flows’, and they are stored in WISE Flow tables. The communication
should derive statistics for high-level traffic identifiers via linking with
between IoT devices and security applications must be done via the
low-level traffic identifier statistics.
controller. The controller has the OpenFlow protocol used for network
configuration, and it is also used to find the best optimal network path
3.3.2. Sink module
for applications.
The sink is a gateway between the sensor nodes and the controller.
In the proposed SDN-WISE framework, the nodes are determined
All control packets should pass through the sink to reach the controller.
by the data structures, i.e., WISE States Array, Accepted Array IDs, and
The sink module consists of three main components, which are used to
the WISE Flow Table. The controller sends the information contained
communicate with controller and IoT nodes as shown in Fig. 5. The
in these structures; through sending this information, the controller
sink implements three layers on top of the MAC layer as part of the
defines networking policies that the nodes in the network must im-
plement. The nodes use the wireless medium for connectivity and the data plane protocol stack.
wireless medium has a broadcasting nature; therefore, nodes will also Incoming packet handle. This module is responsible for handling up-
receive packets that are unrelated to them. The information in Accepted coming packets to check whether the packet is known and has a valid
IDs Array lets the node decide to select the packets that it should entry in the WISE flow table. If the WISE flow table does not have an
process further. If there is no such information in Accepted IDs Array, entry, then the packet handler would send this packet to the controller,
the node will drop the packet. For further processing of the packet, as depicted in Fig. 6.
the node will check the entries of the WISE Flow Table and check the
matching rule. If the matching rule is satisfied, the related action will Adjusted WISE flow table. Arriving packets are matched against the
be performed; however, if not, the packet will be sent to the controller WISE flow table. The flow table is composed of three sections, i.e., on
via the sink with a flag indicating a request for further instructions matching rules, actions, and statistics (Galluccio et al., 2015), as shown
to handle the packet. The SDN-WISE controller module consists of in Table 5.
different components that cooperate to perform network operations and Each entry in the flow table can have up to three matching condi-
control the SD-IoT network. The controller performs network operation tions as part of the matching rule. Each matching condition has five
at the central point with the help of set components as shown in Fig. 4. fields, i.e., operator, size, state (𝑆), offset (Addr), and value. The rela-
tional operator are specified to be used against the value. Offset and size
WISE flow table entry. If the received packet has no flow entry in
fields specify the starting byte and the number of bytes that needs to be
the WISE Flow table in the data plane, a request packet is sent to
considered starting from the offset. For example, if the size is 2 and the
the controller. Each node in the SD-IoT network must know the path
offset is 5, then two bytes starting from byte 5 are used to compare the
towards the controller via the best next hope path to sink. The best
relational operator with the value. Each SDN-WISE network has a WISE
path value is calculated through a beacon packet with the help of the
state array which contains the current state for each active controller.
Topology Discovery layer (Abdolmaleki et al., 2017; Shalimov et al.,
The state (𝑆) indicates whether the matching must be done against the
2013).
current packet or the state. If 𝑆 = 0, the current packet is matched
Path lookup. Two types of messages are sent from the sensor nodes against the value. Whereas, if 𝑆 = 1, the state of IoT node or status of
to the controller, i.e., REPORT and REQUEST. A REPORT message controller is compared against incoming packet with WISE table entry.
contains an array of local topology information, whereas a REQUEST If all matching conditions are satisfied, the operation in the action part
message contains the source and destination address of the path to is carried out and the statistics are updated. The action part of the flow

Fig. 4. SDN-WISE controller module.

8
J. Bhayo, S.A. Shah, S. Hameed et al. Engineering Applications of Artificial Intelligence 123 (2023) 106432

Table 6
SDN-WISE packet header fields.
Byte(s) Name Description
0 NET Identifier of network
1 LEN Total length of packet
2–3 DST Destination address
4–5 SRC Source destination
6 TYP Packet type
7 TTL Number of hopes remaining
Fig. 5. Sink module. 8–9 NXH Next hop address

nodes containing information related to battery level or IoT node’s


power status and hop count to the sink, as there could be multiple sinks
in a network. Therefore, the route to the nearest sink will be preferred
by the node.

3.4. Machine learning based ddos attack detection module


Fig. 6. Incoming packet handler.

The machine learning detection module is a completely independent


module that has been developed by us as a feature to be used inside
table entry is composed of five fields, i.e., type, 𝑀, 𝑆, offset, and value. the SDN-Wise controller. Whenever the IoT controller receives a packet
The action types are Forward, Drop, Modify, ASK, etc. When the action via SOFS from the SD-IoT network, it first checks whether the packet
is Modify, the 𝑆 field specifies whether to modify the WISE state array is legitimate or unknown. If the packet is unknown, the ML detection
or the current packet. The 𝑀 field specifies whether only one matching module forwards it to the SDN-WISE controller for further inspection.
entry must be executed or not. After one successful flow table entry is We have used ML as a black box, our main concern for this research
matched and the corresponding action is executed; if 𝑀 = 0, SDN-WISE is to detect DDoS in SD-IoT and we trained models concerning the
stops browsing the flow table. However, it keeps searching for other standard requirements of the particular model. The features that were
matching rules if 𝑀 = 1. If no matching rule is found for the incoming used for training are: (i) IoT Nodes (ii) Simulation Time (iii) Packet
packet, a request packet for a flow table entry is sent to the controller Frequency and (iv) Detection Time in ms.
via the sink.

Forwarding layer (FWD). The sink implements a forwarding layer that 3.4.1. Selection of classifier
is responsible for handling incoming packets according to the rules DDoS is a persistent problem due to variances in its attack strengths
specified in the WISE flow table, which is analogous to the flow table and types. Researchers are continuously working on detecting and
in OpenFlow. It also keeps updating the WISE flow table according to mitigating DDoS using various state-of-the-art solutions and algorithms,
the flow instructions sent from the controller. The FWD is responsible including machine learning techniques. In this step, our framework is
for handling incoming SDN-WISE packets. The header of SDN-WISE designed to select the classifiers as per the defined workflow. In our
packets has a fixed length of 10 bytes and is made of seven fields as case, we have selected three supervised machine learning algorithms,
shown in Table 6. SDN-WISE defines eight packet types (SDN, 2021), i.e., Naive Bayes, DT, and support vector machines (SVM), to analyze
as follows: the data sets. The pros and cons of each classifier is summarized in
Table 7.
• Data Packet: It consists of the data packet having variable payload
size. 3.4.2. Configuration of machine learning module
• Beacon Packet: It is a broadcast packet that reports the distance The module has been converted into Java JAR file so that it can be
of a source node from the sink and its battery level information. used with any framework. A JAR file extension needs to be included
• Report Packet: Reports the list of neighbors and is route to the in the SDN-WISE controller which will facilitate passing packets as a
sink. command-line argument along with a classifier name (i.e., Naive Bayes,
• Request Packet: Request forwarded to the controller to encapsu- DT, or SVM), and as a result, the JAR file will contain the details
late the unknown flow via the sink node. of a packet accordingly. Based on this classification result, a network
• Response Packet: The controller forwards the rule of a requested engineer can decide to put a specific rule in the controller to forward
unknown packet via response packet to the Openflow switch for or drop certain packets.
the flow entry of the requested packet.
• Open-path Packet: It is used to create a path between two nodes 4. Testbed and experimental setup
in the network.
• Config Packet: The controller uses this packet to read/write the This section explains the details of the implemented testbed and
configuration information of any node or to forward the configu- evaluates the generated results acquired from different sets of experi-
ration information required to the node from the controller. ments. The performance of the machine learning-based DDoS detection
• Reg Proxy Packet: This packet is used to inform the control plane module integrated with the SDN-WISE controller will be discussed in
about a sink and the SD-IoT network or further information about detail as well.
it.
4.1. Testbed setup

3.3.3. IoT nodes For performing the experiments, the specification of the deployed
In the SDN-based IoT network, every node is directly connected to testbed consists of Ubuntu v16.0.2, Intel® Core™ i7-3540M 3.00 GHz
the sink via nodes maintaining the flow table having the best next hop processor, and 4.0 GB RAM. SDN-WISE has been integrated as a work-
towards the sink. Each node itself sets this path by running a protocol ing environment on the testbed setup, which has been used to simulate
in which some of the information packets are exchanged between the an SDN-IoT traffic generation. The machine learning library WEKA

9
J. Bhayo, S.A. Shah, S. Hameed et al. Engineering Applications of Artificial Intelligence 123 (2023) 106432

Table 7
Pros and Cons of selected machine learning classifiers.
Classifier Class nature Pros Cons
SVM Decision boundary – SVM effectively learns from a small training set – Does not perform well with large datasets
– Works well with binary classification – Results on multiple classification tasks are not satisfactory
– Can model complex and nonlinear relationships – Selecting appropriate hyperparameters is important
– Performs well when classes are separable – Requires significant processing power and memory
– Outliers have less impact – Sensitive to kernel function parameters
– Robust to noise (because it maximizes margins)
NB Probabilistic – NB is very fast in real-time predictions – Slow at training
– Very flexible with larger datasets – Not a good estimator
– Fast to execute high-performance – Fails when one of the certain features has zero
– Performs effectively with multi-class occurrences, the posterior probability will be zero, so
– Works well with higher dimensions training data should represent the population effectively
– Robust to noise – Does not perform well on attribute-related data sets
– Capability to learn incrementally
DT Tree – In DT normalization/ scaling of data is not needed – DT is more prone to overfitting
– Effectively handles missing values – Sensitive to changes in data
– Easy to explain/visualize due to graphical representation – Requires more time for training
– Automatically selects features – Results are biased to the majority class
– Produces a strong interpretation – Ignores the correlation of data

(‘‘Waikato Environment for Knowledge Analysis’’) (Witten et al., 2005) Table 8


Experiment A1.
has been used for the application of the classification techniques.
To measure the efficiency of the algorithms, each classifier has been Algorithm IoT nodes Simulation Packet frequency Detection
name (Vary) time time in ms
trained on our dataset using 20% of the collected data as training data
Naive Bayes 5 15 min 20 packet/min 578
and 80% of the collected data as test data. The Cooja simulator (Öster-
Decision Tree 5 15 min 20 packet/min 481
lind et al., 2006) is highly recommended and mostly used for IoT and SVM 5 15 min 20 packet/min 602
wireless sensor networks as the Cooja simulator and Contiki focuses on
low power consuming devices.
Table 9
Experiment A2.
4.1.1. Proposed SD-IoT network architecture Algorithm IoT nodes Simulation Packet frequency Detection
In this research, the SD-IoT-based network model consists of four name (Vary) time time in ms
main components, including ML-based DDoS Attack detection Module, Naive Bayes 15 15 min 20 packet/min 576
SDNWISE controller, IoT controller, and SD-IoT network. The SD- Decision Tree 15 15 min 20 packet/min 482
IoT network components have IoT devices, including sensors, smart SVM 15 15 min 20 packet/min 609
devices, and others that communicate via SOFS. We designed a network
that has malicious as well as normal nodes. These IoT devices are Table 10
generating malicious and normal traffic in the SD-IoT network. The Experiment A3.
SOFS acts as a forwarding device to forward the SD-IoT network traffic Algorithm IoT nodes Simulation Packet frequency Detection
according to the flow table. IoT controller is used as a mediator between name (Vary) time time in ms
SD-IoT network and Machine learning-based security applications, and Naive Bayes 30 15 min 20 packet/min 576
these applications are running at the top SDNWISE controller. SD- Decision Tree 30 15 min 20 packet/min 502
SVM 30 15 min 20 packet/min 622
NWISE controller provides the network management functionalities
and exposes the north-bound APIs for security applications. The ML-
based attack detection module runs at the top of SDNWISE and detects
the DDoS attack using machine learning algorithms. 4.2.1. Experiment-A
The experiments carried out in this research are based on variations To analyze the attack detection times for different algorithms in
of the following attributes: the SD-IoT network, we conducted five separate experiments as shown
in Tables 8 to 12. In each experiment, we changed the IoT nodes
• Number of IoT nodes
with other fix parameters. Experiment A is based on the following
• Simulation time
parameters,
• Packet frequency (normal and burst mode) (packets/min)
• Number of attack nodes
• Varying number of IoT nodes
The sizes of the above-mentioned parameters change between ex- • Fix simulation time
periments used to evaluate the model. We performed numerous exper- • Fix packet frequency
iments to determine resource utilization, including CPU, memory, and
detection time, while adjusting the size of each parameter to obtain the Experiment A has been performed with five different variations.
optimal result. Three different machine learning classifiers have been utilized, i.e.,
Naive Bayes, a Decision Tree (DT) classifier, and a support vector ma-
4.2. Results and evaluations chine classifier. It has been revealed that the three selected classifiers
have taken early the same time for detection. Furthermore, it has been
In this research, we conducted different experiments by generating observed that an SD-IoT network with 5 to 45 nodes can effectively
malicious and normal traffic through IoT devices to observe the uti- utilize a machine learning detection module for very favorable out-
lization of resources. Moreover, we also observed controller resources comes, as shown in Fig. 7. The DT classifier proved efficient in average
through these experiments with varying parameters. The details of each classification time, in comparison to Naive Bayes and support vector
experiment and their respective results are presented as follows: machine.

10
J. Bhayo, S.A. Shah, S. Hameed et al. Engineering Applications of Artificial Intelligence 123 (2023) 106432

Fig. 7. Experiment A with IoT node variations.

Fig. 8. Experiment B with IoT packet variations.

Table 11 Table 12
Experiment A4. Experiment A5.
Algorithm IoT nodes Simulation Packet frequency Detection Algorithm IoT nodes Simulation Packet frequency Detection
name (Vary) time time in ms name (Vary) time time in ms
Naive Bayes 40 15 min 20 packet/min 583 Naive Bayes 45 15 min 20 packet/min 572
Decision Tree 40 15 min 20 packet/min 497 Decision Tree 45 15 min 20 packet/min 502
SVM 40 15 min 20 packet/min 609 SVM 45 15 min 20 packet/min 608

4.2.2. Experiment-B time, the selected classifiers include Naive Bayes, DT, and Support
In this experiment, we use the packet frequency as the variable Vector Machine. The results have shown that the detection module
parameter, whereas the other parameters have constant values, as needs a maximum of 70 packets/min, without affecting detection time.
shown in Tables 13 to 17. Experiment B also has been performed However, the average classification time for DT is less in comparison
with five different variations. Similar to experiment A, it has been with Naive Bayes and support vector machine, as shown in Fig. 8.
observed that all of the selected classifiers have taken similar detection Experiment B is based on the following parameters,

11
J. Bhayo, S.A. Shah, S. Hameed et al. Engineering Applications of Artificial Intelligence 123 (2023) 106432

Fig. 9. Experiment C with simulation time variations.

Table 13 Table 17
Experiment B1. Experiment B5.
Algorithm IoT nodes Simulation Packet frequency Detection Algorithm IoT nodes Simulation Packet frequency Detection
name time (Vary) time in ms name time (Vary) time in ms
Naive Bayes 15 15 min 10 packet/min 574 Naive Bayes 15 15 min 70 packet/min 576
Decision Tree 15 15 min 10 packet/min 357 Decision Tree 15 15 min 70 packet/min 368
SVM 15 15 min 10 packet/min 605 SVM 15 15 min 70 packet/min 620

Table 14 Table 18
Experiment B2. Experiment C1.
Algorithm IoT nodes Simulation Packet frequency Detection Algorithm IoT nodes Simulation Packet frequency Detection
name time (Vary) time in ms name time (Vary) time in ms
Naive Bayes 15 15 min 20 packet/min 579 Naive Bayes 15 45 min 20 packet/min 416
Decision Tree 15 15 min 20 packet/min 363 Decision Tree 15 45 min 20 packet/min 506
SVM 15 15 min 20 packet/min 612 SVM 15 45 min 20 packet/min 596

Table 15 Table 19
Experiment B3. Experiment C2.
Algorithm IoT nodes Simulation Packet frequency Detection Algorithm IoT nodes Simulation Packet frequency Detection
name time (Vary) time in ms name time (Vary) time in ms
Naive Bayes 15 15 min 30 packet/min 581 Naive Bayes 15 30 min 20 packet/min 460
Decision Tree 15 15 min 30 packet/min 356 Decision Tree 15 30 min 20 packet/min 502
SVM 15 15 min 30 packet/min 613 SVM 15 30 min 20 packet/min 803

Table 16 Table 20
Experiment B4. Experiment C3.
Algorithm IoT nodes Simulation Packet frequency Detection Algorithm IoT nodes Simulation Packet frequency Detection
name time (Vary) time in ms name time (Vary) time in ms
Naive Bayes 15 15 min 50 packet/min 578 Naive Bayes 15 15 min 20 packet/min 576
Decision Tree 15 15 min 50 packet/min 354 Decision Tree 15 15 min 20 packet/min 487
SVM 15 15 min 50 packet/min 613 SVM 15 15 min 20 packet/min 609

• Varying frequency of packet was no effect on the detection time of the machine learning module,
• Fix simulation time as shown in Fig. 9. However, in the case of average classification
• Fix number of IoT nodes time, the performance of the Decision Tree (DT) classifier was better in
comparison with the remaining two classifiers. Experiment C is based
on the following parameters,
4.2.3. Experiment-C
Experiment C has been performed with five different variations, as • Varying simulation time
shown in Tables 18 to 20. In the experiment, the interval of simulation • Fix number of IoT-nodes
time has been varied from 45 to 15 min, and it is revealed that there • Fix frequency of packet

12
J. Bhayo, S.A. Shah, S. Hameed et al. Engineering Applications of Artificial Intelligence 123 (2023) 106432

Fig. 10. Experiment D1: CPU and memory usage — Machine Learning (ML) vs. Non-Machine Learning module.

Table 21 Table 22
Experiment-E: SDN-WISE controller throughput. Average summary of accuracy and detection rate.
Throughput (No. of packets) Packets Classifier Accuracy % Detection rate
Total throughput in 6 h 1 049 756 Naive Bayes 97.4 554
AVG throughput/h 174 959 Decision Tree 98.1 432
AVG throughput/min 2915 SVM 96.1 625
AVG throughput/s 48 Overall Average 97.2 537

4.2.4. Experiment-D1: CPU and memory usage comparison of different subsections, we can conclude that our machine learning-based DDoS
machine learning algorithms and without machine learning module attack detection module efficiently detects the attack with additional
Usage of CPU and Memory consumption has been observed by usage of CPU 3% and memory 3% with the machine learning module.
performing experiment D1. The experiment proved that the machine
learning module put less burden on the CPU, and it only uses an 4.2.7. Experiment-F
additional 3% of CPU for its functionality. Moreover, similar to CPU In our framework, we considered accuracy as an average result of
usage, the machine learning module also utilized 3% of additional classified packets while the detection rate is the total packet detection
memory usage for its functionality as shown in Fig. 10. rate. Results shown in Table 22 are the average accuracy and detection
This experiment has been performed to compare the utilization of rate of all the experiments performed in this research. We achieved
CPU and memory for different classifiers. The results of the experiment an accuracy of 97.4% for Naive Bayes, 98.1% for Decision Tree, and
have shown that the support vector machine and DT have utilized
96.1 for the SVM classifier. It is concluded from Tables 8 to 20 that on
almost equal quantities of CPU usage. However, the DT needs more
average the Decision Tree model outperforms in both experiments (A &
memory than the support vector machine and Naive Bayes as shown in
B), while Naive Bayes performed better for experiment C. The proposed
Fig. 10.
framework has an overall average score of 97.2%.
4.2.5. Experiment-D2: Memory and CPU utilization: Periodic check vs. all
4.3. Discussion
packets
Experiment D2 has been performed to measure the utilization of
CPU and memory, in a scenario when each packet is sent to a machine Numerous experiments are carried out in this research to evaluate
learning-based classifier, instead of sending it to the SD-IoT controller. the performance of a machine learning-based DDoS attack detection
It has been observed that additional CPU and memory have been application in SD-IoT networks. This section presents the conclusions
utilized by all of the selected machine learning classifiers when they from the experiments carried out in this study.
acquire packets in this manner. The results are shown in Fig. 11. For IDS detects DDoS attacks in traditional networks using different
the selected scenario, the DT classifier proved to be most effective in techniques with regard to performance on factors including CPU, mem-
CPU utilization, but least effective in memory usage. ory, throughput, and attack detection time. In the attack response, the
framework notifies about the malicious flow to the controller module
4.2.6. Experiment-E whenever the DDoS attack is detected by a Machine learning-based
This experiment is used to calculate the throughput of the detection DDoS Attack detection module. The SDNWISE controller will take dif-
module. The simulation for this experiment has been executed for a ferent attack mitigation actions; the attack countermeasures might be
total of 6 hours, and the outcome has shown that the machine-learning a flow of attacking nodes being removed from the flow table and nodes
detection module can process the quantity of 48 packets per second, marked as malicious. However, the proposed framework detects the
as shown in Table 21. According to the results shown in the above DDoS attack in the SD-IoT network with very low time and saves and

13
J. Bhayo, S.A. Shah, S. Hameed et al. Engineering Applications of Artificial Intelligence 123 (2023) 106432

Fig. 11. Experiment D2: CPU and memory usage of ML classifiers — all-packets’ check vs. periodic checks.

optimizes the resources as compared to traditional IDS. Furthermore, 4.3.2. CPU and memory utilization
these mitigation approaches are based on the proper OSI model layer, According to the results of the experiments D1-D2 conducted for
such as layer 3, layer 4, and layer 7. These mitigating approaches CPU and memory utilization, the SVM classifier gets less memory and
include Random Port Hopping, network filtering (Egress and Ingress), CPU utilization compared to Naive Bayes and DT. The DT classifier
and a technique in which the flow is branded as malicious, and the utilizes the highest memory 35% as compared to others classifiers with
packets of the labeled flow are dropped (Rai and Challa, 2016; Sahay the lowest CPU usage 27%. It is also observed that the SVM classifier
et al., 2015). has minimum usage of CPU and memory with periodic checking and
The experiment demonstrates that augmenting the number of IoT gets the highest utilization of memory and CPU during all packet
nodes through standard node parameters does not alter CPU or memory checking. The DT on the other hand utilizes high memory periodically
utilization. However, elevating IoT nodes’ burst mode, attack node, as well as all packet checking as compared to other classifiers.
or packet payload parameters has an impact on CPU and memory
consumption, as well as the SD-IoT network throughput and controller 4.3.3. SDN-WISE controller throughput with machine learning module
workload parameters. As the algorithm utilizes counters to store integer The SDN-WISE controller processes a total of 1 049 756 packets in
or floating-point data, changes to these parameters do not affect the al- the experiment and processes 48 packets in a second at an average of
gorithm. The IoT nodes in the study are limited in number and transmit 174 959 packets in one hour. It is also revealed that the module takes
messages at a rate of one per second or, in burst mode, up to a max- approximately 30% usage of memory and CPU and saves about 70%
imum of 1000 messages per second. The storage range of the counter
memory and keeps CPU free to 70% to process the SD-IoT network
variables accommodates a broad spectrum of counter values and, there-
traffic. For the sake of performance evaluation, a comparison of the
fore, does not have any impact on the algorithm’s counter variables.
machine learning module results with other published work is provided
Furthermore, counter-based algorithms rely on counter values that are
in Table 23.
reprogrammed with threshold values. The algorithm creates the DDoS
attack warming message once the counter hits the threshold number.
5. Conclusion and future work
4.3.1. Attack detection time
According to our results, the Decision Tree (DT) classifier efficiently IoT devices are critical components of today’s digital ecosystem,
classifies the malicious traffic in 480 to 500 ms with a minimum of as they provide service availability and mobility. Because IoT devices
5 and a maximum of 45 IoT nodes as compared to Naive Bayes and operate on low power and have limited resources and are typically
SVM with other fixed parameters as shown in Tables 8 to 12. With a deployed in open spaces, they are vulnerable to a variety of threats.
varying packet frequency, the attack detection time was reduced with This research focuses on the security risks associated with IoT devices.
DT classifier, however, we could not observe significant differences Detecting and preventing DDoS attacks made at and via IoT devices
by increasing the packet frequencies. Although, when we conducted is crucial for any IoT system. This study introduces a novel machine
the experiments with varying sizes of simulation parameters we get learning-based approach for detecting DDoS attacks. The attack detec-
different results. In this scenario, the Naive Bayes classifier gets less tion service is based on SDN and is placed on a centralized network
time with 30 and 45 simulation times. There is a big variation in management controller, allowing for efficient protection of the IoT
detection time with the SVM classifier showing 596, 803, and 609 ms at from threats. The network has been designed with both normal and
45, 30, and 15 min of simulation time respectively. The DT classifier is malicious nodes in order to create a large amount of traffic. On the
best and SVM gets the highest time to detect the attack with minimum top SDNWISE controller, the DDoS attack detection program classifies
simulation time as shown in Tables 18 to 20. According to the results, traffic using machine learning classifiers such as Naive Bayes, DT, and
increasing the IoT node parameter has a negligible effect on detection Support Vector Machine. It will be advantageous to implement coun-
time, but increasing the packet frequency parameter causes detection termeasures for early detection of DDoS attacks. As a result, we may
time to fluctuate. isolate IoT devices that communicate with malicious nodes, avoiding

14
J. Bhayo, S.A. Shah, S. Hameed et al. Engineering Applications of Artificial Intelligence 123 (2023) 106432

Table 23
Comparison of the proposed framework’s results with other studies.
Study Year ML algorithms Results Our proposed framework
Zhang et al. 2020 Random forest The authors achieved different results by varying features In comparison to this framework, we used three different
(2020) of RF. Accuracy has been the major factor in evaluation. algorithms and achieved an accuracy rate of 97.4%,
While authors also optimized run-time overheads by 96.1%, and 98.1%, for Naïve Bayes, SVM, and DT
reducing RF forest size and tree path. respectively. From the results, it is noticed that the forest
size affects the accuracy.
Chen et al. 2020 Decision tree F1-score is reported to be approximately 97% showing In comparison to the presented study, we used three
(2020) that the system detects DDoS attacks with high accuracy different algorithms and the DT achieved an accuracy
ratio of 98.1%.
Silveira et al. 2020 Random Forest, Logistic The authors achieved results at a sampling rate of 20% Our proposed framework, on average,
(2020) Regression, and Extreme of network traffic, showing high precision of achieved an accuracy of 97.2%
Gradient Boost (XGP) approximately 93%, and a low false alarm rate of 96%.

the creation of a higher level of attack. To evaluate the developed References


framework, various experiments were conducted using a range of attack
scenarios via simulation. By incorporating supervised and unsupervised Abdolmaleki, Nasim, Ahmadi, Mahmood, Malazi, Hadi Tabatabaee, Milardo, Sebastiano,
2017. Fuzzy topology discovery protocol for SDN-based wireless sensor networks.
classifiers, we may extend this research into constructing an attack mit- Simul. Model. Pract. Theory 79, 54–68.
igation solution and obtaining a more optimized result. Additionally, Adeniji, Oluwashola David, Adekeye, Deji Babatunde, Ajagbe, Sunday Adeola,
the solution may be deployed to include various sorts of DDoS attacks Adesina, Ademola Olusola, Oguns, Yetunde Josephine, Oladipupo, Matthew Abiola,
and train it on a variety of IoT-generated datasets to get new insights 2023. Development of DDoS attack detection approach in software defined network
using support vector machine classifier. In: Pervasive Computing and Social
and enhance the existing framework. Networking. Springer, pp. 319–331.
This work can be extended through other supervised learning algo- Agarwal, Ankit, Khari, Manju, Singh, Rajiv, 2022. Detection of DDOS attack using
rithms including Random Forest, Xg boost, and other statistical-based deep learning model in cloud storage application. Wirel. Pers. Commun. 127 (1),
419–439.
approaches to machine learning. Furthermore, we can also such as
Agrawal, Ankit, Singh, Rajiv, Khari, Manju, Vimal, S, Lim, Sangsoon, 2022. Autoencoder
unsupervised learning, semi-supervised learning, and reinforcement for design of mitigation model for DDOS attacks via M-DBNN. Wirel. Commun.
learning. Additionally, it can be also extended to integrate a DDoS Mob. Comput. 2022.
attack Mitigation module to drop the malicious traffic and block the Ahmad, Ijaz, Namal, Suneth, Ylianttila, Mika, Gurtov, Andrei, 2015. Security in software
defined networks: A survey. IEEE Commun. Surv. Tutor. 17 (4), 2317–2346.
vulnerable nodes. This paper only focuses on the flooding types of DDoS
Ahmed, Awais, Hameed, Sufian, Rafi, Muhammad, Mirza, Qublai Khan Ali, 2020. An
attacks; however, it can be extended to other types of DDoS attacks and intelligent and time-efficient DDoS identification framework for real-time enterprise
also with different types of IoT networks. networks: SAD-F: Spark based anomaly detection framework. IEEE Access 8,
219483–219502.
Ahmed, A., Hameed, S., Rafi, M., Mirza, Q.K.A., 2020. An intelligent and time-
CRediT authorship contribution statement efficient DDoS identification framework for real-time enterprise networks: SAD-F:
Spark based anomaly detection framework. IEEE Access 8, 219483–219502. http:
//dx.doi.org/10.1109/ACCESS.2020.3042905.
Jalal Bhayo: Conceptualization, Methodology/study design, Soft-
Ahmed, M. Ejaz, Kim, Hyoungshick, 2017. DDoS attack mitigation in Internet of Things
ware, Validation, Formal analysis, Investigation, Resources, Data cu- using software defined networking. In: 2017 IEEE Third International Conference on
ration, Writing – original draft, Writing – review & editing, Visual- Big Data Computing Service and Applications (BigDataService). IEEE, pp. 271–276.
ization. Syed Attique Shah: Conceptualization, Methodology/study Alamri, Hassan A., Thayananthan, Vijey, 2020. Bandwidth control mechanism and
extreme gradient boosting algorithm for protecting software-defined networks
design, Software, Validation, Formal analysis, Investigation, Data cura-
against DDoS attacks. IEEE Access 8, 194269–194288.
tion, Writing – original draft, Writing – review & editing, Supervision, Ali, Ihsan, Ahmed, Abdelmuttlib Ibrahim Abdalla, Almogren, Ahmad, Raza, Muham-
Project administration. Sufian Hameed: Conceptualization, Method- mad Ahsan, Shah, Syed Attique, Khan, Anwar, Gani, Abdullah, 2020. Systematic
ology/study design, Software, Validation, Formal analysis, Writing – literature review on IoT-based botnet attack. IEEE Access 8, 212220–212232.
http://dx.doi.org/10.1109/ACCESS.2020.3039985.
original draft, Writing – review & editing, Supervision, Project adminis- An, Yufei, Yu, F. Richard, Li, Jianqiang, Chen, Jianyong, Leung, Victor C.M., 2021.
tration. Awais Ahmed: Conceptualization, Methodology/study design, Edge intelligence (EI)-enabled HTTP anomaly detection framework for the internet
Software, Validation, Formal analysis, Investigation, Resources, Data of things (IoT). IEEE Internet Things J. 8 (5), 3554–3566. http://dx.doi.org/10.
curation, Writing – original draft. Jamal Nasir: Methodology/study de- 1109/JIOT.2020.3024645.
Barbehenn, Michael, 1998. A note on the complexity of dijkstra’s algorithm for graphs
sign, Software, Resources, Data curation. Dirk Draheim: Formal anal- with weighted vertices. IEEE Trans. Comput. 47 (2), 263.
ysis, Writing – original draft, Writing – review & editing, Supervision, Bawany, Narmeen Zakaria, Shamsi, Jawwad A., 2019. SEAL: SDN based secure and
Project administration. agile framework for protecting smart city applications from DDoS attacks. J. Netw.
Comput. Appl. 145, 102381.
Bhayo, Jalal, Hameed, Sufian, Shah, Syed Attique, 2020. An efficient counter-based
Declaration of competing interest DDoS attack detection framework leveraging software defined IoT (SD-IoT). IEEE
Access 8, 221612–221631.
Bhayo, Jalal, Jafaq, Riaz, Ahmed, Awais, Hameed, Sufian, Shah, Syed Attique, 2022. A
The authors declare the following financial interests/personal rela- time-efficient approach toward DDoS attack detection in IoT network using SDN.
tionships which may be considered as potential competing interests: IEEE Internet Things J. 9 (5), 3612–3630. http://dx.doi.org/10.1109/JIOT.2021.
Syed Attique Shah reports financial support and administrative support 3098029.
Chen, Yixin, Pei, Jianing, Li, Defang, 2019. Detpro: A high-efficiency and low-latency
were provided by Birmingham City University.
system against DDoS attacks in SDN based on decision tree. In: ICC 2019-2019
IEEE International Conference on Communications (ICC). IEEE, pp. 1–6.
Data availability Chen, Yi-Wen, Sheu, Jang-Ping, Kuo, Yung-Ching, Van Cuong, Nguyen, 2020. Design
and implementation of IoT DDoS attacks detection system based on machine learn-
ing. In: 2020 European Conference on Networks and Communications (EuCNC).
No data was used for the research described in the article. IEEE, pp. 122–127.

15
J. Bhayo, S.A. Shah, S. Hameed et al. Engineering Applications of Artificial Intelligence 123 (2023) 106432

Chernyshev, Maxim, Baig, Zubair, Bello, Oladayo, Zeadally, Sherali, 2017. Internet of Lee, Keunsoo, Kim, Juhyun, Kwon, Ki Hoon, Han, Younggoo, Kim, Sehun, 2008.
things (IoT): Research, simulators, and testbeds. IEEE Internet Things J. 5 (3), DDoS attack detection method using cluster analysis. Expert Syst. Appl. 34 (3),
1637–1647. 1659–1665.
Chhabra, Meghna, Gupta, Brij, Almomani, Ammar, 2013. A novel solution to handle Meidan, Yair, Bohadana, Michael, Mathov, Yael, Mirsky, Yisroel, Shabtai, Asaf, Breiten-
DDOS attack in MANET. J. Inf. Secur. 4 (3), 165–179. bacher, Dominik, Elovici, Yuval, 2018. N-BaIoT—Network-based detection of IoT
2020. Corero DDoS trends report. http://info.corero.com/rs/258-JCF-941/images/ botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17 (3), 12–22.
2017-q2q3-ddos-trends-report.pdf (Accessed on 10/06/2020). http://dx.doi.org/10.1109/MPRV.2018.03367731.
da Costa, Kelton AP, Papa, João P, Lisboa, Celso O, Munoz, Roberto, de Al- Mohammadi, Reza, Conti, Mauro, Lal, Chhagan, Kulhari, Satish C, 2019. SYN-Guard:
buquerque, Victor Hugo C, 2019. Internet of things: A survey on machine An effective counter for SYN flooding attack in software-defined networking. Int.
learning-based intrusion detection approaches. Comput. Netw. 151, 147–157. J. Commun. Syst. 32 (17), e4061.
Cui, Jie, Wang, Mingjun, Luo, Yonglong, Zhong, Hong, 2019. DDoS detection and Nagtilak, Saraswati, Rai, Sunil, Kale, Rohini, 2020. Internet of things: A survey
defense mechanism based on cognitive-inspired computing in SDN. Future Gener. on distributed attack detection using deep learning approach. In: Proceeding of
Comput. Syst. 97, 275–283. International Conference on Computational Science and Applications. Springer, pp.
Cui, Yunhe, Yan, Lianshan, Li, Saifei, Xing, Huanlai, Pan, Wei, Zhu, Jian, Zheng, Xi- 157–165.
aoyang, 2016. SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined Nguyen, Hoai-Vu, Choi, Yongsun, 2010. Proactive detection of DDoS attacks utilizing
networks. J. Netw. Comput. Appl. 68, 65–79. k-NN classifier in an anti-DDoS framework. Int. J. Electr. Comput. Syst. Eng. 4 (4),
Davies, Simon R., Macfarlane, Richard, Buchanan, William J., 2021. Differential area 247–252.
analysis for ransomware attack detection within mixed file datasets. Comput. Secur. Österlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T., 2006. Cross-level sensor
102377. network simulation with COOJA. In: Proceedings of LCN’2006 – the 31st IEEE
2016. DDoS attack that disrupted internet was largest of its kind in history, Conference on Local Computer Networks. pp. 641–648.
experts say. https://www.theguardian.com/technology/2016/oct/26/ddos-attack- 2021. Over 100 million IoT attacks detected in 1H 2019 – Infosecurity Mag-
dyn-mirai-botnet (Accessed on 03/03/2021). azine. https://www.infosecurity-magazine.com/news/over-100-million-iot-attacks/
2021. DDoS attacks spiked, became more complex in 2020. https://www.darkreading. (Accessed on 13/01/2021).
com/attacks-breaches/ddos-attacks-spiked-became-more-complex-in-2020/d/d- Pande, Sagar, Khamparia, Aditya, Gupta, Deepak, Thanh, Dang NH, 2020. DDoS
id/1339814 (Accessed on 16/01/2021). detection using machine learning technique. In: Recent Studies on Computational
Di Mauro, M., Galatro, G., Fortino, G., Liotta, A., 2021. Supervised feature selection Intelligence. Springer, pp. 59–68.
techniques in network intrusion detection: A critical review. Eng. Appl. Artif. Intell. Patil, Nilesh Vishwasrao, Krishna, C Rama, Kumar, Krishan, Behal, Sunny, 2019. E-Had:
101, 104216. A distributed and collaborative detection framework for early detection of DDoS
Dovom, Ensieh Modiri, Azmoodeh, Amin, Dehghantanha, Ali, Newton, David Ellis, attacks. J. King Saud Univ.-Comput. Inf. Sci..
Parizi, Reza M, Karimipour, Hadis, 2019. Fuzzy pattern tree for edge malware Rai, Ankur, Challa, Rama Krishna, 2016. Survey on recent DDoS mitigation tech-
detection and categorization in IoT. J. Syst. Archit. 97, 1–7. niques and comparative analysis. In: 2016 Second International Conference on
Du, Miao, Wang, Kun, 2019. An SDN-enabled pseudo-honeypot strategy for distributed Computational Intelligence Communication Technology (CICT). pp. 96–101. http:
denial of service attacks in industrial Internet of Things. IEEE Trans. Ind. Inform. //dx.doi.org/10.1109/CICT.2016.27.
16 (1), 648–657. Raikar, Meenaxi M., Meena, S.M., 2021. SSH brute force attack mitigation in internet of
Eskin, Eleazar, Arnold, Andrew, Prerau, Michael, Portnoy, Leonid, Stolfo, Sal, 2002. A things (IoT) network : An edge device security measure. In: 2021 2nd International
geometric framework for unsupervised anomaly detection. In: Applications of Data Conference on Secure Cyber Computing and Communications (ICSCCC). pp. 72–77.
Mining in Computer Security. Springer, pp. 77–101. http://dx.doi.org/10.1109/ICSCCC51823.2021.9478131.
Galluccio, Laura, Milardo, Sebastiano, Morabito, Giacomo, Palazzo, Sergio, 2015. SDN- Sahay, Rishikesh, Blanc, Gregory, Zhang, Zonghua, Debar, Hervé, 2015. Towards auto-
WISE: Design, prototyping and experimentation of a stateful SDN solution for nomic DDoS mitigation using software defined networking. In: SENT 2015: NDSS
WIreless SEnsor networks. In: 2015 IEEE Conference on Computer Communications Workshop on Security of Emerging Networking Technologies. Internet society.
(INFOCOM). IEEE, pp. 513–521. Sahoo, Kshira Sagar, Tripathy, Bata Krishna, Naik, Kshirasagar, Ramasubbareddy, So-
Ghaffar, Zeba, Alshahrani, Abdullah, Fayaz, Muhammad, Alghamdi, Ahmed Mo- mula, Balusamy, Balamurugan, Khari, Manju, Burgos, Daniel, 2020. An evolutionary
hammed, Gwak, Jeonghwan, 2021. A topical review on machine learning, software SVM model for DDOS attack detection in software defined networks. IEEE Access
defined networking, internet of things applications: Research limitations and 8, 132502–132513.
challenges. Electronics 10 (8), 880. 2021. SDN-WISE core. https://sdnwiselab.github.io/docs/guides/Core.html (Accessed
Gillani, Fida, Al-Shaer, Ehab, Duan, Qi, 2018. In-design resilient SDN control plane and on 07/28/2021).
elastic forwarding against aggressive DDoS attacks. In: Proceedings of the 5th ACM Shalimov, Alexander, Zuikov, Dmitry, Zimarina, Daria, Pashkov, Vasily, Smelian-
Workshop on Moving Target Defense. pp. 80–89. sky, Ruslan, 2013. Advanced study of SDN/OpenFlow controllers. In: Proceedings
Haddadi, Fariba, Khanchi, Sara, Shetabi, Mehran, Derhami, Vali, 2010. Intrusion of the 9th Central & Eastern European Software Engineering Conference in Russia.
detection and attack classification using feed-forward neural network. In: 2010 pp. 1–6.
Second International Conference on Computer and Network Technology. IEEE, pp. Shen, Limin, Li, Hui, Wang, Hongyi, Wang, Yihuan, 2020. Multifeature-based behavior
262–266. of privilege escalation attack detection method for android applications. Mob. Inf.
Hallman, Roger, Bryan, Josiah, Palavicini, Geancarlo, Divita, Joseph, Romero- Syst. 2020.
Mariona, Jose, 2017. IoDDoS-the Internet of distributed denial of sevice attacks. Siddiqui, Shahbaz, Hameed, Sufian, Shah, Syed Attique, Ahmad, Ijaz, Aneiba, Adel,
In: 2nd International Conference on Internet of Things, Big Data and Security. Draheim, Dirk, Dustdar, Schahram, 2022. Toward software-defined networking-
SCITEPRESS. pp. 47–58. based IoT frameworks: A systematic literature review, taxonomy, open challenges
Hameed, Sufian, Ali, Usman, 2018. HADEC: Hadoop-based live DDoS detection and prospects. IEEE Access 10, 70850–70901. http://dx.doi.org/10.1109/ACCESS.
framework. EURASIP J. Inf. Secur. 2018 (1), 1–19. 2022.3188311.
Hameed, Sufian, Shah, Syed Attique, Saeed, Qazi Sarmad, Siddiqui, Shahbaz, Ali, Ihsan, Siddiqui, Shahbaz, Hameed, Sufian, Shah, Syed Attique, Khan, Abdul Kareem,
Vedeshin, Anton, Draheim, Dirk, 2021. A scalable key and trust management Aneiba, Adel, 2023. Smart contract-based security architecture for collaborative
solution for IoT sensors using SDN and blockchain technology. IEEE Sens. J. 21 services in municipal smart cities. J. Syst. Archit. 135, 102802.
(6), 8716–8733. Silveira, Frederico Augusto Fernandes, Lima-Filho, Francisco, Silva, Felipe Sampaio Dan-
Hamidouche, Ranida, Aliouat, Zibouda, Ari, Ado Adamou Abba, Gueroui, Mourad, tas, Junior, Agostinho de Medeiros Brito, Silveira, Luiz Felipe, 2020. Smart
2019. An efficient clustering strategy avoiding buffer overflow in IoT sensors: a detection-IoT: A DDoS sensor system for Internet of Things. In: 2020 International
bio-inspired based approach. IEEE Access 7, 156733–156751. Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, pp. 343–348.
Hofstede, Rick, Celeda, Pavel, Trammell, Brian, Drago, Idilio, Sadre, Ramin, Sper- Snehi, Manish, Bhandari, Abhinav, 2021. Vulnerability retrospection of security so-
otto, Anna, Pras, Aiko, 2014. Flow monitoring explained: From packet capture lutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS
to data analysis with NetFlow and IPFIX. IEEE Commun. Surv. Tutor. 16 (4), attacks. Comp. Sci. Rev. 40, 100371.
2037–2064. 2020. Software-defined networking (SDN) definition - open networking foundation.
Idhammad, Mohamed, Afdel, Karim, Belouch, Mustapha, 2018. Semi-supervised https://www.opennetworking.org/sdn-definition/ (Accessed on 10/06/2020).
machine learning approach for DDoS detection. Appl. Intell. 48 (10), 3193–3208. Suresh, Manjula, Anitha, R., 2011. Evaluating machine learning algorithms for detecting
Jiang, Jehn-Ruey, Huang, Hsin-Wen, Liao, Ji-Hau, Chen, Szu-Yuan, 2014. Extending DDoS attacks. In: International Conference on Network Security and Applications.
Dijkstra’s shortest path algorithm for software defined networking. In: The 16th Springer, pp. 441–452.
Asia-Pacific Network Operations and Management Symposium. IEEE, pp. 1–4. Taylor, R., Baron, D., Schmidt, D., 2015. The world in 2025 – predictions for the
Karagiannis, Dimitrios, Argyriou, Antonios, 2018. Jamming attack detection in a pair of next ten years. In: 2015 10th International Microsystems, Packaging, Assembly
RF communicating vehicles using unsupervised machine learning. Veh. Commun. and Circuits Technology Conference (IMPACT). pp. 192–195. http://dx.doi.org/10.
13, 56–63. 1109/IMPACT.2015.7365193.
Khalid, Mizna, Hameed, Sufian, Qadir, Abdul, Shah, Syed Attique, Draheim, Dirk, Tayyab, Mohammad, Belaton, Bahari, Anbar, Mohammed, 2020. ICMPv6-based DoS
2023. Towards SDN-based smart contract solution for IoT access control. Comput. and DDoS attacks detection using machine learning techniques, open challenges,
Commun. 198, 1–31. and blockchain applicability: A review. IEEE Access 8, 170529–170547.

16
J. Bhayo, S.A. Shah, S. Hameed et al. Engineering Applications of Artificial Intelligence 123 (2023) 106432

Ujjan, Raja Majid Ali, Pervez, Zeeshan, Dahal, Keshav, Bashir, Ali Kashif, Mumtaz, Rao, City University, United Kingdom. He is a Senior Member,
González, J, 2020. Towards sFlow and adaptive polling sampling for deep learning IEEE. His research interests include big data analytics, the
based DDoS detection in SDN. Future Gener. Comput. Syst. 111, 763–779. Internet of Things, machine learning, network security, and
Van Adrichem, Niels L.M., Doerr, Christian, Kuipers, Fernando A., 2014. Opennetmon: information management.
Network monitoring in openflow software-defined networks. In: 2014 IEEE Network
Operations and Management Symposium (NOMS). IEEE, pp. 1–8.
Verma, Abhishek, Ranga, Virender, 2020. Machine learning based intrusion detection Sufian Hameed received the Ph.D. degree in the field
systems for IoT applications. Wirel. Pers. Commun. 111 (4), 2287–2310. of networks and information security, from University of
Wang, Jingjing, Jiang, Chunxiao, Zhang, Haijun, Ren, Yong, Chen, Kwang-Cheng, Göttingen, Germany. He is an Associate Professor in the
Hanzo, Lajos, 2020. Thirty years of machine learning: The road to Pareto-optimal Department of Computer Science, National University of
wireless networks. IEEE Commun. Surv. Tutor. 22 (3), 1472–1514. Computer and Emerging Sciences, Pakistan. He also leads
Witten, Ian H, Frank, Eibe, Hall, Mark A, Pal, Christopher J, Data, Mining, 2005. the IT Security Labs at NUCES. The research lab studies
Practical machine learning tools and techniques. In: Data Mining, Vol. 2. and teaches security problems and solutions for different
Xiao, Liang, Wan, Xiaoyue, Lu, Xiaozhen, Zhang, Yanyong, Wu, Di, 2018. IoT security types of information and communication paradigms. His
techniques based on machine learning: How do IoT devices use AI to enhance research interests include network security, web security,
security? IEEE Signal Process. Mag. 35 (5), 41–49. mobile security and secure architectures, and protocols for
Xie, Junfeng, Yu, F Richard, Huang, Tao, Xie, Renchao, Liu, Jiang, Wang, Chenmeng, cloud and the IoTs.
Liu, Yunjie, 2018. A survey of machine learning techniques applied to software
defined networking (SDN): Research issues and challenges. IEEE Commun. Surv.
Awais Ahmed completed his Bachelor’s as well as Master’s
Tutor. 21 (1), 393–430.
in Computer Science from FAST-NUCES in 2016 & 2019
Xu, Tu, He, Dake, Luo, Yu, 2007. DDoS attack detection based on RLT features. In: 2007
respectively. He is currently a full-time Ph.D. Scholar at
International Conference on Computational Intelligence and Security (CIS 2007).
UESTC - University of Electronic Science and Technology of
IEEE, pp. 697–701.
China and is on study leave from his position as a Lecturer
Yaqoob, Ibrar, Hashem, Ibrahim Abaker Targio, Ahmed, Arif, Kazmi, SM Ahsan,
in the Department of Computer Science at Muhammad
Hong, Choong Seon, 2019. Internet of things forensics: Recent advances, taxonomy,
Ali Jinnah University, Karachi. Previously, he worked at
requirements, and open challenges. Future Gener. Comput. Syst. 92, 265–275.
NUCES-FAST as a Research Associate and Instructor. His
Yin, Da, Zhang, Lianming, Yang, Kun, 2018. A DDoS attack detection and mitigation
field of interest includes Big Data Healthcare, Multimodal
with software-defined Internet of things framework. IEEE Access 6, 24694–24705.
Data, Data Science, Machine Learning, Natural Language
Yuan, Jian, Mills, Kevin, 2005. Monitoring the macroscopic effect of DDoS flooding
Processing, Network Security, and Analytics.
attacks. IEEE Trans. Dependable Secure Comput. 2 (4), 324–335.
Zhang, Yuntong, Xu, Jingye, Wang, Zhiwei, Geng, Rong, Choo, Kim-Kwang Raymond,
Pérez-Díaz, Jesús Arturo, Zhu, Dakai, 2020. Efficient and intelligent attack detection
in software defined IoT networks. In: 2020 IEEE International Conference on Jamal Nasir completed his Bachelor’s in computer science
Embedded Software and Systems (ICESS). pp. 1–9. http://dx.doi.org/10.1109/ in 2011 from The National University of Computer and
ICESS49830.2020.9301591. Emerging Sciences, (NUCES) Karachi Campus. (also com-
monly known as ‘‘Foundation for Advancement of Science
and Technology’’ – FAST). While gaining experience in the
field of IT and Software Development he pursues his Mas-
Jalal Bhayo received the Ph.D. degree in Computer Science ter’s in Computer network and security (CNS) from NUCES.
from the National University of Computer and Emerging He is currently working as a Senior Software Engineer in a
Science (NUECS-FAST), Pakistan (Karachi Campus). He was Multinational Software House.
working in IT Security lab at NUECS. His research interest
areas include IoT, network security, web security, and
SDN applications in security. He has industrial expertise
in different networking-related products and also received
Dirk Draheim received a Ph.D. from Freie Universität Berlin
Cisco certification. He is working as an Assistant Professor
and a habilitation from Universität Mannheim, Germany.
in Computer Science for the CED, Government of Sindh.
From 2006–2008, he was area manager for database systems
at the Software Competence Center Hagenberg, Austria.
From 2008–2016 he was head of the data center of the
University of Innsbruck and, in parallel, Adjunct Reader
Syed Attique Shah received the Ph.D. degree from the at the Faculty of Information Systems of the University of
Institute of Informatics, Istanbul Technical University, Is- Mannheim. Currently, he is Full Professor of Information
tanbul, Turkey. During his Ph.D., he studied as a Visiting Systems at Tallinn University of Technology (Taltech), Es-
Scholar at the University of Tokyo, Japan, the National tonia, and heading the Taltech Information Systems Group.
Chiao Tung University, Taiwan, and the Tallinn University The Taltech Information Systems Group conducts research
of Technology, Estonia, where he completed the major in large- and ultra-large-scale IT systems, in particular, next
content of his thesis. He has worked as an Associate Pro- generation of digital government technologies and digital
fessor and the Chairperson at the Department of Computer government ecosystems. Dirk is co-author of the Springer
Science, BUITEMS, Quetta, Pakistan. He was also engaged book ‘‘Form-Oriented Analysis’’ and author of the Springer
as a Lecturer at the Data Systems Group, Institute of Com- books ‘‘Business Process Technology’’, ‘‘Semantics of the
puter Science, University of Tartu, Estonia. Currently, he is Probabilistic Typed Lambda Calculus’’ and ‘‘Generalized
working as a Lecturer in Smart Computer Systems, at the Jeffrey Conditionalization’’. He is also an initiator and a
School of Computing and Digital Technology, Birmingham leader of numerous digital transformation initiatives.

17

You might also like