AI-driven DDoS Mitigation in Networks Using Software - Defined Networking and Network Function Virtualization
AI-driven DDoS Mitigation in Networks Using Software - Defined Networking and Network Function Virtualization
VNFs included:
SDN/FNV AI Traditional IDS
vIDS (Snort) – anomaly detection 100
vFW (iptables) – traffic filtering
DPI (Suricata) – payload inspection Evaluations were based 80
on accuracy, efficiency, and response time.
60
C. Attack Simulation and Response
Simulated attacks included DDoS, MITM, and malware 40
injections. The system’s detection rate, mitigation speed,
and impact on network metrics (throughput, latency) were 20
recorded.
0
D. Statistical Analysis 0 5 10 15 20 25 30
TSPSS was used for analysis, correlating network condi- Fig 3 DDOD MITIGATION EFFICIENCY OVER TIME
tions with detection metrics. Key measures included:
Mean Absolute Error (MAE) STATISTICAL ANALYSIS III
Root Mean Square Error (RMSE)
A. Evaluation Metrics
R-squared values
1. Detection Accuracy (DA): Measures the percentage of correctly
III. RESULTS identified attack and normal traffic instances.
2. False Positive Rate (FPR): The rate at which legitimate traffic was
incorrectly flagged as malicious.
TABLE I
PERFORMANCE COMPARISON: SDN/NFV VS. TRADITIONAL SECURITY 3. Mitigation Latency (ML): Time elapsed between attack detection and
mitigation action.
4. Resource Utilization (RU): CPU and memory usage by virtualized The integration of Artificial Intelligence with Software
security functions (VSFs).
Defined Networking (SDN) and Network Function
5. Network Throughput (NT): Total data successfully delivered over Virtualization (NFV) exhibited clear advantages over
the network under attack conditions.
traditional network security methods, particularly in real-time
B. Descriptive Statistics threat detection and adaptive response mechanisms.
Metric Mean Standard Minimum Maximum In terms of intelligent threat detection, the AI-enhanced
Deviation SDN/NFV system demonstrated heightened accuracy in
Detection 96.4 ±1.12 94.8 97.6 identifying complex cyber threats such as zero-day attacks,
Accuracy Distributed Denial-of-Service (DDoS), and advanced
(%)
persistent threats (APTs). The system effectively analyzed
traffic behavior patterns, enabling proactive identification of
False 3.1 ±0.57 2.4 3.8
Positive Rate anomalies that static, signature-based systems often failed to
(%) detect. Moreover, the model adapted dynamically to evolving
Mitigation 420 ±27.6 382 468 attack vectors, constantly updating its knowledge base without
Latency (ms) human intervention.
CPU 63.5 ±4.92 58 72 From a network management standpoint, SDN provided
Utilization centralized control and visibility, which AI leveraged to
(%)
optimize routing paths, enforce adaptive firewall rules, and
Network 942 ±16.8 910 960 prioritize legitimate traffic during attack scenarios.
Throughput
(Mbps)
Meanwhile, NFV allowed security functions such as Intrusion
Detection Systems (IDS) and firewalls to be instantiated on-
demand—enhancing resource efficiency and reducing
C. Correlation Analysis response latency during high-risk periods.
In terms of resilience and scalability, the AI-enabled
Variables Detection Mitigation FPR SDN/NFV system showed robust performance across varying
Accuracy Latency traffic loads, scaling security services dynamically based on
CPU Utilization -0.42 +0.58 +0.37 current network demands. This resulted in significant
Mitigation -0.63 1.00 +0.48 reductions in Mean Time to Detect (MTTD) and Mean Time
Latency to Respond (MTTR), key metrics in operational continuity.
False Positive -0.71 +0.48 1.00 Additionally, the system displayed context-aware security,
Rate adjusting defenses based on user behavior, access history, and
network context—enabling a more personalized and adaptive
D.Error Analysis
security model. This adaptability extended to geolocation-
aware traffic analysis, where traffic from high-risk regions
Metric Value
could be throttled or sandboxed in real time.
Mean Absolute Error (MAE) 1.14 Overall, the results highlighted how AI, when combined with
Root Mean Square Error (RMSE) 1.62
SDN/NFV, offers a flexible, scalable, and intelligent
cybersecurity architecture. It not only improved threat
detection rates significantly but also introduced a new level of
Flow Chart IV automation and agility in network security operations—laying
the groundwork for more autonomous, self-healing networks
of the future.
V.CONCLUSION