Redirigiendo al acceso original de articulo en 24 segundos...
Inicio  /  Future Internet  /  Vol: 13 Par: 5 (2021)  /  Artículo
ARTÍCULO
TITULO

Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks

Abdulsalam O. Alzahrani and Mohammed J. F. Alenazi    

Resumen

Software-defined Networking (SDN) has recently developed and been put forward as a promising and encouraging solution for future internet architecture. Managed, the centralized and controlled network has become more flexible and visible using SDN. On the other hand, these advantages bring us a more vulnerable environment and dangerous threats, causing network breakdowns, systems paralysis, online banking frauds and robberies. These issues have a significantly destructive impact on organizations, companies or even economies. Accuracy, high performance and real-time systems are essential to achieve this goal successfully. Extending intelligent machine learning algorithms in a network intrusion detection system (NIDS) through a software-defined network (SDN) has attracted considerable attention in the last decade. Big data availability, the diversity of data analysis techniques, and the massive improvement in the machine learning algorithms enable the building of an effective, reliable and dependable system for detecting different types of attacks that frequently target networks. This study demonstrates the use of machine learning algorithms for traffic monitoring to detect malicious behavior in the network as part of NIDS in the SDN controller. Different classical and advanced tree-based machine learning techniques, Decision Tree, Random Forest and XGBoost are chosen to demonstrate attack detection. The NSL-KDD dataset is used for training and testing the proposed methods; it is considered a benchmarking dataset for several state-of-the-art approaches in NIDS. Several advanced preprocessing techniques are performed on the dataset in order to extract the best form of the data, which produces outstanding results compared to other systems. Using just five out of 41 features of NSL-KDD, a multi-class classification task is conducted by detecting whether there is an attack and classifying the type of attack (DDoS, PROBE, R2L, and U2R), accomplishing an accuracy of 95.95%.

 Artículos similares

       
 
Emmanuel Effah, Ousmane Thiare and Alexander M. Wyglinski    
This paper presents an in-depth contextualized tutorial on Agricultural IoT (Agri-IoT), covering the fundamental concepts, assessment of routing architectures and protocols, and performance optimization techniques via a systematic survey and synthesis of... ver más
Revista: IoT

 
Gregorio Rosario Michel, María Ester Gonzalez-Campos, Fernando Manzano Aybar and Joep Crompvoets    
The Dominican Republic (DR) is a small island developing state (SIDS) highly exposed to disaster-risk phenomena, such as earthquakes, hurricanes, etc. The Spatial Data Infrastructure (SDI) enables coordination and sharing of spatial information and servi... ver más

 
Shiva Raj Pokhrel and Michel Mandjes    
We consider multipath TCP (MPTCP) flows over the data networking dynamics of IEEE 802.11ay for drone surveillance of areas using high-definition video streaming. Mobility-induced handoffs are critical in IEEE 802.11ay (because of the smaller coverage of ... ver más
Revista: Drones

 
Vishnupriya Jonnalagadda, Ji Yun Lee, Jie Zhao and Seyed Hooman Ghasemi    
The nation?s transportation systems are complex and are some of the highest valued and largest public assets in the United States. As a result of repeated natural hazards and their significant impact on transportation functionality and the socioeconomic ... ver más
Revista: Infrastructures

 
P.V. Kumaraguru, Vidyavathi Kamalakkannan, Gururaj H L, Francesco Flammini, Badria Sulaiman Alfurhood and Rajesh Natarajan    
Terabytes of data are now being handled by an increasing number of apps, and rapid user decision-making is hampered by data analysis. At the same time, there is a rise in interest in big data analysis for social networks at the moment. Thus, adopting dis... ver más