Anomalous Rule Detection using Machine Learning in Software Defined Networks

Vignesh Sridharan, G. Mohan, A. Leon-Garcia
{"title":"Anomalous Rule Detection using Machine Learning in Software Defined Networks","authors":"Vignesh Sridharan, G. Mohan, A. Leon-Garcia","doi":"10.1109/NFV-SDN47374.2019.9039984","DOIUrl":null,"url":null,"abstract":"The centralized control plane in Software Defined Networking (SDN) introduces new security threats to the network. A compromised controller can install malicious rules at the switches to perform stealthy attacks such as intermittent packet dropping, route misdirection etc. Replication based approaches in the literature require the switches to broadcast the requests to multiple controllers and verify the rules for consistency before installing them. However, they result in heavy load on the control plane and longer response time for requests from the switches. Other approaches assume forwarding elements, rather than the controller, to be compromised and propose packet sampling and active probing to identify malicious behavior. In this work, we: i) propose a machine learning based framework to detect anomalous behavior at the flow table and identify the compromised controller, ii) develop MTADS, a M achine learning based detection T echnique for A nomaly D etection in S DN, which uses D BSCAN algorithm to identify anomalous rules and behavior, and iii) implement MTADS on top of Floodlight controller managing a network emulated in Mininet and test its detection capabilities against various attacks such as route misdirection, packet drop etc. We compare the performance of MTADS (based on DBSCAN) with K-Means algorithm and show that MTADS (DBSCAN) outperforms the K-Means version and achieves precision and recall of about 85% and 95&, respectively.","PeriodicalId":394933,"journal":{"name":"2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NFV-SDN47374.2019.9039984","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The centralized control plane in Software Defined Networking (SDN) introduces new security threats to the network. A compromised controller can install malicious rules at the switches to perform stealthy attacks such as intermittent packet dropping, route misdirection etc. Replication based approaches in the literature require the switches to broadcast the requests to multiple controllers and verify the rules for consistency before installing them. However, they result in heavy load on the control plane and longer response time for requests from the switches. Other approaches assume forwarding elements, rather than the controller, to be compromised and propose packet sampling and active probing to identify malicious behavior. In this work, we: i) propose a machine learning based framework to detect anomalous behavior at the flow table and identify the compromised controller, ii) develop MTADS, a M achine learning based detection T echnique for A nomaly D etection in S DN, which uses D BSCAN algorithm to identify anomalous rules and behavior, and iii) implement MTADS on top of Floodlight controller managing a network emulated in Mininet and test its detection capabilities against various attacks such as route misdirection, packet drop etc. We compare the performance of MTADS (based on DBSCAN) with K-Means algorithm and show that MTADS (DBSCAN) outperforms the K-Means version and achieves precision and recall of about 85% and 95&, respectively.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
软件定义网络中使用机器学习的异常规则检测
软件定义网络(SDN)中的集中控制平面给网络带来了新的安全威胁。一个被入侵的控制器可以在交换机上安装恶意规则来执行隐形攻击,如间歇丢包、路由误导等。文献中基于复制的方法要求交换机将请求广播到多个控制器,并在安装它们之前验证规则的一致性。但是,它们会导致控制平面上的负载过重,并且对来自交换机的请求的响应时间较长。其他方法假设转发元素(而不是控制器)受到损害,并提出包采样和主动探测来识别恶意行为。在这项工作中,我们:i)提出一种基于机器学习的框架来检测流表中的异常行为并识别受损害的控制器;ii)开发MTADS,一种基于机器学习的检测技术,用于sdn中的异常D检测,它使用D BSCAN算法来识别异常规则和行为;iii)在泛光灯控制器管理Mininet模拟的网络之上实现MTADS,并测试其对各种攻击(如路由误导)的检测能力。丢包等。我们将MTADS(基于DBSCAN)与K-Means算法的性能进行了比较,结果表明MTADS (DBSCAN)优于K-Means算法,准确率和召回率分别达到85%和95%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Latency-Aware, Static, and Dynamic Decision-Tree Placement Algorithm for Containerized SDN-VNF in OpenFlow Architectures Flexible Notification Forwarding for Content-Based Publish/Subscribe Using P4 Putting NFV into Reality: Physical Smart Manufacturing Testbed FOP4: Function Offloading Prototyping in Heterogeneous and Programmable Network Scenarios Anomalous Rule Detection using Machine Learning in Software Defined Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1