4.7 Article

Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments

Publisher

ELSEVIER
DOI: 10.1016/j.future.2021.06.047

Keywords

Adversarial attacks; DDoS; Deep Learning; GAN; SDN

Funding

  1. National Council for Scientific and Technological Development (CNPq) of Brazil [310668/2019-0]
  2. SETI, Brazil/Fundacao Araucaria
  3. Minsterio de Economia y Competitividad, Spain [TIN2017-84802-C2-1-P]

Ask authors/readers for more resources

SDN is an emerging architecture for future networks, but centralized control logic can be vulnerable to DDoS attacks. This study proposes a detection and defense system based on Adversarial training in SDN, effectively detecting and mitigating DDoS attacks.
Over the last few years, Software Defined Networking (SDN) paradigm has become an emerging architecture to design future networks and to meet new application demands. SDN provides resources for improving network control and management by separating control and data plane, and the logical control is centralized in a controller. However, the centralized control logic can be an ideal target for malicious attacks, mainly Distributed Denial of Service (DDoS) attacks. Recently, Deep Learning has become a powerful technique applied in cybersecurity, and many Network Intrusion Detection (NIDS) have been proposed in recent researches. Some studies have indicated that deep neural networks are sensitive in detecting adversarial attacks. Adversarial attacks are instances with certain perturbations that cause deep neural networks to misclassify. In this paper, we proposed a detection and defense system based on Adversarial training in SDN, which uses Generative Adversarial Network (GAN) framework for detecting DDoS attacks and applies adversarial training to make the system less sensitive to adversarial attacks. The proposed system includes well-defined modules that enable continuous traffic monitoring using IP flow analysis, enabling the anomaly detection system to act in near-real-time. We conducted the experiments on two distinct scenarios, with emulated data and the public dataset CICDDoS 2019. Experimental results demonstrated that the system efficiently detected up-to-date common types of DDoS attacks compared to other approaches. (C) 2021 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available