4.6 Article

Hybrid Deep Learning: An Efficient Reconnaissance and Surveillance Detection Mechanism in SDN

Journal

IEEE ACCESS
Volume 8, Issue -, Pages 134695-134706

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2020.3009849

Keywords

Computer architecture; Intrusion detection; Feature extraction; Machine learning; Software; Computer crime; Anomaly detection; Security; hybrid deep learning model; software defined networks; long short-term memory; convolutional neural network

Funding

  1. Brain Korea 21 Plus Program - National Research Foundation of Korea (NRF) [22A20130012814]
  2. MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program [IITP-2020-2016-0-00313]
  3. Basic Science Research Program through the National Research Foundation of Korea (NRF) - Ministry of Education [2018R1D1A1A09082266]

Ask authors/readers for more resources

Software defined network (SDN) centralized control intelligence and network abstraction aims to facilitate applications, service deployment, programmability, innovation and ease in configuration management of the underlying networks. However, the centralized control intelligence and programmability is primarily a potential target for the evolving cyber threats and attacks to throw the entire network into chaos. The authors propose a control plane-based orchestration for varied sophisticated threats and attacks. The proposed mechanism comprises of a hybrid Cuda-enabled DL-driven architecture that utilizes the predictive power of Long short-term memory (LSTM) and Convolutional Neural Network (CNN) for an efficient and timely detection of multi-vector threats and attacks. A current state of the art dataset CICIDS2017 and standard performance evaluation metrics have been employed to thoroughly evaluate the proposed mechanism. We rigorously compared our proposed technique with our constructed hybrid DL-architectures and current benchmark algorithms. Our analysis shows that the proposed approach out-performs in terms of detection accuracy with a trivial trade-off speed efficiency. We also performed a 10-fold cross validation to explicitly show unbiased results.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available