4.5 Article

An Optimal Framework for SDN Based on Deep Neural Network

期刊

CMC-COMPUTERS MATERIALS & CONTINUA
卷 73, 期 1, 页码 1125-1140

出版社

TECH SCIENCE PRESS
DOI: 10.32604/cmc.2022.025810

关键词

Deep neural network; computer networks; data security; optimization

资金

  1. Ministry of Education, Malaysia [FRGS/1/2018/ICT02/UKM/02/6]

向作者/读者索取更多资源

This article proposes a novel DDoS traffic detection method based on information entropy and deep neural network (DNN). By calculating the information entropy value of data packets and using DNN for identification, it can accurately detect DDoS activity efficiently.
Software-defined networking (SDN) is a new paradigm that promises to change by breaking vertical integration, decoupling network control logic from the underlying routers and switches, promoting (logical) network control centralization, and introducing network programming. However, the controller is similarly vulnerable to a ???single point of failure???, an attacker can execute a distributed denial of service (DDoS) attack that invalidates the controller and compromises the network security in SDN. To address the problem of DDoS traffic detection in SDN, a novel detection approach based on information entropy and deep neural network (DNN) is proposed. This approach contains a DNN-based DDoS traffic detection module and an information-based entropy initial inspection module. The initial inspection module detects the suspicious network traffic by computing the information entropy value of the data packet???s source and destination Internet Protocol (IP) addresses, and then identifies it using the DDoS detection module based on DNN. DDoS assaults were found when suspected irregular traffic was validated. Experiments reveal that the algorithm recognizes DDoS activity at a rate of more than 99%, with a much better accuracy rate. The false alarm rate (FAR) is much lower than that of the information entropy-based detection method. Simultaneously, the proposed framework can shorten the detection time and improve the resource utilization efficiency.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据