Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 10 , Issue 1 , PP: 08-17, 2022 | Cite this article as | XML | Html | PDF | Full Length Article

Smart Model for Securing Software Defined Networks

Mohammed. I. Alghamdi 1 * , Abeer. Y. Salawi 2 , Salwa. H. Alghamdi 3

  • 1 Department of Engineering and Computer Science - (mialmushilah@bu.edu.sa)
  • 2 College of Computer Science and Information Technology - (442021118@stu.bu.sa)
  • 3 Al-Baha University, Al-Baha City, Kingdom of Saudi Arabia - (442020222@stu.bu.edu.sa)
  • Doi: https://doi.org/10.54216/JCIM.0100101

    Received: February 10, 2022 Accepted: May 17, 2022
    Abstract

    Software defined networks (SDN) remain a hot research field as it provides controllable networking operations. The SDN controller can be treated as the operating system of the SDN model and it holds the responsibility of performing different networking applications. Despite the benefits of SDN, security remains a challenging problem. At the same time, distributed denial of services (DDoS) is a typical attack on SDN owing to centralized architecture, especially at the control layer of the SDN. This article develops a new Cat Swarm Optimization with Fuzzy Rule Base Classification (CSO-FRBCC) model for cybersecurity in SDN. The presented CSO-FRBCC model intends to effectually categorize the occurrence of DDoS attacks in SDN. To achieve this, the CSO-FRBCC model primarily pre-processes the input data to transform it to a uniform format. Besides, the CSO-FRBCC model employs FRBCC classifier for the recognition and classification of intrusions. Moreover, the parameter optimization of the FRBCC classification model is adjusted by the use of cat swarm optimization (CSO) algorithm which results in improved performance. A comprehensive set of simulations were carried out on benchmark dataset and the results highlighted the enhanced outcomes of the CSO-FRBCC model over the other recent approaches.

    Keywords :

    Cybersecurity , Software Defined Networks , Fuzzy logic , Metaheuristics , Parameter optimization , Security

    References

    [1] Shaghaghi, A., Kaafar, M.A., Buyya, R. and Jha, S., 2020. Software-defined network (SDN) data plane security: issues, solutions, and future directions. Handbook of Computer Networks and Cyber Security, pp.341-387.

    [2] Nkenyereye, L., Nkenyereye, L., Islam, S.M., Choi, Y.H., Bilal, M. and Jang, J.W., 2019. Softwaredefined network-based vehicular networks: A position paper on their modeling and implementation. Sensors, 19(17), p.3788.

    [3] Ye, J., Cheng, X., Zhu, J., Feng, L. and Song, L., 2018. A DDoS attack detection method based on SVM in software defined network. Security and Communication Networks, 2018.

    [4] Shinan, K., Alsubhi, K., Alzahrani, A. and Ashraf, M.U., 2021. Machine learning-based botnet detection in software-defined network: a systematic review. Symmetry, 13(5), p.866.

    [5] Bhushan, K. and Gupta, B.B., 2019. Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. Journal of Ambient Intelligence and Humanized Computing, 10(5), pp.1985-1997.

    [6] Rego, A., Garcia, L., Sendra, S. and Lloret, J., 2018. Software Defined Network-based control system for an efficient traffic management for emergency situations in smart cities. Future Generation Computer Systems, 88, pp.243-253.

    [7] Deb, R. and Roy, S., 2021. A Software Defined Network information security risk assessment based on Pythagorean fuzzy sets. Expert Systems with Applications, 183, p.115383.

    [8] Wang, P., Yang, L.T., Nie, X., Ren, Z., Li, J. and Kuang, L., 2020. Data-driven software defined network attack detection: State-of-the-art and perspectives. Information Sciences, 513, pp.65-83.

    [9] Tang, Q., Wang, K., Song, Y., Li, F. and Park, J.H., 2019. Waiting time minimized charging and discharging strategy based on mobile edge computing supported by software-defined network. IEEE Internet of Things Journal, 7(7), pp.6088-6101.

    [10] Zhang, B., Wang, X. and Huang, M., 2018. Multi-objective optimization controller placement problem in internet-oriented software defined network. Computer Communications, 123, pp.24-35.

    [11] Alzahrani, A.O. and Alenazi, M.J., 2021. Designing a network intrusion detection system based on machine learning for software defined networks. Future Internet, 13(5), p.111.

    [12] Zhijun, W., Qing, X., Jingjie, W., Meng, Y. and Liang, L., 2020. Low-rate DDoS attack detection based on factorization machine in software defined network. IEEE Access, 8, pp.17404-17418.

    [13] Ahuja, N., Singal, G., Mukhopadhyay, D. and Kumar, N., 2021. Automated DDOS attack detection in software defined networking. Journal of Network and Computer Applications, 187, p.103108.

    [14] Tonkal, Ö., Polat, H., Başaran, E., Cömert, Z. and Kocaoğlu, R., 2021. Machine Learning Approach Equipped with Neighbourhood Component Analysis for DDoS Attack Detection in Software-Defined Networking. Electronics, 10(11), p.1227.

    [15] Stepin, I., Alonso, J.M., Catala, A. and Pereira-Fariña, M., 2020, July. Generation and evaluation of factual and counterfactual explanations for decision trees and fuzzy rule-based classifiers. In 2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (pp. 1-8). IEEE.

    [16] Reddy, G.T. and Khare, N., 2018. Heart disease classification system using optimised fuzzy rule based algorithm. International Journal of Biomedical Engineering and Technology, 27(3), pp.183-202.

    [17] Chandirasekaran, D. and Jayabarathi, T., 2019. Cat swarm algorithm in wireless sensor networks for optimized cluster head selection: a real time approach. Cluster Computing, 22(5), pp.11351-11361.

    [18] Orouskhani, M. and Shi, D., 2018. Fuzzy adaptive cat swarm algorithm and Borda method for solving dynamic multi‐objective problems. Expert Systems, 35(4), p.e12286.

    [19] K. S. Sahoo, B. K. Tripathy, K. Naik, S. Ramasubbareddy, B. Balusamy et al., “An evolutionary SVM model for DDOS attack detection in software defined networks,” IEEE Access, vol. 8, pp. 132502– 132513, 2020

    [20] Nadeem, M. W., Goh, H. G., Ponnusamy, V., Aun, Y. (2022). DDoS Detection in SDN using Machine Learning Techniques. CMC-Computers, Materials & Continua, 71(1), 771–789.

    Cite This Article As :
    I., Mohammed.. , Y., Abeer.. , H., Salwa.. Smart Model for Securing Software Defined Networks. Journal of Cybersecurity and Information Management, vol. , no. , 2022, pp. 08-17. DOI: https://doi.org/10.54216/JCIM.0100101
    I., M. Y., A. H., S. (2022). Smart Model for Securing Software Defined Networks. Journal of Cybersecurity and Information Management, (), 08-17. DOI: https://doi.org/10.54216/JCIM.0100101
    I., Mohammed.. Y., Abeer.. H., Salwa.. Smart Model for Securing Software Defined Networks. Journal of Cybersecurity and Information Management , no. (2022): 08-17. DOI: https://doi.org/10.54216/JCIM.0100101
    I., M. , Y., A. , H., S. (2022) . Smart Model for Securing Software Defined Networks. Journal of Cybersecurity and Information Management , () , 08-17 . DOI: https://doi.org/10.54216/JCIM.0100101
    I. M. , Y. A. , H. S. [2022]. Smart Model for Securing Software Defined Networks. Journal of Cybersecurity and Information Management. (): 08-17. DOI: https://doi.org/10.54216/JCIM.0100101
    I., M. Y., A. H., S. "Smart Model for Securing Software Defined Networks," Journal of Cybersecurity and Information Management, vol. , no. , pp. 08-17, 2022. DOI: https://doi.org/10.54216/JCIM.0100101