Mitigation of Cyber Attacks in SDN-Based IoT Systems Using Machine Learning Techniques
Keywords:
Cyber Threats, SDN, DDOS, IOT, Network SecurityAbstract
Complex Distributed Denial-of-Service (DDoS) security assaults threaten the expansion of intelligent network infrastructure for the Internet of Things (IoT). The IoT cannot be protected by the enterprise network security solutions currently in use because they are too expensive. Integrating newly developed software-defined networking (SDN) technology effectively mitigates a computational load on an IoT network device, enabling the implementation of supplementary security measures. Because it is utilized in the precursor stage of the design for SDN-enabled IoT networks. However, sampling-based security offers poor DDoS attack detection accuracy. This study aims to investigate cognitive techniques for detecting and mitigating cyber risks in software-defined and contemporary network applications. SDN is a modern technology network that allows for centralized control and cyber threat detection with built-in machine learning techniques for increasing the adoption of (IoT) devices. SDN applications have become vulnerable to cyber threats. To ensure the security of these applications, detection and mitigation of cyber threats are crucial. Adopting SDN can result in benefits, including increased manageability, scalability, and overall performance. However, SDN poses issues, primarily if it is controlled and open to DDoS attacks. Machine learning-based models were employed in this specific research project to identify DDoS attacks in SDN. Based on the research results, the KNN classifier, in combination with the wrapper feature, leads to the most fantastic accuracy rate of about 98.3% in detecting attacks.
The results of this study indicate that in addition to the anticipated reduction in processing burdens, feature selection and machine learning techniques can enhance DDoS attack detection in SDN.
Downloads
References
Sarica, A. K., & Angin, P. (2020). Explainable security in SDN-based IoT networks. Sensors, 20(24), 7326.
Aslam, M., Ye, D., Tariq, A., Asad, M., Hanif, M., Ndzi, D., ... & Jilani, S. F. (2022). Adaptive machine learning-based distributed denial-of-services attacks detection and mitigation system for SDN-enabled IoT. Sensors, 22(7), 2697.
Jmal, R., Ghabri, W., Guesmi, R., Alshammari, B. M., Alshammari, A. S., & Alsaif, H. (2023). Distributed Blockchain-SDN Secure IoT System Based on ANN to Mitigate DDoS Attacks. Applied Sciences, 13(8), 4953.
Latah, M., & Toker, L. (2018). A novel intelligent approach for detecting DoS flooding attacks in software-defined networks. International Journal of Advances in Intelligent Informatics.
Polat, H., Polat, O., & Cetin, A. (2020). Detecting DDoS attacks in software-defined networks through feature selection methods and machine learning models. Sustainability, 12(3), 1035.
Eliyan, L. F., & Di Pietro, R. (2021). DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges. Future Generation Computer Systems, 122, 149-171.
Arevalo Herrera, J., & Camargo, J. E. (2019). A survey on machine learning applications for software-defined network security. In Applied Cryptography and Network Security Workshops: ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings 17 (pp. 70-93). Springer International Publishing.
Vimal, V., Muruganantham, R., Prabha, R., Arularasan, A. N., Nandal, P., Chanthirasekaran, K., & Reddy Ranabothu, G. (2022). Enhance Software-Defined Network Security with IoT to Strengthen the Encryption of Information Access Control: Computational Intelligence and Neuroscience, 2022.
Uribe, J. D. J. R., Guillen, E. P., & Cardoso, L. S. (2022). A technical review of wireless security for the internet of things: Software defined radio perspective. Journal of King Saud University-Computer and Information Sciences, 34(7), 4122-4134.
Cai, T., Jia, T., Adepu, S., Li, Y., & Yang, Z. (2023). ADAM: an adaptive DDoS attack mitigation scheme in software-defined cyber-physical system. IEEE Transactions on Industrial Informatics.
Khedr, W. I., Gouda, A. E., & Mohamed, E. R. (2023). FMDADM: A Multi-Layer DDoS Attack Detection and Mitigation Framework Using Machine Learning for Stateful SDN-Based IoT Networks. IEEE Access, 11, 28934-28954.
Ye, J., Cheng, X., Zhu, J., Feng, L., & Song, L. (2018). A DDoS attack detection method based on SVM in software-defined network. Security and Communication Networks, 2018.
Chakraborty, S., & Banerjee, S. (2018). Proposed approach to detect distributed denial of service attacks in software defined network using machine learning algorithms. Int. J. Eng. Technol, 7, 472-476.
Sahoo, K. S., Tripathy, B. K., Naik, K., Ramasubbareddy, S., Balusamy, B., Khari, M., & Burgos, D. (2020). An evolutionary SVM model for DDOS attack detection in software-defined networks. IEEE access, 8, 132502-132513.
Swami, R., Dave, M., & Ranga, V. (2019). Software-defined networking-based DDoS defense mechanisms. ACM Computing Surveys (CSUR), 52(2), 1-36.
ONOS SDN Controller https://opennetworking.org/onos/
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.