784 660
Full Length Article
Journal of Cybersecurity and Information Management
Volume 10 , Issue 1, PP: 08-17 , 2022 | Cite this article as | XML | Html |PDF

Title

Smart Model for Securing Software Defined Networks

  Mohammed. I. Alghamdi 1 * ,   Abeer. Y. Salawi 2 ,   Salwa. H. Alghamdi 3

1  Department of Engineering and Computer Science
    (mialmushilah@bu.edu.sa)

2  College of Computer Science and Information Technology
    (442021118@stu.bu.sa)

3  Al-Baha University, Al-Baha City, Kingdom of Saudi Arabia
    (442020222@stu.bu.edu.sa)


Doi   :   https://doi.org/10.54216/JCIM.0100101

Received: February 10, 2022 Accepted: May 17, 2022

Abstract :

Software defined networks (SDN) remain a hot research field as it provides controllable networking operations. The SDN controller can be treated as the operating system of the SDN model and it holds the responsibility of performing different networking applications. Despite the benefits of SDN, security remains a challenging problem. At the same time, distributed denial of services (DDoS) is a typical attack on SDN owing to centralized architecture, especially at the control layer of the SDN. This article develops a new Cat Swarm Optimization with Fuzzy Rule Base Classification (CSO-FRBCC) model for cybersecurity in SDN. The presented CSO-FRBCC model intends to effectually categorize the occurrence of DDoS attacks in SDN. To achieve this, the CSO-FRBCC model primarily pre-processes the input data to transform it to a uniform format. Besides, the CSO-FRBCC model employs FRBCC classifier for the recognition and classification of intrusions. Moreover, the parameter optimization of the FRBCC classification model is adjusted by the use of cat swarm optimization (CSO) algorithm which results in improved performance. A comprehensive set of simulations were carried out on benchmark dataset and the results highlighted the enhanced outcomes of the CSO-FRBCC model over the other recent approaches.

Keywords :

Cybersecurity; Software Defined Networks; Fuzzy logic; Metaheuristics; Parameter optimization; Security

References :

[1] Shaghaghi, A., Kaafar, M.A., Buyya, R. and Jha, S., 2020. Software-defined network (SDN) data plane

security: issues, solutions, and future directions. Handbook of Computer Networks and Cyber Security,

pp.341-387.

[2] Nkenyereye, L., Nkenyereye, L., Islam, S.M., Choi, Y.H., Bilal, M. and Jang, J.W., 2019. Softwaredefined

network-based vehicular networks: A position paper on their modeling and

implementation. Sensors, 19(17), p.3788.

[3] Ye, J., Cheng, X., Zhu, J., Feng, L. and Song, L., 2018. A DDoS attack detection method based on

SVM in software defined network. Security and Communication Networks, 2018.

[4] Shinan, K., Alsubhi, K., Alzahrani, A. and Ashraf, M.U., 2021. Machine learning-based botnet

detection in software-defined network: a systematic review. Symmetry, 13(5), p.866.

[5] Bhushan, K. and Gupta, B.B., 2019. Distributed denial of service (DDoS) attack mitigation in software

defined network (SDN)-based cloud computing environment. Journal of Ambient Intelligence and

Humanized Computing, 10(5), pp.1985-1997.

[6] Rego, A., Garcia, L., Sendra, S. and Lloret, J., 2018. Software Defined Network-based control system

for an efficient traffic management for emergency situations in smart cities. Future Generation

Computer Systems, 88, pp.243-253.

[7] Deb, R. and Roy, S., 2021. A Software Defined Network information security risk assessment based on

Pythagorean fuzzy sets. Expert Systems with Applications, 183, p.115383.

[8] Wang, P., Yang, L.T., Nie, X., Ren, Z., Li, J. and Kuang, L., 2020. Data-driven software defined

network attack detection: State-of-the-art and perspectives. Information Sciences, 513, pp.65-83.

[9] Tang, Q., Wang, K., Song, Y., Li, F. and Park, J.H., 2019. Waiting time minimized charging and

discharging strategy based on mobile edge computing supported by software-defined network. IEEE

Internet of Things Journal, 7(7), pp.6088-6101.

[10] Zhang, B., Wang, X. and Huang, M., 2018. Multi-objective optimization controller placement problem

in internet-oriented software defined network. Computer Communications, 123, pp.24-35.

[11] Alzahrani, A.O. and Alenazi, M.J., 2021. Designing a network intrusion detection system based on

machine learning for software defined networks. Future Internet, 13(5), p.111.

[12] Zhijun, W., Qing, X., Jingjie, W., Meng, Y. and Liang, L., 2020. Low-rate DDoS attack detection

based on factorization machine in software defined network. IEEE Access, 8, pp.17404-17418.

[13] Ahuja, N., Singal, G., Mukhopadhyay, D. and Kumar, N., 2021. Automated DDOS attack detection in

software defined networking. Journal of Network and Computer Applications, 187, p.103108.

[14] Tonkal, Ö., Polat, H., Başaran, E., Cömert, Z. and Kocaoğlu, R., 2021. Machine Learning Approach

Equipped with Neighbourhood Component Analysis for DDoS Attack Detection in Software-Defined

Networking. Electronics, 10(11), p.1227.

[15] Stepin, I., Alonso, J.M., Catala, A. and Pereira-Fariña, M., 2020, July. Generation and evaluation of

factual and counterfactual explanations for decision trees and fuzzy rule-based classifiers. In 2020

IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (pp. 1-8). IEEE.

[16] Reddy, G.T. and Khare, N., 2018. Heart disease classification system using optimised fuzzy rule based

algorithm. International Journal of Biomedical Engineering and Technology, 27(3), pp.183-202.

[17] Chandirasekaran, D. and Jayabarathi, T., 2019. Cat swarm algorithm in wireless sensor networks for

optimized cluster head selection: a real time approach. Cluster Computing, 22(5), pp.11351-11361.

[18] Orouskhani, M. and Shi, D., 2018. Fuzzy adaptive cat swarm algorithm and Borda method for solving

dynamic multi‐objective problems. Expert Systems, 35(4), p.e12286.

[19] K. S. Sahoo, B. K. Tripathy, K. Naik, S. Ramasubbareddy, B. Balusamy et al., “An evolutionary SVM

model for DDOS attack detection in software defined networks,” IEEE Access, vol. 8, pp. 132502–

132513, 2020

[20] Nadeem, M. W., Goh, H. G., Ponnusamy, V., Aun, Y. (2022). DDoS Detection in SDN using Machine

Learning Techniques. CMC-Computers, Materials & Continua, 71(1), 771–789.


Cite this Article as :
Style #
MLA Mohammed. I. Alghamdi, Abeer. Y. Salawi, Salwa. H. Alghamdi. "Smart Model for Securing Software Defined Networks." Journal of Cybersecurity and Information Management, Vol. 10, No. 1, 2022 ,PP. 08-17 (Doi   :  https://doi.org/10.54216/JCIM.0100101)
APA Mohammed. I. Alghamdi, Abeer. Y. Salawi, Salwa. H. Alghamdi. (2022). Smart Model for Securing Software Defined Networks. Journal of Journal of Cybersecurity and Information Management, 10 ( 1 ), 08-17 (Doi   :  https://doi.org/10.54216/JCIM.0100101)
Chicago Mohammed. I. Alghamdi, Abeer. Y. Salawi, Salwa. H. Alghamdi. "Smart Model for Securing Software Defined Networks." Journal of Journal of Cybersecurity and Information Management, 10 no. 1 (2022): 08-17 (Doi   :  https://doi.org/10.54216/JCIM.0100101)
Harvard Mohammed. I. Alghamdi, Abeer. Y. Salawi, Salwa. H. Alghamdi. (2022). Smart Model for Securing Software Defined Networks. Journal of Journal of Cybersecurity and Information Management, 10 ( 1 ), 08-17 (Doi   :  https://doi.org/10.54216/JCIM.0100101)
Vancouver Mohammed. I. Alghamdi, Abeer. Y. Salawi, Salwa. H. Alghamdi. Smart Model for Securing Software Defined Networks. Journal of Journal of Cybersecurity and Information Management, (2022); 10 ( 1 ): 08-17 (Doi   :  https://doi.org/10.54216/JCIM.0100101)
IEEE Mohammed. I. Alghamdi, Abeer. Y. Salawi, Salwa. H. Alghamdi, Smart Model for Securing Software Defined Networks, Journal of Journal of Cybersecurity and Information Management, Vol. 10 , No. 1 , (2022) : 08-17 (Doi   :  https://doi.org/10.54216/JCIM.0100101)