Smart City Gnosys
Smart city article details
| Title | Suspicious Traffic Detection In Sdn With Collaborative Techniques Of Snort And Deep Neural Networks |
|---|---|
| ID_Doc | 53805 |
| Authors | Ujjan R.M.A.; Pervez Z.; Dahal K. |
| Year | 2019 |
| Published | Proceedings - 20th International Conference on High Performance Computing and Communications, 16th International Conference on Smart City and 4th International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2018 |
| DOI | http://dx.doi.org/10.1109/HPCC/SmartCity/DSS.2018.00152 |
| Abstract | Software Defined Networks (SDN) with OpenFlow (OF) based protocol tend to transform traditional network architecture to vendor independent architecture with data-plane and control-plane programmability. This programmability provides a rich functionality in central traffic management, switch configuration, Intrusion Detection System (IDS) integration and global view of entire deployed infrastructure. The SDN network comprises single point failure vulnerability mainly at central controller unit, the deployment of standalone legacy IDS sensors cannot guarantee for safeguard against intruders. Therefore, in the first stage of proposed work, a signature-based Snort IDS is implemented for malicious activity detection and traffic monitoring with traffic mirroring in Open vSwitch (OVS), then store in csv log file of Barnyard 2. In second stage, for the purpose of effective attack detection in the test-bed, a flowbased anomaly detection is deployed with Deep Neural Networks (DNN) to improve the signature-based IDS limitation with higher detection rate with low false-positive triggers. To assess the efficacy of our proposed collaborative detection technique, a testbed is developed to simulate malicious and benign traffic. From the simulation results, our collaborative detection mechanism achieved more than 90% true positive rate with less than 5% of false alarms for all TCP, UDP and ICMP attacks in general, demonstrating effective malicious traffic detection method as compared to conventional signature based methodologies. © 2018 IEEE. |
| Author Keywords | Barnyard 2; Deep Neural Networks; Open vSwitch; OpenFlow; Snort; Software Defined Networks |
