Intrusion detection in software defined network using deep learning approaches.

Sci Rep

Fuclty of Computers and Artificial Intelligence, Cairo University, Giza, Egypt.

Published: November 2024

Ensuring robust network security is crucial in the context of Software-Defined Networking(SDN). Which, becomes a multi-billion dollar industry, and it's deployed in many data centers nowadays. The new technology provides network programmability, network centralized control, and a global view of the network. But, unfortunately, it comes with new vulnerabilities, and new attack vectors compared to the traditional network. SDN network cybersecurity became a trending research topic due to the hype of Machine Learning (ML) when a group of Machine Learning(ML) techniques called Deep Learning(DL) started to take shape in the setting of SDN networks. This paper focuses on developing advanced Deep Learning(DL) models to address the inherent new attack vectors. In this paper, we have built and compared two models that can be used for building a complete Intrusion Detection System(IDS) solution, one using a hybrid CNN-LSTM architecture and the other using Transformer encoder-only architecture. We specifically target the SDN controller where it represents a crucial point. We utilized the InSDN dataset for training and testing our models, this dataset captures real-world traffic within the SDN environment. For evaluation, we have used accuracy, precision, recall, and F1 Score. Our experiment results show that the Transformer model with 48 features achieves the highest accuracy at 99.02%, while the CNN-LSTM model achieves 99.01%. We have reduced the features to 6 and 4, which gave us varying impacts on the models' performance. We have merged 4 poorly represented attacks in one class, which enhanced the accuracy by a significant score. Additionally, we investigate binary classification by merging all attack types into a single class, as a result, the accuracy increased for both models. The CNN-LSTM model achieves the best results with an accuracy of 99.19% for 6 feature sets, this enhances the state-of-the-art results.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11589109PMC
http://dx.doi.org/10.1038/s41598-024-79001-1DOI Listing

Publication Analysis

Top Keywords

intrusion detection
8
attack vectors
8
deep learningdl
8
cnn-lstm model
8
model achieves
8
network
7
accuracy
5
detection software
4
software defined
4
defined network
4

Similar Publications

Insider threats pose a significant challenge to IT security, particularly with the rise of generative AI technologies, which can create convincing fake user profiles and mimic legitimate behaviors. Traditional intrusion detection systems struggle to differentiate between real and AI-generated activities, creating vulnerabilities in detecting malicious insiders. To address this challenge, this paper introduces a novel Deep Synthesis Insider Intrusion Detection (DS-IID) model.

View Article and Find Full Text PDF

The widespread use of wireless networks to transfer an enormous amount of sensitive information has caused a plethora of vulnerabilities and privacy issues. The management frames, particularly authentication and association frames, are vulnerable to cyberattacks and it is a significant concern. Existing research in Wi-Fi attack detection focused on obtaining high detection accuracy while neglecting modern traffic and attack scenarios such as key reinstallation or unauthorized decryption attacks.

View Article and Find Full Text PDF

Background: Mobile phone SMS text message reminders have shown moderate effects in improving participation rates in ongoing colorectal cancer screening programs.

Objective: This study aimed to assess the effectiveness of SMS text messages as a replacement for routine postal reminders in a fecal immunochemical test-based colorectal cancer screening program in Catalonia, Spain.

Methods: We conducted a randomized controlled trial among individuals aged 50 to 69 years who were invited to screening but had not completed their fecal immunochemical test within 6 weeks.

View Article and Find Full Text PDF

Subslab soil gas (SSSG) samples were collected as part of an investigation to evaluate vapor intrusion (VI) into a building. The June 2015 Office of Solid Waste and Emergency Response (OSWER) VI Guide (U.S.

View Article and Find Full Text PDF

Vehicle-to-everything (V2X) communication has many benefits. It improves fuel efficiency, road safety, and traffic management. But it raises privacy and security concerns.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!