A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs
A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs
4, DECEMBER 2022
Abstract—Software Defined Networking (SDN) is an emerging management. If the IT operators need to configure any high-
network platform, which facilitates centralised network manage- level network policies, such as Quality of Service (QoS)
ment. The SDN enables the network operators to manage the or routing policy, they have to access the network devices
overall network consistently and holistically, regardless the com-
plexity of infrastructure devices. The promising features of the (e.g., routers and switches) separately using the vendor-
SDN enhance network security and facilitate the implementa- specific commands, which increases the overall complexity
tion of threat detection systems through software applications of the network. Additionally, the IP-based network devices
using open APIs. However, the emerging technology creates new are vertically integrated. The control plane (responsible for
security concerns and new threats that do not exist in the cur- the decision-making) and the data plane (which decides how
rent traditional networks. Distributed Denial of Service attacks
(DDoS) are one of the most rampant attacks that can interrupt to forward the network traffic according to the instructions
the functionality of the network and make most of the network from the control plane) are embedded into the same network
services unreachable for network users. The efficient identifica- device. Coupling the control and data planes can hamper the
tion of DDos attacks on SDN environments in literature is still innovation of the network infrastructure and reduce the flex-
a challenge because of the number of network features taken ibility of the network for any change or update. Besides,
into account and the overhead of applying machine learning
based anomaly detection techniques. Hence, in this paper, we aim the rapid growth of networking can increase maintenance
to use two popular feature selection methods, i.e., Information costs and significantly reduce network innovation in traditional
Gain (IG) and Random Forest (RF) in order to analyse the networks. Therefore, developing a new routing algorithm could
most comprehensive relevant features of DDoS attacks in SDN take 5 to 10 years and would practically be very costly [1].
networks. Using the most relevant features will improve the accu- Moreover, since all devices are widespread through the entire
racy of the anomaly detection system and reduce the false alarm
rates. Moreover, we propose a Deep Learning (DL) technique network, there is an increase in the number of middle-boxes
based on Long Short Term Memory (LSTM) and Autoencoder devices such as firewalls, load balancers, detection and defense
to tackle the problem of DDoS attacks in SDNs. We perform our systems, etc. According to Kreutz et al. [1], 57 of network
analysis and evaluation on three different datasets, i.e., InSDN, enterprises reported that the number of middle-boxes devices
CICIDS2017 and CICIDS2018. We also measure the overhead has significantly increased and reached the same number of
of the proposed DL model on the SDN controller and test the
network performance in terms of network throughput and end- other mandatory network devices like routers.
to-end latency. The results validate that the DL approach can To address many of the traditional IP network limitations,
efficiently identify DDoS attacks in SDN environments without the emerging network architecture, which is often known as
any significant degradation in the controller performance. Software Defined Networking (SDN), offers faster failover and
Index Terms—Anomaly detection, autoencoder, DDoS, deep enables the network to be centrally controlled. The key idea
learning, LSTM, InSDN dataset, SDN, traditional network. behind the SDN is to abolish vertical integration by splitting
the underlying infrastructure devices from the control plane.
The key feature of SDN versus traditional network is shown in
I. I NTRODUCTION Fig. 1. Decoupling the two plane layers increases the network
HE TRADITIONAL IP networks, which are widely flexibility and facilitates network management with the aid of
T applied today have become complex and difficult in their centralised controller. The new paradigm allows the operators
to manage the entire network using software APIs connected
Manuscript received 8 October 2021; revised 25 February 2022 and 18 with the SDN controller through the northbound interface
April 2022; accepted 19 June 2022. Date of publication 28 June 2022; date regardless of the underlying network technology. The global
of current version 9 December 2022. The Research Funding is University
Collage Dublin (UCD). The associate editor coordinating the review of this visibility introduced by the SDN system encourages many
article and approving it for publication was M. Chen. (Corresponding author: business enterprises such as Google, Huawei, Microsoft to
Mahmoud Said El Sayed.) implement the new paradigm in their network data centre [2].
Mahmoud Said El Sayed, Nhien-An Le-Khac, and Anca D. Jurcut
are with the School of Computer Science, University College Dublin, Despite all benefits offered by SDN, security is one of the
Dublin, D04 V1W8 Ireland (e-mail: [email protected]; significant challenges, which can slow down its widespread
[email protected]; [email protected]). adoption and deployment over different networks. Since the
Marianne A. Azer is with the National Telecommunication Institute, Nile
University, Cairo 12677, Egypt (e-mail: [email protected]). centralised controller is the heart of the network, it is vulnera-
Digital Object Identifier 10.1109/TCCN.2022.3186331 ble to a single point of failure. In case the attacker successfully
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
EL SAYED et al.: FLOW-BASED ANOMALY DETECTION APPROACH WITH FEATURE SELECTION METHOD 1863
C. DDoS Attack in SDN time. When there is no buffer space, the legitimate pack-
Although there are significant benefits of SDN in several ets are unable to buffer too, resulting in buffer saturation
application domains, several security issues in SDNs remain attacks.
unaddressed. Indeed, the security in SDN is a double edge • Flow Table Overflow [22]: The switch flow tables
sword. The centralised location of the controller can improve are stored in a memory, known as Ternary Content
the overall network security using new security tools with Addressable Memory (TCAM). Each entity rule associ-
the help of the northbound APIs. However, splitting the con- ated with it is defined with two times, i.e., idle time-
trol plane from the data plane produces new weaknesses out and hard timeout to address the limited space of
that lead to attacks which did not exist before in the IP- OpenFlow switches. The idle timeout is referred to the
based networks. Examples of these attacks include attacks amount of time in seconds when the flow is removed from
against the SDN controller or the attacks on the communica- the flow tables in case no flow is matching it. The hard
tion links between the controller and underlying infrastructure timeout determines how long this flow will stay in the
devices [14], [19]. In addition, all reported attacks in the flow table before being removed, whether or not the flows
current networks can also target the SDN network (e.g., appli- match it. The attacker can use this feature and send a large
cation attacks). However, the consequences of the attacks in number of the unmatched flow. After a while, all flow
SDN networks are very significant and can cause crucial dam- entities will be replaced by fake flows and the memory
age. On the other hand, the influences of the same attacks gets full with useless rules. Simultaneously, the switch
in traditional networks are mild or moderate, since only a will fail to handle any legitimate users and all received
small part of the network is being affected (likely for the flow will be dropped. However, the switch can handle
same vendor devices) [19]. When the intruder needs to extend a limited number of incoming packets, since the TCAM
his attacks against new subnets, additional privileges or new memory has limited space. This is because the TCAM
attacks are required for these purposes. cost can reach 400 times or over the RAM cost and its
One of the most serious attacks in SDN is the DDoS. usage power reaches 100 times that RAM consumes [23].
The attacker can easily generate a high volume of traffic • Link Flooding Attack (LFA) [24]: The flow switches
from spoofed IPs, causing heavy damages to the network communicate with the SDN controller using southbound
and making the controller unreachable for the legitimate links. In case the intruder generates numerous fake pack-
users. Unfortunately, all SDN layers are susceptible to DDoS ets and no buffer space in the switches, the full packet
attacks [20], and these attacks have different intuition from will be delivered to the SDN controller, and this can
those reported in the traditional networks, even from the ones quickly overload the bandwidth, creating a bottleneck for
that are categorised under the DDoS class. In the following the legitimate traffic.
paragraphs, we will emphasise some of the DDoS attacks that • Controller Saturation [25]: The controller is an appli-
are specific for the SDN networks. cation installed on a virtual machine and has limited
• Buffer Saturation Attacks [21]: When the switch receives resources, such as RAM and processing power. When
a new packet with no matching entry, the switch extracts the controller handles a large number of fake packets,
the packet header and sends it to the control plane to the extensive processing can degrade its resources. The
request a new flow rule. At this time, the packet payload controller saturation attack has a critical affect on the
is temporarily buffered in the memory until new instruc- SDN controller, since any breakdown or failure for the
tions are being received from the controller. In case the controller causes that the entire network to be lost.
buffer memory becomes full and has not enough space to The SDN controller is highly targeted by DDoS attacks
store new data, the switch will send the full packet size and can quickly become a bottleneck if it handles a large
to the control plane. The attacker can exploit this gap by amount of incoming flow. Since all unmatched packets are
generating a vast number of fake packets with forged IP relayed to the controller for drawing the new rules, then receiv-
addresses to run out the buffer memory within a short ing a high number of flows can run out its resources very
1866 IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, VOL. 8, NO. 4, DECEMBER 2022
TABLE I
S UMMARY OF THE S TATE - OF -A RT S OLUTIONS AGAINST DD O S ATTACKS IN SDN S
Pérez-Díaz et al. [42] applied six ML algorithms, REP Li et al. [47] built an efficient security defense mech-
Tree, SVM, MLP, RF, J48 and Random Tree for DDoS attack anism using DL algorithms against DDoS attacks in SDN
detection under the SDN context. The CIC-DDoS2019 dataset, networks. Three DL algorithms, i.e., CNN, LSTM and RNN
was used to validate the performance of proposed approaches. were used for the proposed model and the proposed model
Once the attacks are detected by one of the used ML algo- was evaluated on the ISCX dataset. Their model successfully
rithms, a mitigation strategy is started to block the malicious achieved an accuracy of 99%, and 98% in training and test
traffic before crashing the entire network. The IDS module was data, respectively.
installed on a separate platform and connected to the controller Another study [48] employed four ensemble DL approaches
through an Identification API. Although the implementation of against DDoS attacks in the SDN network. The results showed
the IDS on an individual platform can reduce the controller that the deep convolutional neural network (CNN) based
workload, it also increases the required resources, which can model achieved the highest accuracy of 99.45% compared
increase the total cost of the IDS framework. to other hybrid state-of-the-art algorithms. The CICIDS2017
Abdulrahman and Ibrahem [43] applied four ML algorithms, dataset was used to evaluate all proposed DL models.
i.e., C4.5, NB, SVM and RF to solve the problem of DDoS Novaes et al. [49] used Generative Adversarial Network
attacks. The IG feature selection method was used in the first (GAN) framework to alleviate the impact of DDoS attacks
stage to select the best 10 features of the CICIDS2017 dataset. in SDNs. The emulated and the public dataset, i.e., CIC-
Bindra and Sood [44] used different feature selec- DDoS2019 were used for experiments evaluations. The authors
tion methods, i.e., Recursive Feature Elimination (RFE), compared the obtained results from the GAN framework with
’SelectPercentile’, ’SelectFromModel’, and Principal different DL algorithms, e.g., LSTM, CNN, MLP.
Component Analysis (PCA) to find the most relevant Although the DL techniques can significantly solve the
features of DDos attacks using CICIDS2017 dataset. The size inherent problems of traditional ML techniques, most of the
of best-selected features is in the range of 12 to 15 in most existing studies validated their models using a dataset pro-
feature selection methods. Six ML techniques were used in duced based on traditional IP networks and not on SDN
the classification phase to test each method separately. The platforms. However, the characteristics and the operation
RF and KNN provided the highest performance, while LR behaviour of SDNs are largely different from the cur-
and NB have the lowest accuracy. rent networks. Besides, the SDN uses new protocols (e.g.,
The aforementioned approaches [27], [39]–[44] are based OpenFlow) that are different from those used in traditional
on traditional ML techniques and categorised under shallow networks. The OpenFlow protocol encounters new vulnerabil-
learning algorithms. Although these methods are often used ities, and this can motivate the attacker to easily create new
and successfully achieve high performance in various applica- attacks, causing confusion for IDSs in the SDN. Adding to
tions and domain areas, they have a low ability in the network these factors, many studies are still using outdated datasets,
flow traffic. The shallow learning techniques are sustained with such as KDDCup-‘99’ and NSL-KDD. These datasets are not
high false alarms and low detection rates, since they cannot only produced based on traces of two decades ago, but they
meet the requirements to detect complex malicious attacks. also lack the current Internet traffic. However, the modern
On the other hand, these approaches achieve reasonable results intrusion attack types are constantly growing and are becom-
when the dataset size has low amount of samples. On the con- ing more sophisticated, i.e., not easy to identify. On the other
trary, they fail to provide significant results when applied on side, the previous studies, which emulated the SDN network to
large traffic data. create a new dataset for evaluation process, only included few
types of DDoS attacks, without considering the attacks that
can target all layers. Moreover, the generated attacks were pro-
C. Deep Learning Based Solutions duced using simple tools, e.g., Scapy or Hping3, and targeted
Nowadays, Deep Learning (DL) approaches play a vital role only the network layer of the OSI model, without including
in anomaly detection techniques. Such techniques have the the attacks against the application layer. However, the DDoS
capability to capture the deep structure from the input data attacks against the application layer are not easy to detect
automatically without any human intervention. However, only since they are very similar to normal traffic. On the contrary,
few works utilised the DL for DDoS attacks in SDN networks. the DDoS attacks at the network layer are largely deviated
Ahuja et al. [45] compared the performance of Artificial from normal traffic and are easy to be detected using simple
Neural Network (ANN) with various classical ML algorithms algorithms.
for DDoS attacks detection in SDNs. A DDoS dataset was
created in an emulated environment with the help of mininet
and Ryu controller. The results demonstrated the potential of IV. M ETHODOLOGY
ANN for attack detection with an accuracy that reached 98.2%. This section discusses in detail our experimental setup, the
A DL approach [46] based on Gated Recurrent Unit (GRU) datasets used for our experiment evaluation, the feature selec-
was introduced to solve the problem of DDoS attacks in tion methods, and the DDoS detection approach. We explore
SDN networks. Only six selected features from the NSL-KDD the potential of DL techniques for DDoS attack detection in
dataset have been employed for DDoS attack classification. the SDN environments. The detailed process of the proposed
The authors claimed that their proposed model achieved an framework is summarised in Fig. 9. At the first stage, the
accuracy reached 89% . SDN-specific features are selected manually from three input
1870 IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, VOL. 8, NO. 4, DECEMBER 2022
TABLE II
number of instances in InSDN dataset is 361,317, where T HE E XTRACTED T RAFFIC F EATURES F ROM SDN C ONTROLLER [53]
the size of samples for normal and attack classes is 68,424
and 292,893, respectively.
• CICIDS2017 [15]: The dataset contained network traffic
of five days, generated in the period between Monday,
July 3, and Friday, July 7, 2017. The CICIDS2017 was
created using a complete network topology with several
devices such as routers, switches, firewalls, and differ-
ent operating systems platforms. The authors used the
concept of profiles to create the normal traffic in the TABLE III
datasets. The dataset was publicly available online in both T HE E XTRA T RAFFIC F EATURES [53]
PCAP and .CSV formats. The CICIDS2017 includes a
total number of instances equal to 2,830,743, where the
size of attacks represented 19.7% of the total data.
• CICIDS2018 [15]: The authors of [15] extended the
CICIDS2017 project to create a new realistic dataset in a
scalable manner. The CICIDS2018 traces were gathered
in 10 days with a total number of instances 16,233,002,
where the size of attacks represented 17% of the entire
data. The same concept of profiles was used to create
the normal and attack classes, but the authors used the TABLE IV
Amazon Web Services (AWS) platform instead of the old T HE 48 E XTRACTED S UBSET F EATURES IN SDN S
network infrastructure.
The three dataset features are generated using the
CICFlowMeter tool [52] and have more than 80 network flow
features in the format of .CSV file. The three datasets contain
a variety of attack classes. This work only focuses on DDoS
attacks, so the other attack classes are excluded from our study.
However, the size of the InSDN dataset is significantly small
compared to other datasets, so we take all labels categorised
under normal and DDoS classes. Nonetheless, only the Friday
afternoon (July 7) file is picked from CICIDS2017 for our
experiments, while Wednesday (February 21) file is used in
the case of the CICIDS2018 dataset.
TABLE V
T HE S IZE OF S AMPLES IN DATASETS
TABLE VI
LSTM-AUTOENCODER S PECIFICATIONS employed to update network weights iterative. We trained the
model using 100 epochs and 128 for the batch size.
TABLE VIII
E XPERIMENTAL E NVIRONMENT
TABLE IX
E VALUATION M ETRICS OF 48 AND 10 S UB -S ET F EATURES
TABLE X
R ESULTS OF THE T RAINED M ODEL BY CICIDS2017 ON I N SDN AND CICIDS2018
TABLE XI
C OMPARISON TO DD O S NET M ODEL [16] throughput and latency. The Cbench tool2 is utilised to evalu-
ate the performance of the controller with various numbers of
OpenFlow switches. The Cbench tool is used to evaluate the
overheads of the DL model on the SDN controller. It provides
two different options to test the throughput and latency as the
follow:
1) In the throughput mode, Cbench generates a stream
of packet-In message to the SDN controller and
then records the packet-Out message that have been
received in a period of time. Calculating the sending and
receiving stream provides a good indication of the aver-
0.003, respectively. Therefore, the classification error of the
age number of flows that the controller can handle for
represented classifier is less than the error described in the
each switch per second.
DDoSnet, which indicates the high efficiency of the proposed
2) In the latency mode, the Cbench sends a packet-In
model.
message to the controller and waits for the response
2) Comparative Analysis on CICIDS2017 Dataset: We fur-
before sending the next packet. Hence, we can find aver-
ther carried out a comparative analysis with two different
age number of milliseconds that a flow consumes to be
studies [44] and [43] on CICICI2017. Table XII represents
installed in each switch.
a comparative analysis of the two studies with the proposed
The model is written in Python programming language and
model. In [44] and [43], several ML algorithms have been
embedded on top of the SDN controller as an application layer.
employed with the feature selection methods. It is noticed
We compare our model performance in terms of throughput and
that our DL approach provided the highest accuracy compared
latency on the Ryu controller after training it on three various
to other work. The reported accuracy of the proposed model
datasets. The experiments are conducted on a Linux virtual
with IG and RF selection methods is 99.50% and 98.76%,
machine running 64-bit Ubuntu 18.04 LTS, 8 GB of RAM,
respectively.
Core-i7 CPU, and installed on a VMware workstation 15 Pro.
TABLE XII
C OMPARATIVE A NALYSIS ON CICIDS2017 DATASET
from one SDN controller to another. For simplicity, we test the B. Latency Evaluation
effect of the detection model on the Ryu controller. Figure 14 The latency test is represented in Fig. 15. Similar to the
illustrates the throughput of the controller with our model aforementioned throughput results, the latency increases with
using different datasets. The graph shows that the through- the increase of the topology size. The standalone controller has
put of the running standalone Ryu controller is limited at less latency compared to the embedded model, regardless the
3800 packet/s, which is very low compared to other con- dataset used. Integrating the security model with the controller
trollers [56], [57]. However, the standalone Ryu Controller can quite increase the controller latency. However, the model
provides a high throughput compared to the embedded DL with InSDN dataset experienced a small latency, followed by
model. Therefore, we take it as a baseline for evaluating the CICIDS2018, while the trained model on CICIDS2017 has the
detection model. The throughput of the Ryu controller and the highest latency, almost for all networks typologies.
embedded model are declined with increasing the number of The above results indicate that there is a trade-off between
switches. However, the performance of the model is varied network performance and security. Implementing security can
according to the used dataset. The decline in the through- comprehensively decrease network performance. Therefore,
put can be ignored in small network typologies when the tuning the network relies on the IT operations to find the best
model is trained on InSDN or CICIDS2018, while the drop is adjustments based on their requirements, either by enhancing
significantly high for the CICIDS2017. the network security with a little delay or keep it fast [58].
The throughput of the model in the case of using the InSDN
dataset is dropped by about 2.86% and 3.1% when the number
of switches increases from 32 to 256, respectively. Compared VII. D ISCUSSION AND L IMITATION
with the CICIDS2018, the throughput decreases by 3.7 and Although the SDN is a promising solution for anomaly
4.1% and is significantly reduced by 2.8% and 6.37% for detection systems, the SDN itself can be a target for several
CICIDS2017. It can noticed that the training dataset not only attack threats. Unfortunately, all SDN layers are susceptible
plays a vital role in the potential of the classifier capability; to DDoS attacks, which can easily consume its resources
but it is also effective in determining the performance of the and prevent or even delay the network services for legiti-
model inside the network. We can see that the model with mate users. Therefore, eliminating the impact of these attacks
InSDN data provides less overhead on the controller compared has gained significant attention from the research commu-
to other datasets. nity in the last decade. Instantaneously, there is an increasing
1878 IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, VOL. 8, NO. 4, DECEMBER 2022
direction of using machine and deep learning techniques for • In this article, we employed the DL model to produce
anomaly detection systems to solve the problem of DDoS a lightweight model against DDoS attacks. Despite the
attacks in SDNs. However, the quality of the training dataset DDoS attacks being one of the most dangerous attacks
is a key pillar of any model efficiency. in the SDN, the SDN is vulnerable to many other attacks
On the other hand, one of the main challenges, which seri- that can compromise its normal operation. In the near
ously hinder the performance of the ML/DL models is the future, we will train the DL model to consider new attacks
problem of overfitting. The model can effectively perform very in the SDN. In addition, a new experimental test should
well during the training but fails to display a good tendency be used to classify the data categories into normal or
with the unseen data. There are many reasons that can cause attack classes, i.e., using multi-classification instead of
this problem such as, the complexity of the model and the low binary classification.
amount of data used to create a suitable approach. Thus, the • The adversaries can actively adapt and modify their
best practice to test the efficacy of intrusion detection mod- threat models to learn the decision boundary of the
els is to evaluate how it can work with new data that have anomaly detector. They aim to compromise the integrity
never been seen before during the training. This is what we of anomaly detectors by reducing the confidence and
investigated and successfully achieved in this work. modifying the input (an anomalous sample) in order to
Nonetheless, the majority of the current anomaly detection output (nominal class) by the detector [62]. Therefore,
techniques in SDNs have been evaluated using a dataset gen- understanding the adversary threat model will help avoid
erated based on IP-traditional networks and not from SDNs. mistakes and reduce the false positive alarms of the
However, the SDN platform generates new attack vectors that anomaly detectors. However, the attack methodology,
did not exist before in traditional networks. Thus, training the which adversarial examples reside is beyond the scope
detection model using an improper dataset can deceive the of this paper. The interested reader can refer to [62]–[65]
classifier model and make it easily prone to overfitting. In for more information regarding the general strategies that
addition, the behaviour of the attacks is different from one an attacker can use against any anomaly detector.
environment to another. For example, the attacker can exploit
the operation of the SDN and employ some existing attacks
such as “Port scan” and “IP sweep” to overwhelm the con- VIII. C ONCLUSION
troller with a heavy volume of unknown traffic, creating a Training the network intrusion detection system using a
new DDoS attack vector [59]. However, conventional detec- high-dimensional dataset increases the complexity of proposed
tion systems can easily identify “Port scan” and “IPsweep”, classifier, which result in excessive training and classification
but the functionality of these attacks are different in SDNs, i.e., time. The pre-processing feature selection methods play an
work as DDoS. Moreover, DDoS attacks are rapidly evolving essential role in identifying the important features from the
threat and can cause a crucial impact on the performance of original dataset, and this would help to improve the classi-
network services running over SDN [60]. Hence, the avail- fication accuracy and avoid the curse of high computational
ability and response time of SDN services are significantly complexity. The aim of this work is to reduce the redundant or
degraded at presence of attacks. In this article, we demon- irrelevant features without any significant impact on the classi-
strate how the importance of features is being changed from fication accuracy. We have selected 10 features out of available
one dataset to another, regardless of the fact that the used 48 features using two common feature selection methods IG
datasets have the same attack classes or a similar number of and RF. A modified DL model based on LSTM-Autoencoder
features. However, some of attributes that are widely used for was used for experimental purposes, while the DDoS attacks
model classifiers on IP based networks can have less impact were considered as a case study. Our approach provides a
in the SDN and vice versa [61]. Based on the analysis and high detection rate and presents a more efficient better time
the above results, we showed that the behaviour and operation to build the model. We further tested the trained model on the
of the SDNs are varied from other networks. Thus, the struc- performance of the SDN controller to evaluate how the used
ture of the new platform should be taken due to the design of dataset can impact on the performance of the SDN controller.
anomaly detection systems. The results showed that the proposed approach does not dete-
Likewise, our proposed model is experienced to some riorate the network performance. In our future work, we will
limitations which are listed below: analyse new attack classes for the test evaluation. Also, we
• We test the performance of the model using only one plan to apply our proposed model on real SDN network in
SDN controller; however, the throughput and latency are order to understand how this IDS can handle the intrusion in
varied from one controller to another. Thus, several con- real-time.
trollers should be examined for fair awareness and to
represent how the embedded model can work efficiently
with other controllers. R EFERENCES
• We trained and evaluated the DL model in offline mode [1] D. Kreutz, F. M. Ramos, P. E. Verissimo, C. E. Rothenberg,
using virtual simulation without implementing a physical S. Azodolmolky, and S. Uhlig, “Software-defined networking: A com-
SDN networks. However, the detection of attacks online prehensive survey,” Proc. IEEE, vol. 103, no. 1, pp. 14–76, Jan. 2015.
[2] W. Xia, Y. Wen, C. H. Foh, D. Niyato, and H. Xie, “A survey on
is very important to understand how this IDS can handle software-defined networking,” IEEE Commun. Surveys Tuts., vol. 17,
the intrusion in real-time. no. 1, pp. 27–51, 1st Quart., 2015.
EL SAYED et al.: FLOW-BASED ANOMALY DETECTION APPROACH WITH FEATURE SELECTION METHOD 1879
[3] S. Shin and G. Gu, “Attacking software-defined networks: A first feasi- [26] K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, and
bility study,” in Proc. 2nd ACM SIGCOMM Workshop Hot Topics Softw. V. Maglaris, “Combining OpenFlow and sFlow for an effective and
Defined Netw., 2013, pp. 165–166. scalable anomaly detection and mitigation mechanism on SDN envi-
[4] Ö. Kasim, “An efficient and robust deep learning based network anomaly ronments,” Comput. Netw., vol. 62, pp. 122–136, Apr. 2014.
detection against distributed denial of service attacks,” Comput. Netw., [27] L. Tan, Y. Pan, J. Wu, J. Zhou, H. Jiang, and Y. Deng, “A new framework
vol. 180, Oct. 2020, Art. no. 107390. for DDoS attack detection and defense in SDN environment,” IEEE
[5] N. Garcia, T. Alcaniz, A. González-Vidal, J. B. Bernabe, D. Rivera, Access, vol. 8, pp. 161908–161919, 2020.
and A. Skarmeta, “Distributed real-time SlowDoS attacks detection over [28] A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, “Survey
encrypted traffic using artificial intelligence,” J. Netw. Comput. Appl., of intrusion detection systems: Techniques, datasets and challenges,”
vol. 173, Jan. 2021, Art. no. 102871. Cybersecurity, vol. 2, no. 1, pp. 1–22, 2019.
[6] B. B. Zarpelão, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga, [29] A. Alshamrani, A. Chowdhary, S. Pisharody, D. Lu, and D. Huang, “A
“A survey of intrusion detection in Internet of Things,” J. Netw. Comput. defense system for defeating DDoS attacks in SDN based networks,”
Appl., vol. 84, pp. 25–37, Apr. 2017. in Proc. 15th ACM Int. Symp. Mobility Manage. Wireless Access, 2017,
[7] K. Bouzoubaa, B. Nsiri, and Y. Taher, “Predicting DOS-DDOS attacks: pp. 83–92.
Review and evaluation study of feature selection methods based on wrap- [30] M. S. El Sayed, N.-A. Le-Khac, and A. D. Jurcut, “Dealing with
per process,” Int. J. Adv. Comput. Sci. Appl., vol. 12, no. 5, pp. 131–145, COVID-19 network traffic spikes [cybercrime and forensics],” IEEE
2021. Security Privacy, vol. 19, no. 1, pp. 90–94, Jan./Feb. 2021.
[8] D. Kurniabudi, D. Stiawan, M. Y. B. Idris, A. M. Bamhdi, and [31] P. Kumar, M. Tripathi, A. Nehra, M. Conti, and C. Lal, “SAFETY:
R. Budiarto, “CICIDS-2017 dataset feature analysis with information Early detection and mitigation of TCP SYN flood utilizing entropy in
gain for anomaly detection,” IEEE Access, vol. 8, pp. 132911–132921, SDN,” IEEE Trans. Netw. Service Manag., vol. 15, no. 4, pp. 1545–1559,
2020. Dec. 2018.
[9] A. Bommert, X. Sun, B. Bischl, J. Rahnenführer, and M. Lang, [32] K. Kalkan, L. Altay, G. Gür, and F. Alagöz, “JESS: Joint entropy-based
“Benchmark for filter methods for feature selection in high-dimensional DDoS defense scheme in SDN,” IEEE J. Sel. Areas Commun., vol. 36,
classification data,” Comput. Stat. Data Anal., vol. 143, Mar. 2020, no. 10, pp. 2358–2372, Oct. 2018.
Art. no. 106839. [33] S. Yu, J. Zhang, J. Liu, X. Zhang, Y. Li, and T. Xu, “A cooperative
[10] J. Tang, S. Alelyani, and H. Liu, “Feature selection for classification: A DDoS attack detection scheme based on entropy and ensemble learning
review,” in Data Classification: Algorithms Applications. Boca Raton, in SDN,” EURASIP J. Wireless Commun. Netw., vol. 90, no. 1, pp. 1–21,
FL, USA: CRC Press, 2014, p. 37. 2021.
[11] H. Polat, O. Polat, and A. Cetin, “Detecting DDoS attacks in software- [34] A. Mishra, N. Gupta, and B. Gupta, “Defense mechanisms against
defined networks through feature selection methods and machine DDoS attack based on entropy in SDN-cloud using POX controller,”
learning models,” Sustainability, vol. 12, no. 3, p. 1035, 2020. Telecommun. Syst., vol. 77, no. 1, pp. 47–62, 2021.
[12] M. Suresh and R. Anitha, “Evaluating machine learning algorithms for [35] K. S. Sahoo, D. Puthal, M. Tiwary, J. J. Rodrigues, B. Sahoo, and
detecting DDoS attacks,” in Proc. Int. Conf. Netw. Security Appl., 2011, R. Dash, “An early detection of low rate DDoS attack to SDN based
pp. 441–452. data center networks using information distance metrics,” Future Gener.
[13] E. Balkanli, A. N. Zincir-Heywood, and M. I. Heywood, “Feature Comput. Syst., vol. 89, pp. 685–697, Dec. 2018.
selection for robust backscatter DDoS detection,” in Proc. IEEE
[36] R. Wang, Z. Jia, and L. Ju, “An entropy-based distributed DDoS
40th Local Comput. Netw. Conf. Workshops (LCN Workshops), 2015,
detection mechanism in software-defined networking,” in Proc. IEEE
pp. 611–618.
Trustcom/BigDataSE/ISPA, vol. 1, 2015, pp. 310–317.
[14] M. S. El Sayed, N.-A. Le-Khac, and A. D. Jurcut, “InSDN: A novel SDN
[37] M. S. El Sayed, N.-A. Le-Khac, S. Dev, and A. D. Jurcut, “Detecting
intrusion dataset,” IEEE Access, vol. 8, pp. 165263–165284, 2020.
abnormal traffic in large-scale networks,” in Proc. Int. Symp. Netw.
[15] I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating
Comput. Commun. (ISNCC), 2020, pp. 1–7.
a new intrusion detection dataset and intrusion traffic characterization,”
[38] M. Said El Sayed, N.-A. Le-Khac, S. Dev, and A. D. Jurcut, “Network
in Proc. ICISSP, 2018, pp. 108–116.
anomaly detection using LSTM based autoencoder,” in Proc. 16th ACM
[16] M. S. El Sayed, N.-A. Le-Khac, S. Dev, and A. D. Jurcut, “DDoSNet:
Symp. QoS Security Wireless Mobile Netw., 2020, pp. 37–45.
A deep-learning model for detecting network attacks,” in Proc. IEEE
21st Int. Symp. World Wireless Mobile Multimedia Netw. (WoWMoM), [39] S. Dong and M. Sarem, “DDoS attack detection method based on
2020, pp. 391–396. improved KNN with the degree of DDoS attack in software-defined
[17] J. C. C. Chica, J. C. Imbachi, and J. F. B. Vega, “Security in SDN: networks,” IEEE Access, vol. 8, pp. 5039–5048, 2019.
A comprehensive survey,” J. Netw. Comput. Appl., vol. 159, Jun. 2020, [40] L. Yang and H. Zhao, “DDoS attack identification and defense using
Art. no. 102595. SDN based on machine learning method,” in Proc. 15th Int. Symp.
[18] H. Griffioen, K. Oosthoek, P. van der Knaap, and C. Doerr, “Scan, Pervasive Syst., Algorithms Netw. (I-SPAN), 2018, pp. 174–178.
test, execute: Adversarial tactics in amplification DDoS attacks,” in [41] Y. Yu, L. Guo, Y. Liu, J. Zheng, and Y. Zong, “An efficient SDN-
Proc. 2021 ACM SIGSAC Conf. Comput. Commun. Security, 2021, based DDoS attack detection and rapid response platform in vehicular
pp. 940–954. networks,” IEEE Access, vol. 6, pp. 44570–44579, 2018.
[19] M. S. El Sayed, N.-A. Le-Khac, M. A. Albahar, and A. Jurcut, “A novel [42] J. A. Pérez-Díaz, I. A. Valdovinos, K.-K. R. Choo, and D. Zhu, “A
hybrid model for intrusion detection systems in SDNs based on CNN flexible SDN-based architecture for identifying and mitigating low-
and a new regularization technique,” J. Netw. Comput. Appl., vol. 191, rate DDoS attacks using machine learning,” IEEE Access, vol. 8,
Oct. 2021, Art. no. 103160. pp. 155859–155872, 2020.
[20] N. Z. Bawany, J. A. Shamsi, and K. Salah, “DDoS attack detection and [43] A. A. Abdulrahman and M. K. Ibrahem, “Evaluation of DDoS attacks
mitigation using SDN: Methods, practices, and solutions,” Arab. J. Sci. detection in a CICIDS2017 dataset based on classification algorithms,”
Eng., vol. 42, no. 2, pp. 425–441, 2017. IRAQI J. Inf. Commun. Technol., vol. 1, no. 3, pp. 49–55, 2018.
[21] T. Ubale and A. K. Jain, “Taxonomy of DDoS attacks in software- [44] N. Bindra and M. Sood, “Evaluating the impact of feature selection
defined networking environment,” in Proc. Int. Conf. Futuristic Trends methods on the performance of the machine learning models in detecting
Netw. Commun. Technol., 2018, pp. 278–291. DDoS attacks,” Sci. Technol., vol. 23, no. 3, pp. 250–261, 2020.
[22] Y. Qian, W. You, and K. Qian, “Openflow flow table overflow attacks [45] N. Ahuja, G. Singal, D. Mukhopadhyay, and N. Kumar, “Automated
and countermeasures,” in Proc. Eur. Conf. Netw. Commun. (EuCNC), DDOS attack detection in software defined networking,” J. Netw.
2016, pp. 205–209. Comput. Appl., vol. 187, Aug. 2021, Art. no. 103108.
[23] J. Singh and S. Behal, “Detection and mitigation of DDoS attacks [46] T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho,
in SDN: A comprehensive review, research challenges and future “Deep recurrent neural network for intrusion detection in SDN-based
directions,” Comput. Sci. Rev., vol. 37, Aug. 2020, Art. no. 100279. networks,” in Proc. 4th IEEE Conf. Netw. Softwarization Workshops
[24] R. U. Rasool, U. Ashraf, K. Ahmed, H. Wang, W. Rafique, and (NetSoft), 2018, pp. 202–206.
Z. Anwar, “Cyberpulse: A machine learning based link flooding attack [47] C. Li et al., “Detection and defense of DDoS attack–based on deep
mitigation system for software defined networks,” IEEE Access, vol. 7, learning in OpenFlow-based SDN,” Int. J. Commun. Syst., vol. 31, no. 5,
pp. 34885–34899, 2019. 2018, Art. no. e3497.
[25] Z. Li, W. Xing, S. Khamaiseh, and D. Xu, “Detecting saturation attacks [48] S. Haider et al., “A deep CNN ensemble framework for efficient DDoS
based on self-similarity of OpenFlow traffic,” IEEE Trans. Netw. Service attack detection in software defined networks,” IEEE Access, vol. 8,
Manag., vol. 17, no. 1, pp. 607–621, Mar. 2020. pp. 53972–53983, 2020.
1880 IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, VOL. 8, NO. 4, DECEMBER 2022
[49] M. P. Novaes, L. F. Carvalho, J. Lloret, and M. L. Proença, Jr., Nhien-An Le-Khac (Senior Member, IEEE)
“Adversarial deep learning approach detection and defense against DDoS received the Ph.D. degree in computer science from
attacks in SDN environments,” Future Gener. Comput. Syst., vol. 125, the Institut National Polytechnique de Grenoble,
pp. 156–167, Dec. 2021. France, in 2006. He is a Lecturer with the School
[50] M. Ring, S. Wunderlich, D. Scheuring, D. Landes, and A. Hotho, “A of Computer Science, University College Dublin
survey of network-based intrusion detection data sets,” Comput. Security, (UCD), Ireland. He is currently the Programme
vol. 86, pp. 147–167, Sep. 2019. Director of UCD M.Sc. programme in Forensic
[51] M. T. A. Abdullah, J. Lloret, A. Cánovas Solbes, and L. García-García, Computing and Cybercrime Investigation, an inter-
“Survey of transportation of adaptive multimedia streaming service in national programme for the law enforcement officers
Internet,” Netw. Protocols Algorithms, vol. 9, nos. 1–2, pp. 85–125, specializing in cybercrime investigations. To date,
2017. more than 1000 students from 60 countries in five
[52] G. Draper-Gil, A. H. Lashkari, M. S. I. Mamun, and A. A. Ghorbani, continents have graduated from this FCCI programme. He is also the Co-
“Characterization of encrypted and VPN traffic using time-related,” Founder of UCD-GNECB Postgraduate Certificate in fraud and e-crime
in Proc. 2nd Int. Conf. Inf. Syst. Security Privacy (ICISSP), 2016, investigation. He was a Research Fellow with Citibank, Ireland (Citi). His
pp. 407–414. research interests span the area of cybersecurity and digital forensics, machine
[53] P. Krishnan, S. Duttagupta, and K. Achuthan, “VARMAN: Multi-plane learning for security, fraud and criminal detection, cloud security and privacy,
security framework for software defined networks,” Comput. Commun., and high-performance computing. Since 2013, he has collaborated on many
vol. 148, pp. 215–239, Dec. 2019. research projects as a principal/co-PI/funded investigator. He has published
[54] L. Breiman, “Random forests,” Mach. Learn., vol. 45, no. 1, pp. 5–32, more than 150 scientific papers in peer-reviewed journal and conferences in
2001. related research fields. He is an active chair as well as a reviewer for many
[55] J. H. Steiger and R. T. Fouladi, “Noncentrality interval estimation key conferences and journals in related disciplines.
and the evaluation of statistical models,” in What If There Were no
Significance Tests. London, U.K.: Routledge, 2016, pp. 197–229.
[56] A. T. Tang, “Software defined networking: Network intrusion detection
system,” Ph.D. dissertation, Dept. Electron. Elect. Eng., Univ. Leeds,
Leeds, U.K., 2019. Marianne A. Azer received the B.Sc., M.Sc., and
[57] M. M. Isa and L. Mhamdi, “Native SDN intrusion detection using Ph.D. degrees from the Faculty of Engineering,
machine learning,” in Proc. IEEE 8th Int. Conf. Commun. Netw. Electronics and Communications Department, Cairo
(ComNet), 2020, pp. 1–7. University. She is an Associate Professor with
[58] M. A. Albahar, “Recurrent neural network model based on a new the National Telecommunication Institute, Nile
regularization technique for real-time intrusion detection in SDN University, Cairo, Egypt. She is also the Director of
environments,” Security Commun. Netw., vol. 2019, Nov. 2019, the Information Center, National Telecommunication
Art. no. 8939041. Institute. Her research interests include network
[59] M. Conti, A. Gangwal, and M. S. Gaur, “A comprehensive and effective security, security in wireless networks, Internet of
mechanism for DDoS detection in SDN,” in Proc. IEEE 13th Int. Conf. Things privacy and security, and cloud security and
Wireless Mobile Comput. Netw. Commun. (WiMob), 2017, pp. 1–8. privacy. She has been a Board Member of the
[60] Q. Niyaz, W. Sun, and M. Alam, “Impact on SDN powered network Financial Regulatory Authority since May 2021. She is a former mem-
services under adversarial attacks,” Procedia Comput. Sci., vol. 62, ber of the Egyptian Parliament and a former advisor to the Ministry of
pp. 228–235, Aug. 2015. Communication and Information Technology for strategic initiatives. She has
[61] R. Santos, D. Souza, W. Santo, A. Ribeiro, and E. Moreno, “Machine been the Vice President of Information Systems Audit and Control Association
learning algorithms to detect DDoS attacks in SDN,” Concurrency (ISACA) Board in Egypt since 2019. Throughout her career, she held several
Comput. Pract. Exp., vol. 32, no. 16, 2020, Art. no. e5402. positions, either academic or managerial in several universities and organi-
[62] A. Kuppa, S. Grzonkowski, M. R. Asghar, and N.-A. Le-Khac, “Black zations. To mention a few, the Ministry of Communication and Information
box attacks on deep anomaly detectors,” in Proc. 14th Int. Conf. Avail. Technology, the National Telecommunication Institute, Nile University, Cairo
Rel. Security, 2019, pp. 1–10. University, The American University in Cairo, French University, the Arab
[63] B. Biggio and F. Roli, “Wild patterns: Ten years after the rise of Academy for Science and Technology, and Maritime Transport. She was the
adversarial machine learning,” Pattern Recognit., vol. 84, pp. 317–331, President of ISACA Board in Egypt 2018–2020, a member of the Global
Dec. 2018. Advisory Board on Emerging Technologies (ISACA) 2020–2021, and also a
[64] Q. Liu, P. Li, W. Zhao, W. Cai, S. Yu, and V. C. Leung, “A survey on member of the Global Advisory Board for Facebook Community Leadership
security threats and defensive techniques of machine learning: A data Program 2018–2019. She received many awards and recognitions both on the
driven view,” IEEE Access, vol. 6, pp. 12103–12117, 2018. international and national levels. She is a member of international and national
[65] N. Papernot, P. McDaniel, X. Wu, S. Jha, and A. Swami, “Distillation organizations in diverse fields, such as telecommunications, politics, women,
as a defense to adversarial perturbations against deep neural networks,” science, technology, culture, angel investment, and governance.
in Proc. IEEE Symp. Security Privacy (SP), 2016, pp. 582–597.