FDI Attack Detection Scheme based on Nonlinear Prediction and Deep Learning

Author(s):  
Aidong Xu ◽  
Peng Zhang ◽  
Qing Li ◽  
Hong Wen ◽  
Juan Guo ◽  
...  
2021 ◽  
pp. 17-30
Author(s):  
Vikash Kumar ◽  
Sidra Kalam ◽  
Ayan Kumar Das ◽  
Ditipriya Sinha

Author(s):  
Qingyue Meng ◽  
Shihui Zheng ◽  
Yongmei Cai ◽  
◽  

The numerical control separation in the Software-Defined Network (SDN) allows the control plane to have the absolute management rights of the network. As a new management plane of the SDN, once it is attacked, it will cause the entire network to face flaws. For this reason, this paper proposes a SDN control plane attack detection scheme based on deep learning, which can detect and respond to attacks on the SDN control plane in time. In this scenario, we propose a new pooling scheme that uses the TF-IDF idea to weight the characteristics of network traffic. Ultimately, our method achieved an accuracy of 99.8% in the SDN network’s traffic data set including 24 attack types.


Author(s):  
Shanshan Yu ◽  
Jicheng Zhang ◽  
Ju Liu ◽  
Xiaoqing Zhang ◽  
Yafeng Li ◽  
...  

AbstractIn order to solve the problem of distributed denial of service (DDoS) attack detection in software-defined network, we proposed a cooperative DDoS attack detection scheme based on entropy and ensemble learning. This method sets up a coarse-grained preliminary detection module based on entropy in the edge switch to monitor the network status in real time and report to the controller if any abnormality is found. Simultaneously, a fine-grained precise attack detection module is designed in the controller, and a ensemble learning-based algorithm is utilized to further identify abnormal traffic accurately. In this framework, the idle computing capability of edge switches is fully utilized with the design idea of edge computing to offload part of the detection task from the control plane to the data plane innovatively. Simulation results of two common DDoS attack methods, ICMP and SYN, show that the system can effectively detect DDoS attacks and greatly reduce the southbound communication overhead and the burden of the controller as well as the detection delay of the attacks.


Author(s):  
Narayan Bhusal ◽  
Mukesh Gautam ◽  
Raj Mani Shukla ◽  
Mohammed Benidris ◽  
Shamik Sengupta

Sign in / Sign up

Export Citation Format

Share Document