Intrusion Detection Using Multilayer Perceptron in Software Defined Network

Author(s):  
Keerthy N ◽  
Deepa N P ◽  
Mahesh Kumar N

The advancement of cloud and IoT technologies, has made network administration more difficult. Software-Defined Networking is one of the trending technologies which replaces the traditional networking domain with the programmable network configuration. In the current development of the network architecture, data security plays a prominent role. Many strategies for dealing with network attacks have been developed, among them deep learning is one of the most advanced technology. The paper aims to classify the network traffic into normal traffic and attack traffic with Multilayer Perceptron (MLP). The simulation uses a python programming language with many packages like Numpy, sci-kit, seaborn, etc. in a mininet SDN test bed with the Ryu controller. From the obtained results proposed algorithm gives better accuracy for classifying the attack traffic and normal traffic in the network.

Author(s):  
Adian Fatchur Rochim ◽  
Abda Rafi ◽  
Adnan Fauzi ◽  
Kurniawan Teguh Martono

The use of information technology these days are very high. From business through education activities tend to use this technology most of the time. Information technology uses computer networks for integration and management data. To avoid business problems, the number of network devices installed requires a manageable network configuration for easier maintenance. Traditionally, each of network devices has to be manually configured by network administrators. This process takes time and inefficient. Network automation methods exist to overcome the repetitive process. Design model uses a web-based application for maintenance and automates networking tasks. In this research, the network automation system implemented and built a controller application that used REST API (Representational State Transfer Application Programming Interface) architecture and built by Django framework with Python programming language. The design modeled namely As-RaD System. The network devices used in this research are Cisco CSR1000V because it supports REST API communication to manage its network configuration and could be placed on the server either. The As-RaD System provides 75% faster performance than Paramiko and 92% than NAPALM.


Author(s):  
Habib Mostafaei ◽  
Davinder Kumar ◽  
Gabriele Lospoto ◽  
Marco Chiesa ◽  
Giueseppe Di Battista

2014 ◽  
Vol 1044-1045 ◽  
pp. 1380-1383
Author(s):  
Guang Li Yin

Safety problem is one of the most attention and concern of driving. This paper in the high-speed on the road cars and car, car and road communications, vehicle real-time status, through the network information service system integration on a platform, on the use of related technologies are analyzed, the design of the software system based on SOA architecture.Keywords: network, GPS module, SOA cross platformI. IntorductionWith the development of science and technology and the improvement of people's living standard, Car popularity rate is high, it's hard to believe, families has two or three car. Whether it is the bus or private car is such rapid development, this will bring a lot of problems in road traffic, such as traffic congestion, traffic accident. These problems affect the normal life and travel, it is necessary to carry out management and provide information service for road use advanced technology. Using mobile phone GPS positioning module can obtain the vehicle speed and the basic information, through processing and optimization of information service system, the analysis of data useful, so as to divert traffic, both for the convenience of the user, but also improve the expressway management ability.


2021 ◽  
Vol 4 (4) ◽  
pp. 73
Author(s):  
Igor Glukhikh ◽  
Dmitry Glukhikh

The article considers the tasks of intellectual support for decision support in relation to a complex technological object. The relevance is determined by a high level of responsibility, together with a variety of possible situations at a complex technological facility. The authors consider case-based reasoning (CBR) as a method for decision support. For a complex technological object, the problem defined is the uniqueness of the situations, which is determined by a variety of elements and the possible environmental influence. This problem complicates the implementation of CBR, especially the stages of comparing situations and a further selection of the most similar situation from the database. As a solution to this problem, the authors consider the use of neural networks. The work examines two neural network architectures. The first part of the research presents a neural network model that builds upon the multilayer perceptron. The second part considers the “Comparator-Adder” architecture. Experiments have shown that the proposed neural network architecture “Comparator-Adder” showed higher accuracy than the multilayer perceptron for the considered tasks of comparing situations. The results have a high level of generalization and can be used for decision support in various subject areas and systems where complex technological objects arise.


2019 ◽  
Vol 6 (2) ◽  
pp. 181-192
Author(s):  
Herry Prasetyo Nugroho ◽  
Muhammad Irfan ◽  
Amrul Faruq

Software-Defined Network (SDN) as architecture network that separates the control and forwarding functions, so that network operators and administrators can configure the networks in a simple and centrally between thousands of devices. This study is designed and evaluate the Quality of Services (QoS) performances between the two networks employed SDN-based architecture and without SDN-based. MinNet as a software emulator used as a data plane in the network Software Define Network. In this study, comparison of the value of the QoS on the network based on Software Defined Network and traditional network during the test run from the source node is investigated. Network testing by using traffic loads. Traffic loads are used starting from 20Mbps-100Mbps. The result is verified that the QoS analysis of the Software-Defined Network architecture performed better than conventional network architectures. The value of the latency delay on the Software Define Network range between 0,019-0,084ms, and with 0% packet loss when addressed the network traffics of 10-100Mbps.


Author(s):  
Ankur Dumka ◽  
Hardwari Lal Mandoria ◽  
Anushree Sah

The chapter surveys the analysis of all the security aspects of software-defined network and determines the areas that are prone to security attacks in the given software-defined network architecture. If the fundamental network topology information is poisoned, all the dependent network services will become immediately affected, causing catastrophic problems like host location hijacking attack, link fabrication attack, denial of service attack, man in the middle attack. These attacks affect the following features of SDN: availability, performance, integrity, and security. The flexibility in the programmability of control plane has both acted as a bane as well as a boon to SDN. Like the ARP poisoning in the legacy networks, there are several other vulnerabilities in the SDN architecture as well.


2018 ◽  
Vol 7 (2.6) ◽  
pp. 46 ◽  
Author(s):  
Sanjeetha R ◽  
Shikhar Srivastava ◽  
Rishab Pokharna ◽  
Syed Shafiq ◽  
Dr Anita Kanavalli

Software Defined Network (SDN) is a new network architecture which separates the data plane from the control plane. The SDN controller implements the control plane and switches implement the data plane. Many papers discuss about DDoS attacks on primary servers present in SDN and how they can be mitigated with the help of controller. In our paper we show how DDoS attack can be instigated on the SDN controller by manipulating the flow table entries of switches, such that they send continuous requests to the controller and exhaust its resources. This is a new, but one of the possible way in which a DDoS attack can be performed on controller. We show the vulnerability of SDN for this kind of attack. We further propose a solution for mitigating it, by running a DDoS Detection module which uses variation of flow entry request traffic from all switches in the network to identify compromised switches and blocks them completely.


Network is the prime demand of today’s outreaching development in every sector. Starting from a small institute to big sectors like Industry, Organization, Defense, Ministry and Medicine all are dependent on network to maintain their data transmission efficiently. It provides the great ease of operation and information sharing. As we know with greater ease, much greater threat is handy. With the network also a big threat is associated i.e. network attacks. There are some major attacks which can violate and damage the whole network system and its integrity. Wireless attacks are very common and an intruder with vast knowledge of network administration and modification can easily find the loopholes in the security systems. There are different attacks like Denial of Services (DoS), Sniffer, Password Based, Spoofing, Eavesdropping etc. but the most dangerous of all is spoofing. Spoofing is an attack type in that the intruder impersonates as original identity and use their identity to achieve the intrusion goal. The attack is so severe because the user, even after seeing the intruder cannot identify it as the external body and take immediate action. The intruder enters the network and steals all the information as a legitimate user and damages the integrity of network. We propose here to find the intruder by using the energy consumption by nodes using the dead, asleep and active nodes. We can localize the location of intruders in the network using this technique. We use Received Signal Strength (RSS) to see the energy consumption of each node as the fluctuation of intruder node will be different from genuine nodes.


Sign in / Sign up

Export Citation Format

Share Document