Low Rate DDoS Detection Using Weighted Federated Learning in SDN Control Plane in IoT Network
Abstract
:1. Introduction
- We proposed a WFL-enabled LR-DDoS detection mechanism that develops a global federated learning model based on the performance accuracy of a locally trained Neural network model.
- We developed a robust preference assignment mechanism where the federated server assigns the preferences to the received locally trained models based on their overall performance accuracy.
- We evaluated the performance of the proposed mechanism in terms of Confusion Matrix, Classification Accuracy (CA), Misclassification Rate (MCR), Sensitivity, Specificity, F1-Score, NPV, False Positive Rate (FPR), and False Negative Rate (FNR) and compare the efficiency of the proposed work with the existing state of the art conventional and machine learning based low-rate DDoS detection schemes.
2. Related Work
3. WFL-Based Proposed Model
3.1. Proposed SDN-Based IoT Network Model Flow Chart
- Data Collection: At first, data is collected from the SDN controller to record the legitimate traffic flow and attack traffic flow. To mainly focus on the security of the SDN controller, the simulations are performed using a publicly available dataset, namely, CAIDA [29]. The dataset contains 78 features as input and 1 feature as output, in which the normal traffic records are labeled with 0 and attack traffic records are labeled with 1. The detailed information of the dataset is given in Table A1 in Appendix A.
- Data Pre-Processing: In preprocessing phase, if there is any missing value, that should be filled before the training phase.
- Data Splitting: The dataset used for the simulation of the proposed model consists of 150,000 instances, out of which 105,000 instances were used for the training phase, which is 70% of the dataset. During the training phase, the training data is partitioned into 70% Training, 20% Validation, and 10% Testing. The aforementioned partition is used to avoid over-fitting and under-fitting issues in the training phase. For validation purposes, 45,000 instances were used, which is 30% of the dataset.
- Holdout Validation: The holdout validation is used in this study to validate the proposed method.
- Weighted Federated Learning: WFL is a distributed machine learning paradigm that can support multiple edge devices or multi-network organizations and can fuse various trained model weights and assign each model with unique preference at the federated server to enhance the performance of the federated model further.
- Mitigation: This module predicts the network flow carrying the DDoS attack to the SDN controller for further mitigation action and secures the whole network by securing the SDN controller.
3.2. Federated Learning-Based Low-Rate DDoS Detection
3.2.1. Local Client Training
Algorithm 1 Client server algorithm |
|
3.2.2. Transfer of Weights
3.2.3. Federated Server
Algorithm 2 Federated server algorithm |
3.2.4. Edge Devices
4. Evaluation Parameters
5. Simulation and Results
5.1. Simulation Environment
5.2. Simulations
5.3. Results Sections
5.4. Discussion
6. Conclusions
7. Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
SDN | Software-defined networking |
DDoS | Distributed Denial Service |
IoT | Internet of Things |
ML | Machine Learning |
FL | Federated Learning |
LR-DDoS | Low-Rate Distributed Denial of Service |
ANN | Artificial Neural Network |
WFL | Weighted Federated Learning |
SVM | Support Vector Machine |
GA | Genetic Algorithm |
SBI | Southbound Interface |
OFS | Open Flow Switch |
TCP | Transmission Control Protocol |
KPCA | Kernel Principal Component Analysis |
IP | Internet Protocol |
LM | Levenberg-Marquardt |
BR | Bayesian Regularization |
SCG | Scaled Conjugate Gradient |
CA | Classification Accuracy |
MCR | Misclassification Rate |
FPR | False Positive Rate |
FNR | False Negative Rate |
NPV | Negative Partial Value |
Appendix A
S.No | Feature | Datatype | S.No | Feature | Datatype |
---|---|---|---|---|---|
1 | Destination Port | Integer | 2 | Flow Duration | Integer |
3 | Total Fwd Packets | Integer | 4 | Total Backward Packets | Integer |
5 | Total Length of Fwd Packets | Integer | 6 | Total Length of Bwd Packets | Integer |
7 | Fwd Packet Length Max | Integer | 8 | Fwd Packet Length Min | Integer |
9 | Fwd Packet Length Mean | Float | 10 | Fwd Packet Length Std | Float |
11 | Bwd Packet Length Max | Integer | 12 | Bwd Packet Length Min | Intger |
13 | Bwd Packet Length Mean | Float | 14 | Bwd Packet Length Std | Float |
15 | Flow Bytes/s | Float | 16 | Flow Packets/s | Float |
17 | Flow IAT Mean | Integer | 18 | Flow IAT Std | Integer |
19 | Flow IAT Max | Integer | 20 | Flow IAT Min | Intger |
21 | Fwd IAT Total | Integer | 22 | Fwd IAT Mean | Float |
23 | Fwd IAT Std | Float | 24 | Fwd IAT Max | Integer |
25 | Fwd IAT Min | Integer | 26 | Bwd IAT Total | Integer |
27 | Bwd IAT Mean | Integer | 28 | Bwd IAT Std | Doble |
29 | Bwd IAT Max | Integer | 30 | Bwd IAT Min | Integer |
31 | Fwd PSH Flags | Integer | 32 | Bwd PSH Flags | Integer |
33 | Fwd URG Flags | Integer | 34 | Bwd URG Flags | Integer |
35 | Fwd Header Length | Integer | 36 | Bwd Header Length | Integer |
37 | Fwd Packets/s | Float | 38 | Bwd Packets/s | Float |
39 | Min Packet Length | Integer | 40 | Max Packet Length | Integer |
41 | Packet Length Mean | Float | 42 | Packet Length Std | Float |
43 | Packet Length Variance | Float | 44 | FIN Flag Count | Integer |
45 | SYN Flag Count | Integer | 46 | RST Flag Count | Integer |
47 | PSH Flag Count | Integer | 48 | ACK Flag Count | Integer |
49 | URG Flag Count | Integer | 50 | CWE Flag Count | Integer |
51 | ECE Flag Count | Integer | 52 | Down/Up Ratio | Integer |
53 | Average Packet Size | Float | 54 | Avg Fwd Segment Size | Float |
55 | Avg Bwd Segment Size | Float | 56 | Fwd Header Length | Integer |
57 | Fwd Avg Bytes/Bulk | Integer | 58 | Fwd Avg Bulk Rate | Integer |
59 | Bwd Avg Bytes/Bulk | Integer | 60 | Bwd Avg Packets/Bulk | Integer |
61 | Bwd Avg Bulk Rate | Integer | 62 | Subflow Fwd Packets | Integer |
63 | Subflow Fwd Bytes | Integer | 64 | Subflow Bwd Packets | Integer |
65 | Subflow Bwd Bytes | Integer | 66 | Init_Win_bytes_forward | Integer |
67 | Init_Win_bytes_backward | Float | 68 | act_data_pkt_fwd | Integer |
69 | min_seg_size_forward | Integer | 70 | Active Mean | Integer |
71 | Active Std | Integer | 72 | Active Max | Integer |
73 | Active Min | Integer | 74 | Idle Mean | Integer |
75 | Idle Std | Integer | 76 | Idle Max | Integer |
77 | Idle Min | Integer | 78 | Fwd Avg Packets/Bulk Integer | |
79 | Label | Integer |
References
- Farhan, L.; Shukur, S.; Alissa, A.; Alrweg, M.; Raza, U.; Kharel, R. A survey on the challenges and opportunities of the Internet of Things (IoT). In Proceedings of the 2017 11th International Conference on Sensing Technology (ICST 2017), Sydney, Australia, 4–6 December 2017; Institute of Electrical and Electronics Engineers (IEEE): Los Alamitos, CA, USA, 2017; pp. 1–5. [Google Scholar] [CrossRef]
- Siddiqui, S.; Hameed, S.; Shah, S.A.; Ahmad, I.; Aneiba, A.; Draheim, D.; Dustdar, S. Toward Software-Defined Networking-Based IoT Frameworks: A Systematic Literature Review, Taxonomy, Open Challenges and Prospects. IEEE Access 2022, 10, 70850–70901. [Google Scholar] [CrossRef]
- Waseem, Q.; Alshamrani, S.S.; Nisar, K.; Wan Din, W.I.S.; Alghamdi, A.S. Future Technology: Software-Defined Network (SDN) Forensic. Symmetry 2021, 13, 767. [Google Scholar] [CrossRef]
- Gkountis, C.; Taha, M.; Lloret, J.; Kambourakis, G. Lightweight algorithm for protecting SDN controller against DDoS attacks. In Proceedings of the 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC), Valencia, Spain, 25–27 September 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Isyaku, B.; Mohd Zahid, M.S.; Bte Kamat, M.; Abu Bakar, K.; Ghaleb, F.A. Software Defined Networking Flow Table Management of OpenFlow Switches Performance and Security Challenges: A Survey. Future Internet 2020, 12, 147. [Google Scholar] [CrossRef]
- Yan, Q.; Yu, F.R.; Gong, Q.; Li, J. Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges. IEEE Commun. Surv. Tutor. 2016, 18, 602–622. [Google Scholar] [CrossRef]
- Alashhab, A.A.; Soperi Mohd Zahid, M.; Barka, A.A.; Albaboh, A.M. Experimenting and evaluating the impact of DoS attacks on different SDN controllers. In Proceedings of the 2021 IEEE 1st International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering MI-STA, Tripoli, Libya, 25–27 May 2021; pp. 722–727. [Google Scholar] [CrossRef]
- Cambiaso, E.; Papaleo, G.; Chiola, G.; Aiello, M. Mobile executions of Slow DoS Attacks. Log. J. IGPL 2015, 24, 54–67. [Google Scholar] [CrossRef]
- Cambiaso, E.; Papaleo, G.; Chiola, G.; Aiello, M. Designing and Modeling the Slow Next DoS Attack. In Proceedings of the International Joint Conference; Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E., Eds.; Springer International Publishing: Cham, Switzerland, 2015; pp. 249–259. [Google Scholar]
- Scott-Hayward, S.; Natarajan, S.; Sezer, S. A Survey of Security in Software Defined Networks. IEEE Commun. Surv. Tutor. 2016, 18, 623–654. [Google Scholar] [CrossRef] [Green Version]
- Banitalebi Dehkordi, A.; Soltanaghaei, M.; Boroujeni, F.Z. The DDoS attacks detection through machine learning and statistical methods in SDN. J. Supercomput. 2021, 77, 2383–2415. [Google Scholar] [CrossRef]
- Aladaileh, M.A.; Anbar, M.; Hasbullah, I.H.; Chong, Y.W.; Sanjalawe, Y.K. Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller—A Review. IEEE Access 2020, 8, 143985–143995. [Google Scholar] [CrossRef]
- Garcia, N.; Alcaniz, T.; González-Vidal, A.; Bernabe, J.B.; Rivera, D.; Skarmeta, A. Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence. J. Netw. Comput. Appl. 2021, 173, 102871. [Google Scholar] [CrossRef]
- Mammen, P.M. Federated learning: Opportunities and challenges. arXiv 2021, arXiv:2101.05428. [Google Scholar]
- Liu, H.; Zhang, S.; Zhang, P.; Zhou, X.; Shao, X.; Pu, G.; Zhang, Y. Blockchain and Federated Learning for Collaborative Intrusion Detection in Vehicular Edge Computing. IEEE Trans. Veh. Technol. 2021, 70, 6073–6084. [Google Scholar] [CrossRef]
- Preuveneers, D.; Rimmer, V.; Tsingenopoulos, I.; Spooren, J.; Joosen, W.; Ilie-Zudor, E. Chained Anomaly Detection Models for Federated Learning: An Intrusion Detection Case Study. Appl. Sci. 2018, 8, 2663. [Google Scholar] [CrossRef] [Green Version]
- Ye, J.; Cheng, X.; Zhu, J.; Feng, L.; Song, L. A DDoS attack detection method based on SVM in software defined network. Secur. Commun. Netw. 2018, 2018, 9804061. [Google Scholar] [CrossRef]
- Sahoo, K.S.; Tripathy, B.K.; Naik, K.; Ramasubbareddy, S.; Balusamy, B.; Khari, M.; Burgos, D. An Evolutionary SVM Model for DDOS Attack Detection in Software Defined Networks. IEEE Access 2020, 8, 132502–132513. [Google Scholar] [CrossRef]
- Zang, X.D.; Gong, J.; Hu, X.Y. An Adaptive Profile-Based Approach for Detecting Anomalous Traffic in Backbone. IEEE Access 2019, 7, 56920–56934. [Google Scholar] [CrossRef]
- Mishra, A.; Gupta, N.; Gupta, B. Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommun. Syst. 2021, 77, 47–62. [Google Scholar] [CrossRef]
- Novaes, M.P.; Carvalho, L.F.; Lloret, J.; Proença, M.L. Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments. Future Gener. Comput. Syst. 2021, 125, 156–167. [Google Scholar] [CrossRef]
- Zhijun, W.; Qing, X.; Jingjie, W.; Meng, Y.; Liang, L. Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network. IEEE Access 2020, 8, 17404–17418. [Google Scholar] [CrossRef]
- Liang, W.; Xiao, L.; Zhang, K.; Tang, M.; He, D.; Li, K.C. Data Fusion Approach for Collaborative Anomaly Intrusion Detection in Blockchain-Based Systems. IEEE Internet Things J. 2022, 9, 14741–14751. [Google Scholar] [CrossRef]
- Haider, A.; Khan, M.A.; Rehman, A.; Ur, R.M.; Kim, H.S. A Real-Time Sequential Deep Extreme Learning Machine Cybersecurity Intrusion Detection System. Comput. Mater. Contin. 2021, 66, 1785–1798. [Google Scholar] [CrossRef]
- Asif, M.; Abbas, S.; Khan, M.; Fatima, A.; Khan, M.A.; Lee, S.W. MapReduce based intelligent model for intrusion detection using machine learning technique. J. King Saud Univ. Comput. Inf. Sci. 2022, 34, 9723–9731. [Google Scholar] [CrossRef]
- Tang, D.; Yan, Y.; Zhang, S.; Chen, J.; Qin, Z. Performance and Features: Mitigating the Low-Rate TCP-Targeted DoS Attack via SDN. IEEE J. Sel. Areas Commun. 2022, 40, 428–444. [Google Scholar] [CrossRef]
- Almiani, M.; AbuGhazleh, A.; Jararweh, Y.; Razaque, A. DDoS detection in 5G-enabled IoT networks using deep Kalman backpropagation neural network. Int. J. Mach. Learn. Cybern. 2021, 12, 3337–3349. [Google Scholar] [CrossRef]
- Almiani, M.; AbuGhazleh, A.; Al-Rahayfeh, A.; Atiewi, S.; Razaque, A. Deep recurrent neural network for IoT intrusion detection system. Simul. Model. Pract. Theory 2020, 101, 102031. [Google Scholar] [CrossRef]
- CAIDA. Datasets. (2007) DDoS Attack. Available online: https://data.caida.org/datasets/security/ddos-20070804 (accessed on 1 September 2022).
- Khan, M.A.; Rehman, A.; Khan, K.M.; Al Ghamdi, M.A.; Almotiri, S.H. Enhance Intrusion Detection in Computer Networks Based on Deep Extreme Learning Machine. Comput. Mater. Contin. 2021, 66, 467–480. [Google Scholar] [CrossRef]
Variable | Explanation | Variable | Explanation |
---|---|---|---|
Input features | i | Neuron of input layer | |
j | Neuron of hidden layer | k | Neuron of output layer |
, | Biases | Weights between input to hidden layer | |
Weights between hidden to output layer | n | Number of neuron in the input layer | |
m | Number of neuron in the hidden layer | p | Number of neuron the output layer |
ith Client | Output of ith client at jth neuron | ||
Output of ith client at kth neuron | Error of ith client | ||
Change in weights between output to hidden layer | Change in weights between hidden to input layer | ||
Change in weights between hidden to input layer | Change in weights between output to hidden layer | ||
Constant factor | Updated weight | ||
Current weight | Learning factor | ||
Change in weights between hidden to input layer | Constant factor | ||
Updated weight between hidden to input layer | Current weight between hidden to input layer | ||
Mini Batches | |||
Locally Optimized weight by ANN between input to hidden layer | Locally Optimized weight by ANN between hidden to output layer | ||
Initial weights of input to hidden layer of federated server | Initial weights of hidden to output layer of federated server | ||
Output at jth neuron of federated server | Output at kth neuron of federated server | ||
Error between the layer of federated server | Federated model for input to hidden layer | ||
Federated model for hidden to output layer | Weights obtained by LM training algorithm of ANN for input to hidden layer | ||
Weights obtained by BR training algorithm of ANN for input to hidden layer | Weights obtained by SCG training algorithm of ANN for input to hidden layer | ||
Weights obtained by LM training algorithm of ANN for hidden to output | Weights obtained by BR training algorithm of ANN for hidden to output | ||
Weights obtained by SCG training algorithm of ANN for hidden to output layer |
0 (Predicted Normal) | 1 (Predicted Attack) | |
---|---|---|
0 (Actual Normal) | 9564 | 3055 |
1 (Actual Attack) | 3925 | 28,456 |
0 (Predicted Normal) | 1 (Predicted Attack) | |
---|---|---|
0 (Actual Normal) | 10,621 | 1995 |
1 (Actual Attack) | 2834 | 29,547 |
0 (Predicted Normal) | 1 (Predicted Attack) | |
---|---|---|
0 (Actual Normal) | 11,746 | 870 |
1 (Actual Attack) | 2054 | 30,327 |
0 (Predicted Normal) | 1 (Predicted Attack) | |
---|---|---|
0 (Actual Normal) | 12,337 | 279 |
1 (Actual Attack) | 235 | 32,146 |
Parameter | CA (%) | MCR (%) | Sensitivity (%) | Specificity (%) | NPV (%) | FPR (%) | FNR (%) | F1-Score (%) |
---|---|---|---|---|---|---|---|---|
LM | 84.48 | 15.51 | 70.90 | 90.30 | 87.8 | 9.69 | 29.09 | 73.26 |
BR | 89.26 | 10.73 | 78.93 | 93.67 | 91.24 | 6.32 | 21.06 | 81.47 |
SCG | 93.50 | 6.49 | 85.11 | 97.21 | 93.65 | 2.78 | 14.88 | 88.93 |
WFL | 98.85 | 1.15 | 98.13 | 99.13 | 99.27 | 2.2 | 1.8 | 94.21 |
Refs. No | Article | Algorithm | Classification Accuracy |
---|---|---|---|
[11] | Dehkordi et al. (2021) | ML+Statistical Methods | 97.65% |
[17] | Jin Ye et al. (2018) | SVM | 95.24% |
[18] | Kshira S. S. et al. (2020) | SVM+GA | 98.03% |
[19] | Xiao-Dong Z. et al. (2019) | ACO | 97.4% |
[20] | Mishra A. et al. (2021) | Entropy | 98.2% |
[21] | Novaes et. al.(2021) | GAN | 94.38% |
[22] | Zhijun W. et al. (2020) | Factorization Machine | 95.80% |
[23] | Liang W. (2022) | DFL | 97% |
[25] | Asif M. | MapReduce | 95.7% |
[26] | Dan Tang et al. | P&F | 98.06% |
[27] | Almiani et al. | Kalman NN | 97.49% |
[28] | Almiani et al. | ML-RNN | 98.27% |
[24] | Amir H. et al. | RTS-DELM-CSIDS | 92.37% |
Proposed | Low Rate DDoS Detection using Weighted Federated Learning in SDN Control Plane in IoT Network | WFL | 98.85% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ali, M.N.; Imran, M.; din, M.S.u.; Kim, B.-S. Low Rate DDoS Detection Using Weighted Federated Learning in SDN Control Plane in IoT Network. Appl. Sci. 2023, 13, 1431. https://doi.org/10.3390/app13031431
Ali MN, Imran M, din MSu, Kim B-S. Low Rate DDoS Detection Using Weighted Federated Learning in SDN Control Plane in IoT Network. Applied Sciences. 2023; 13(3):1431. https://doi.org/10.3390/app13031431
Chicago/Turabian StyleAli, Muhammad Nadeem, Muhammad Imran, Muhammad Salah ud din, and Byung-Seo Kim. 2023. "Low Rate DDoS Detection Using Weighted Federated Learning in SDN Control Plane in IoT Network" Applied Sciences 13, no. 3: 1431. https://doi.org/10.3390/app13031431
APA StyleAli, M. N., Imran, M., din, M. S. u., & Kim, B. -S. (2023). Low Rate DDoS Detection Using Weighted Federated Learning in SDN Control Plane in IoT Network. Applied Sciences, 13(3), 1431. https://doi.org/10.3390/app13031431