SDN Attack Identification Model based on CNN Algorithm

نویسندگان

چکیده

As the complexity of network structure increases, so do requirements for architecture are also increasing, and Software Defined Network (SDN) technology has emerged. SDN successfully simplified management, but its open programming nature poses a risk attacks. In complex environments, recognition accuracy traditional models cannot meet speed. view this, this study proposes an attack model based on Convolutional Neural (CNN), aiming to solve problems faced in improve model, ensure security SDN. The used NSL-KDD dataset MIT LL DARPA dataset. performance testing experiment results show that proposed 98.25% recognition, is significantly better than CNN models. reaches 98.25%, superior KNN-PSO model. Verifying superiority further confirming application value identification.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

mortality forecasting based on lee-carter model

over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...

15 صفحه اول

Wiener Model Identification Based on Ade Algorithm

DE algorithm is a population-based heuristic global search technology. The algorithm has simple principle, fewer control parameters, but has strong robustness, and good optimization performance. This paper uses differential evolution algorithm for parameters identification of Wiener model. Firstly, we analyze the influence of mutation rate F on global parallel search ability and convergence in ...

متن کامل

BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems

We create BEADS, a framework to automatically generate test scenarios and find attacks in SDN systems. The scenarios capture attacks caused by malicious switches that do not obey the OpenFlow protocol and malicious hosts that do not obey the ARP protocol. We generated and tested almost 19,000 scenarios that consist of sending malformed messages or not properly delivering them, and found 831 uni...

متن کامل

Towards Defeating the Crossfire Attack using SDN

In this work, we propose online traffic engineering as a novel approach to detect and mitigate an emerging class of stealthy Denial of Service (DoS) link-flooding attacks. Our approach exploits the Software Defined Networking (SDN) paradigm, which renders the management of network traffic more flexible through centralised flow-level control and monitoring. We implement a full prototype of our s...

متن کامل

A decoy chain deployment method based on SDN and NFV against penetration attack

Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the securi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3296798