SDN Attack Identification Model based on CNN Algorithm
نویسندگان
چکیده
As the complexity of network structure increases, so do requirements for architecture are also increasing, and Software Defined Network (SDN) technology has emerged. SDN successfully simplified management, but its open programming nature poses a risk attacks. In complex environments, recognition accuracy traditional models cannot meet speed. view this, this study proposes an attack model based on Convolutional Neural (CNN), aiming to solve problems faced in improve model, ensure security SDN. The used NSL-KDD dataset MIT LL DARPA dataset. performance testing experiment results show that proposed 98.25% recognition, is significantly better than CNN models. reaches 98.25%, superior KNN-PSO model. Verifying superiority further confirming application value identification.
منابع مشابه
mortality forecasting based on lee-carter model
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
15 صفحه اولWiener Model Identification Based on Ade Algorithm
DE algorithm is a population-based heuristic global search technology. The algorithm has simple principle, fewer control parameters, but has strong robustness, and good optimization performance. This paper uses differential evolution algorithm for parameters identification of Wiener model. Firstly, we analyze the influence of mutation rate F on global parallel search ability and convergence in ...
متن کاملBEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems
We create BEADS, a framework to automatically generate test scenarios and find attacks in SDN systems. The scenarios capture attacks caused by malicious switches that do not obey the OpenFlow protocol and malicious hosts that do not obey the ARP protocol. We generated and tested almost 19,000 scenarios that consist of sending malformed messages or not properly delivering them, and found 831 uni...
متن کاملTowards Defeating the Crossfire Attack using SDN
In this work, we propose online traffic engineering as a novel approach to detect and mitigate an emerging class of stealthy Denial of Service (DoS) link-flooding attacks. Our approach exploits the Software Defined Networking (SDN) paradigm, which renders the management of network traffic more flexible through centralised flow-level control and monitoring. We implement a full prototype of our s...
متن کاملA decoy chain deployment method based on SDN and NFV against penetration attack
Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the securi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3296798