Author
Listed:
- Suh Charles Forbacha
- Maah Kelvin Kinteh
- Eng. Mohamadou Hamza
Abstract
Purpose: The main aim of this research project was to develop a security simulation and mitigation mechanism for Software Defined Networking (SDN) deploying machine learning algorithms. Materials and Methods: Applied research method was used whereby attacks were initially detected and classified using machine learning algorithms on the CiCDDoS2019 dataset; next a SDN virtual network was created through simulation in Mininet plus captured network data from the environment and finally applied machine learning algorithms to detect and mitigate the attacks in case of an attack occurrence. Findings: Results showed higher rates of attack detection and lower false positive rates. Hence our system could be used in real life environments for attack detection and mitigation. However, the conditions and networks traffic would be different per the network configurations and tasks performed in the network environment Implications to Theory, Practice and Policy: Based on the findings and knowledge acquired, some key recommendations for successful implementation of an Enhanced attack and detection scheme in SDN include: Use deep learning and ensemble learning as the system will have an awareness of its state and hence have better accuracy and less false alarm rates, conducting thorough feature analysis and selection based on statistical techniques, correlation analysis, and domain knowledge, experimenting with multiple algorithms like deep neural networks, ensemble learning algorithms, optimizing the system to minimize computational overhead and ensure real-time processing, performing the study on a real world sdn environment to ensure proper knowledge of the data flow patterns in real world environments and use multiple datasets in the implementation of the system.
Suggested Citation
Suh Charles Forbacha & Maah Kelvin Kinteh & Eng. Mohamadou Hamza, 2024.
"Enhanced Attacks Detection and Mitigation in Software Defined Networks,"
American Journal of Computing and Engineering, AJPO Journals Limited, vol. 7(3), pages 40-80.
Handle:
RePEc:bfy:ojajce:v:7:y:2024:i:3:p:40-80:id:2120
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bfy:ojajce:v:7:y:2024:i:3:p:40-80:id:2120. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chief Editor (email available below). General contact details of provider: https://ajpojournals.org/journals/index.php/AJCE/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.