Evaluating the Isolation Forest Method for Anomaly Detection in Software-Defined Networking Security

Main Article Content

M Sri Lakshmi, G. Rajavikram, V Dattatreya, B. Swarna Jyothi, Shruti Patil, M Bhavsingh

Abstract

The research addresses the critical anomaly detection problem in Software-Defined Networking (SDN), a domain where network integrity and security are paramount. Employing the Isolation Forest algorithm, a machine learning model renowned for its efficacy in identifying outliers, the study systematically generates synthetic network traffic data to train and test the model's detection capabilities. The methodology encompasses simulating a range of contamination rates to reflect varying degrees of anomalous activities within the network. Key findings indicate that while the model exhibits potential in anomaly detection, as reflected by the progressive increase in triggered alerts and policy changes, its performance metrics, such as precision, recall, F1-score, and AUC, reveal limitations in its current application. The research contributes to the field by providing a detailed analysis of the Isolation Forest algorithm's performance in an SDN context and laying the groundwork for future enhancements in machine learning-based security measures within these networks.

Article Details

Section
Articles
Author Biography

M Sri Lakshmi, G. Rajavikram, V Dattatreya, B. Swarna Jyothi, Shruti Patil, M Bhavsingh

1M Sri Lakshmi

2G. Rajavikram

3* V Dattatreya

4B. Swarna Jyothi,

5 Shruti Patil

6M Bhavsingh

 3* (Corresponding author): Professor, CSE Department, CVR College of Engineering, Telangana,India.

Email ID: dattatreya.valiveti@gmail.com   

1Associate Professor, Department of Computer Science and Engineering , G. Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India. Email Id: srilakshmicse@gpcet.ac.in 

2Professor , Department Of Computer Science And Engineering, Vignan Institute Of Technology And Science, Deshmukhi, Telangana ,India. Email ID: grajavikram@gmail.com 

4 Assistant professor ,CSE(DS) ,RGMCET  Nandyal , Andhra Pradesh, India , Email ID: badimela1508@gmail.com 

5 Assistant Professor , Department of Information Technology,MLR Institute of Technology, Hyderabad ,India ,

Email ID: shrutisib@gmail.com

6Associate Professor, Department of Computer Science and Engineering, Ashoka Womens Engineering College, Kurnool, Andhra Pradesh, India. Email ID: bhavsinghit@gmail.com

Copyright © JES 2023 on-line : journal.esrgroups.org

References

Q. Meng, X. Pang, Y. Zheng, G. Jiang, and X. Tian, "Development and optimization of software defined networking anomaly detection architecture by GRU-CNN under deep learning," in Proc. 2021 6th Int. Conf. Intelligent Computing and Signal Processing (ICSP), 2021.

N. M. Raja and S. Vegad, "An empirical study for the traffic flow rate prediction-based anomaly detection in software-defined networking: a challenging overview," Soc. Netw. Anal. Min., vol. 13, no. 1, 2023.

Alpana Gopi, Divya P R, Litty Rajan, Surya Rajan, & Shini Renjith. (2016). Accident Tracking and Visual Sharing Using RFID and SDN. International Journal of Computer Engineering in Research Trends, 3(10), 544–549.

M. Kalpana Devi, & R. Padmaja. (2023). Outlier Detection using Artificial Rabbit Optimizer with Hopfield Neural Network. International Journal of Computer Engineering in Research Trends, 10(9), 9–15.

A. M. El-Shamy, N. A. El-Fishawy, G. Attiya, and M. A. A. Mohamed, "Anomaly detection and bottleneck identification of the distributed application in cloud data center using software–defined networking," Egypt. Inform. J., vol. 22, no. 4, pp. 417–432, 2021.

Asep Bayu Dani Nandiyanto, Chekima Hamza, & Muhammad Aziz. (2023). A Novel Framework for Enhancing Security in Software-Defined Networks. International Journal of Computer Engineering in Research Trends, 10(11), 19–26.

P. S. K. Reddy and K. Sri Raghavendra, "Machine Learning-Based DDoS Saturation Attack Detection and analysis in SDN Environment," Int. J. Computer Engineering in Research Trends, no. 9, pp. 269–274, 2022.

F. Chahlaoui and H. Dahmouni, "A taxonomy of load balancing mechanisms in centralized and distributed SDN architectures," SN Comput. Sci., vol. 1, no. 5, 2020.

Arpita Nusrat, Jasni Mohamad Zain, Mohamed Lachgar, & M.Bhavsingh. (2023). Machine Learning Techniques for Detecting Anomalies in IoT Networks . International Journal of Computer Engineering in Research Trends, 10(10), 16–23.

M. S. Bonfim, K. L. Dias, and S. F. L. Fernandes, "Integrated NFV/SDN architectures: A Systematic Literature Review," arXiv [cs.NI], 2018.

O. Blial, M. Ben Mamoun, and R. Benaini, "An overview on SDN architectures with multiple controllers," J. Comput. Netw. Commun., vol. 2016, pp. 1–8, 2016.

Bezawada , M., & P, V. K. (2023). Comparative Study on Techniques Used for Anomaly Detection in IoT Data. International Journal of Computer Engineering in Research Trends, 10(4), 177–181.

K. Kalkan and S. Zeadally, "Securing internet of things with software defined networking," IEEE Communications Magazine, vol. 56, no. 9, pp. 186-192, 2017.

P. Siva, Cherukuri Sudhish, Ogirala Divyanand, & K Sai Ananya Madhuri. (2023). Routenet: Using Graph Neural Networks for SDN Network Modeling and Optimizations. International Journal of Computer Engineering in Research Trends, 10(7), 32–38.

H. Deng and X. Li, "Anomaly detection via reverse distillation from one-class embedding," arXiv [cs.CV], 2022.

C. Yin, S. Zhang, J. Wang, and N. N. Xiong, "Anomaly detection based on convolutional recurrent autoencoder for IoT time series," IEEE Trans. Syst. Man Cybern. Syst., vol. 52, no. 1, pp. 112–122, 2022.

S. Tuli, G. Casale, and N. R. Jennings, "TranAD: Deep transformer networks for anomaly detection in multivariate time series data," arXiv [cs.LG], 2022.

S. Han, X. Hu, H. Huang, M. Jiang, and Y. Zhao, "ADBench: Anomaly Detection Benchmark," arXiv [cs.LG], 2022.

M. A. Akhtar, S. M. O. Qadri, M. A. Siddiqui, S. M. N. Mustafa, S. Javaid, and S. A. Ali, "Robust genetic machine learning ensemble model for intrusion detection in network traffic," Sci. Rep., vol. 13, no. 1, 2023.

A. B. D. Nandiyanto, C. Hamza, and M. Aziz, "A Novel Framework for Enhancing Security in Software-Defined Networks," Int. J. Comput. Eng. Res. Trends, vol. 10, no. 11, pp. 19–26, 2023.

C. Guerber, M. Royer, and N. Larrieu, "Machine Learning and Software Defined Network to secure communications in a swarm of drones," J. Inf. Secur. Appl., vol. 61, no. 102940, p. 102940, 2021.

Ali Vatankhah Barenji, Yaling Zhang, & M Bhavsingh. (2023). A Blockchain-based Framework for Enhancing Privacy and Security in Online Transactions . International Journal of Computer Engineering in Research Trends, 10(11), 1–9.

Y.-K. Kim, J. J. Lee, M.-H. Go, H. Y. Kang, and K. Lee, "A systematic overview of the machine learning methods for mobile malware detection," Secur. Commun. Netw., vol. 2022, pp. 1–20, 2022.

Prasad , C. G. V. N. ., Mallareddy, A., Pounambal, M., & Velayutham, V. . (2022). Edge Computing and Blockchain in Smart Agriculture Systems. International Journal on Recent and Innovation Trends in Computing and Communication, 10(1s), 265–273.

Pasha, M. J., Rao, K. P., MallaReddy, A., & Bande, V. (2023). LRDADF: An AI enabled framework for detecting low-rate DDoS attacks in cloud computing environments. Measurement: Sensors, 100828.