ML-Based Delay Attack Detection and Isolation for Fault-Tolerant Software-Defined Industrial Networks

Traditional security mechanisms find difficulties in dealing with intelligent assaults in cyber-physical systems (CPSs) despite modern information and communication technologies. Furthermore, resource consumption in software-defined networks (SDNs) in industrial organizations is usually on a larger...

Full description

Bibliographic Details
Main Authors: Sagar Ramani, Rutvij H. Jhaveri
Format: Article
Language:English
Published: MDPI AG 2022-09-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/22/18/6958
_version_ 1797482534844497920
author Sagar Ramani
Rutvij H. Jhaveri
author_facet Sagar Ramani
Rutvij H. Jhaveri
author_sort Sagar Ramani
collection DOAJ
description Traditional security mechanisms find difficulties in dealing with intelligent assaults in cyber-physical systems (CPSs) despite modern information and communication technologies. Furthermore, resource consumption in software-defined networks (SDNs) in industrial organizations is usually on a larger scale, and the present routing algorithms fail to address this issue. In this paper, we present a real-time delay attack detection and isolation scheme for fault-tolerant software-defined industrial networks. The primary goal of the delay attack is to lower the resilience of our previously proposed scheme, SDN-resilience manager (SDN-RM). The attacker compromises the OpenFlow switch and launches an attack by delaying the link layer discovery protocol (LLDP) packets. As a result, the performance of SDN-RM is degraded and the success rate decreases significantly. In this work, we developed a machine learning (ML)-based attack detection and isolation mechanism, which extends our previous work, SDN-RM. Predicting and labeling malicious switches in an SDN-enabled network is a challenge that can be successfully addressed by integrating ML with network resilience solutions. Therefore, we propose a delay-based attack detection and isolation scheme (DA-DIS), which avoids malicious switches from entering the routes by combining an ML mechanism along with a route-handoff mechanism. DA-DIS increases network resilience by increasing success rate and network throughput.
first_indexed 2024-03-09T22:33:46Z
format Article
id doaj.art-58c7da00511448d588325c5d41783485
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-09T22:33:46Z
publishDate 2022-09-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-58c7da00511448d588325c5d417834852023-11-23T18:52:12ZengMDPI AGSensors1424-82202022-09-012218695810.3390/s22186958ML-Based Delay Attack Detection and Isolation for Fault-Tolerant Software-Defined Industrial NetworksSagar Ramani0Rutvij H. Jhaveri1Department of Computer Engineering, Gujarat Technological University, Ahmedabad 382424, IndiaDepartment of Computer Science & Engineering, Pandit Deendayal Energy University, Gandhinagar 382007, IndiaTraditional security mechanisms find difficulties in dealing with intelligent assaults in cyber-physical systems (CPSs) despite modern information and communication technologies. Furthermore, resource consumption in software-defined networks (SDNs) in industrial organizations is usually on a larger scale, and the present routing algorithms fail to address this issue. In this paper, we present a real-time delay attack detection and isolation scheme for fault-tolerant software-defined industrial networks. The primary goal of the delay attack is to lower the resilience of our previously proposed scheme, SDN-resilience manager (SDN-RM). The attacker compromises the OpenFlow switch and launches an attack by delaying the link layer discovery protocol (LLDP) packets. As a result, the performance of SDN-RM is degraded and the success rate decreases significantly. In this work, we developed a machine learning (ML)-based attack detection and isolation mechanism, which extends our previous work, SDN-RM. Predicting and labeling malicious switches in an SDN-enabled network is a challenge that can be successfully addressed by integrating ML with network resilience solutions. Therefore, we propose a delay-based attack detection and isolation scheme (DA-DIS), which avoids malicious switches from entering the routes by combining an ML mechanism along with a route-handoff mechanism. DA-DIS increases network resilience by increasing success rate and network throughput.https://www.mdpi.com/1424-8220/22/18/6958SDNdelay attacksecuritymachine learningindustrial networksCPS
spellingShingle Sagar Ramani
Rutvij H. Jhaveri
ML-Based Delay Attack Detection and Isolation for Fault-Tolerant Software-Defined Industrial Networks
Sensors
SDN
delay attack
security
machine learning
industrial networks
CPS
title ML-Based Delay Attack Detection and Isolation for Fault-Tolerant Software-Defined Industrial Networks
title_full ML-Based Delay Attack Detection and Isolation for Fault-Tolerant Software-Defined Industrial Networks
title_fullStr ML-Based Delay Attack Detection and Isolation for Fault-Tolerant Software-Defined Industrial Networks
title_full_unstemmed ML-Based Delay Attack Detection and Isolation for Fault-Tolerant Software-Defined Industrial Networks
title_short ML-Based Delay Attack Detection and Isolation for Fault-Tolerant Software-Defined Industrial Networks
title_sort ml based delay attack detection and isolation for fault tolerant software defined industrial networks
topic SDN
delay attack
security
machine learning
industrial networks
CPS
url https://www.mdpi.com/1424-8220/22/18/6958
work_keys_str_mv AT sagarramani mlbaseddelayattackdetectionandisolationforfaulttolerantsoftwaredefinedindustrialnetworks
AT rutvijhjhaveri mlbaseddelayattackdetectionandisolationforfaulttolerantsoftwaredefinedindustrialnetworks