Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-Based
The development of internet technology is growing very rapidly. Moreover, keeping internet users protected from cyberattacks is part of the security challenges. Distributed Denial of Service (DDoS) is a real attack that continues to grow. DDoS attacks have become one of the most difficult attacks to...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Politeknik Negeri Padang
2022-12-01
|
Series: | JOIV: International Journal on Informatics Visualization |
Subjects: | |
Online Access: | https://joiv.org/index.php/joiv/article/view/1476 |
_version_ | 1811159840996720640 |
---|---|
author | M.T. Kurniawan Setiadi Yazid Yudho Giri Sucahyo |
author_facet | M.T. Kurniawan Setiadi Yazid Yudho Giri Sucahyo |
author_sort | M.T. Kurniawan |
collection | DOAJ |
description | The development of internet technology is growing very rapidly. Moreover, keeping internet users protected from cyberattacks is part of the security challenges. Distributed Denial of Service (DDoS) is a real attack that continues to grow. DDoS attacks have become one of the most difficult attacks to detect and mitigate appropriately. Software Defined Network (SDN) architecture is a novel network management and a new concept of the infrastructure network. A controller is a single point of failure in SDN, which is the most dangerous of various attacks because the attacker can take control of the controller so that it can control all network traffic. Various detection and mitigation methods have been offered, but not many consider the capacity of the SDN controller. In this research, we propose a feature selection method for DDoS attacks. This research aims to select the most important features of DDoS attacks on SDN so that the detection of DDoS on SDN can be lightweight and early. This research uses a dataset [1] generated by a Mininet emulator. The simulation runs for benign TCP, UDP, and ICMP traffic and malicious traffic, which is the collection of TCP SYN attacks, UDP Flood attacks, and ICMP attacks. A total of 23 features are available in the dataset, some are extracted from the switches, and others are calculated. By using three methods, filter-based, wrapper-based, and embedded-based, we get consistent results where the pktcount feature is the highest feature importance of DDoS attacks on SDN. |
first_indexed | 2024-04-10T05:47:44Z |
format | Article |
id | doaj.art-9dd86482de904fd0a8b16a5689264137 |
institution | Directory Open Access Journal |
issn | 2549-9610 2549-9904 |
language | English |
last_indexed | 2024-04-10T05:47:44Z |
publishDate | 2022-12-01 |
publisher | Politeknik Negeri Padang |
record_format | Article |
series | JOIV: International Journal on Informatics Visualization |
spelling | doaj.art-9dd86482de904fd0a8b16a56892641372023-03-05T10:28:41ZengPoliteknik Negeri PadangJOIV: International Journal on Informatics Visualization2549-96102549-99042022-12-016480981410.30630/joiv.6.4.1476437Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-BasedM.T. Kurniawan0Setiadi Yazid1Yudho Giri Sucahyo2Indonesia University, Depok Jawa Barat, 16424, IndonesiaIndonesia University, Depok Jawa Barat, 16424, IndonesiaIndonesia University, Depok Jawa Barat, 16424, IndonesiaThe development of internet technology is growing very rapidly. Moreover, keeping internet users protected from cyberattacks is part of the security challenges. Distributed Denial of Service (DDoS) is a real attack that continues to grow. DDoS attacks have become one of the most difficult attacks to detect and mitigate appropriately. Software Defined Network (SDN) architecture is a novel network management and a new concept of the infrastructure network. A controller is a single point of failure in SDN, which is the most dangerous of various attacks because the attacker can take control of the controller so that it can control all network traffic. Various detection and mitigation methods have been offered, but not many consider the capacity of the SDN controller. In this research, we propose a feature selection method for DDoS attacks. This research aims to select the most important features of DDoS attacks on SDN so that the detection of DDoS on SDN can be lightweight and early. This research uses a dataset [1] generated by a Mininet emulator. The simulation runs for benign TCP, UDP, and ICMP traffic and malicious traffic, which is the collection of TCP SYN attacks, UDP Flood attacks, and ICMP attacks. A total of 23 features are available in the dataset, some are extracted from the switches, and others are calculated. By using three methods, filter-based, wrapper-based, and embedded-based, we get consistent results where the pktcount feature is the highest feature importance of DDoS attacks on SDN.https://joiv.org/index.php/joiv/article/view/1476software-defined networkingdetection systemfeature selectionfilter basedwrapper basedembedded based distributed denial-of-service. |
spellingShingle | M.T. Kurniawan Setiadi Yazid Yudho Giri Sucahyo Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-Based JOIV: International Journal on Informatics Visualization software-defined networking detection system feature selection filter based wrapper based embedded based distributed denial-of-service. |
title | Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-Based |
title_full | Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-Based |
title_fullStr | Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-Based |
title_full_unstemmed | Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-Based |
title_short | Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-Based |
title_sort | comparison of feature selection methods for ddos attacks on software defined networks using filter based wrapper based and embedded based |
topic | software-defined networking detection system feature selection filter based wrapper based embedded based distributed denial-of-service. |
url | https://joiv.org/index.php/joiv/article/view/1476 |
work_keys_str_mv | AT mtkurniawan comparisonoffeatureselectionmethodsforddosattacksonsoftwaredefinednetworksusingfilterbasedwrapperbasedandembeddedbased AT setiadiyazid comparisonoffeatureselectionmethodsforddosattacksonsoftwaredefinednetworksusingfilterbasedwrapperbasedandembeddedbased AT yudhogirisucahyo comparisonoffeatureselectionmethodsforddosattacksonsoftwaredefinednetworksusingfilterbasedwrapperbasedandembeddedbased |