Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-Based

The development of internet technology is growing very rapidly. Moreover, keeping internet users protected from cyberattacks is part of the security challenges. Distributed Denial of Service (DDoS) is a real attack that continues to grow. DDoS attacks have become one of the most difficult attacks to...

Full description

Bibliographic Details
Main Authors: M.T. Kurniawan, Setiadi Yazid, Yudho Giri Sucahyo
Format: Article
Language:English
Published: Politeknik Negeri Padang 2022-12-01
Series:JOIV: International Journal on Informatics Visualization
Subjects:
Online Access:https://joiv.org/index.php/joiv/article/view/1476
_version_ 1811159840996720640
author M.T. Kurniawan
Setiadi Yazid
Yudho Giri Sucahyo
author_facet M.T. Kurniawan
Setiadi Yazid
Yudho Giri Sucahyo
author_sort M.T. Kurniawan
collection DOAJ
description The development of internet technology is growing very rapidly. Moreover, keeping internet users protected from cyberattacks is part of the security challenges. Distributed Denial of Service (DDoS) is a real attack that continues to grow. DDoS attacks have become one of the most difficult attacks to detect and mitigate appropriately. Software Defined Network (SDN) architecture is a novel network management and a new concept of the infrastructure network. A controller is a single point of failure in SDN, which is the most dangerous of various attacks because the attacker can take control of the controller so that it can control all network traffic. Various detection and mitigation methods have been offered, but not many consider the capacity of the SDN controller. In this research, we propose a feature selection method for DDoS attacks. This research aims to select the most important features of DDoS attacks on SDN so that the detection of DDoS on SDN can be lightweight and early. This research uses a dataset [1] generated by a Mininet emulator. The simulation runs for benign TCP, UDP, and ICMP traffic and malicious traffic, which is the collection of TCP SYN attacks, UDP Flood attacks, and ICMP attacks. A total of 23 features are available in the dataset, some are extracted from the switches, and others are calculated. By using three methods, filter-based, wrapper-based, and embedded-based, we get consistent results where the pktcount feature is the highest feature importance of DDoS attacks on SDN.
first_indexed 2024-04-10T05:47:44Z
format Article
id doaj.art-9dd86482de904fd0a8b16a5689264137
institution Directory Open Access Journal
issn 2549-9610
2549-9904
language English
last_indexed 2024-04-10T05:47:44Z
publishDate 2022-12-01
publisher Politeknik Negeri Padang
record_format Article
series JOIV: International Journal on Informatics Visualization
spelling doaj.art-9dd86482de904fd0a8b16a56892641372023-03-05T10:28:41ZengPoliteknik Negeri PadangJOIV: International Journal on Informatics Visualization2549-96102549-99042022-12-016480981410.30630/joiv.6.4.1476437Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-BasedM.T. Kurniawan0Setiadi Yazid1Yudho Giri Sucahyo2Indonesia University, Depok Jawa Barat, 16424, IndonesiaIndonesia University, Depok Jawa Barat, 16424, IndonesiaIndonesia University, Depok Jawa Barat, 16424, IndonesiaThe development of internet technology is growing very rapidly. Moreover, keeping internet users protected from cyberattacks is part of the security challenges. Distributed Denial of Service (DDoS) is a real attack that continues to grow. DDoS attacks have become one of the most difficult attacks to detect and mitigate appropriately. Software Defined Network (SDN) architecture is a novel network management and a new concept of the infrastructure network. A controller is a single point of failure in SDN, which is the most dangerous of various attacks because the attacker can take control of the controller so that it can control all network traffic. Various detection and mitigation methods have been offered, but not many consider the capacity of the SDN controller. In this research, we propose a feature selection method for DDoS attacks. This research aims to select the most important features of DDoS attacks on SDN so that the detection of DDoS on SDN can be lightweight and early. This research uses a dataset [1] generated by a Mininet emulator. The simulation runs for benign TCP, UDP, and ICMP traffic and malicious traffic, which is the collection of TCP SYN attacks, UDP Flood attacks, and ICMP attacks. A total of 23 features are available in the dataset, some are extracted from the switches, and others are calculated. By using three methods, filter-based, wrapper-based, and embedded-based, we get consistent results where the pktcount feature is the highest feature importance of DDoS attacks on SDN.https://joiv.org/index.php/joiv/article/view/1476software-defined networkingdetection systemfeature selectionfilter basedwrapper basedembedded based distributed denial-of-service.
spellingShingle M.T. Kurniawan
Setiadi Yazid
Yudho Giri Sucahyo
Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-Based
JOIV: International Journal on Informatics Visualization
software-defined networking
detection system
feature selection
filter based
wrapper based
embedded based distributed denial-of-service.
title Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-Based
title_full Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-Based
title_fullStr Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-Based
title_full_unstemmed Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-Based
title_short Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-Based
title_sort comparison of feature selection methods for ddos attacks on software defined networks using filter based wrapper based and embedded based
topic software-defined networking
detection system
feature selection
filter based
wrapper based
embedded based distributed denial-of-service.
url https://joiv.org/index.php/joiv/article/view/1476
work_keys_str_mv AT mtkurniawan comparisonoffeatureselectionmethodsforddosattacksonsoftwaredefinednetworksusingfilterbasedwrapperbasedandembeddedbased
AT setiadiyazid comparisonoffeatureselectionmethodsforddosattacksonsoftwaredefinednetworksusingfilterbasedwrapperbasedandembeddedbased
AT yudhogirisucahyo comparisonoffeatureselectionmethodsforddosattacksonsoftwaredefinednetworksusingfilterbasedwrapperbasedandembeddedbased