Escolar Documentos
Profissional Documentos
Cultura Documentos
Seemab Latif
CSE Dept, MCS
National University of Sciences and Technologies,
Islamabad, Pakistan.
seemab@mcs.edu.pk
Abstract-
its
deployment.
This
paper
aims
at
studying
SDN
I.
INTRODUCTION
Software-Defined Networking (SDN) [1], [2] is an emerging
networking model that is intended to change the limitations of
current network infrastructures. First, it breaks the vertical
integration by separating the network's control logic (the
control plane) from the underlying routers and switches that
forward the traffic (the data plane). Second, with the separation
of the control and data planes, network switches tum into
simple forwarding devices and the control logic is implemented
in a logically centralized controller (or network operating
system), simplifying policy enforcement and network
(re)configuration and evolution [3]. A simplified view of this
architecture is shown in Fig 1 and layered view of networking
functionality is shown in Fig 2. The most notable
implementation of such architecture and functionality is
Opentlow [32] [33].
Controller Platform
----.------, ----------
Network Infrastructure
978-1-4799-6162-7114/$31.00 2014
permitted. Permission from
55
56
1----11
Fuzzy Logic
1----11
Bayesian Networks
11.
57
IV.
Nonna] Cia
1 AbuOJlllal CL,"
luputLaycr
Hidden L9)'er
Oulput Layer
''t
/
/
/
/
/
/
.<.
-r:::f.
..
/
"/
/
/
(2)
/
0
0 0
0
x,
58
v.
Fuzzy Logic
Fuzzy logic based on fuzzy set theory which works on
reasoning which is termed as an approximation rather than
precise or fixed. Techniques based on fuzziness have been used
for anomaly detection because the features which are to be
considered to solve the problem can be termed as fuzzy
variables. The concept of fuzzy logic lets an object to fit in to
different classes simultaneously. This flexibility is very useful
in case it is difficult to distinguish between different classes. It
is also helpful in intrusion detection task in SDN, where the
differences between the normal and anomalous classes or traffic
are not well defined.
While fuzzy logic has been effective, particularly against
probes and port scans, its main disadvantages to be considered
in case of SDN are the high resource consumption and large
time consumed during the training. [28] [29] [25].
Bayesian Network
A Bayesian network model is used to encode probabilistic
relationships among the variables of interest. This method is
used to solve problem of intrusion detection in combination
with statistical techniques. The naIve Bayesian (NB) algorithm
is used for learning task, where a training set with target class
is provided. Aim is to classify an unseen pattern, whose
attribute values are known but class is unknown. To classify the
unseen example, the Bayesian approach is to assign the most
probable target class. Given the values of attribute (a,
a2, ... ... ... , an ) which describe the example.
Machine
Learning
Cons
Technique
1.
generalize
to
Neural
Capable
Networks
incomplete data.
detection.
need
expert
knowledge and
it can
during
Does
not
neural
network
training.
intrusions.
2.
Bayesian
Encodes
Network
probabilistic
Harder
to
handle
variables of interest.
not
Capable to incorporate
classifiers
both
knowledge is wrong.
prior
data
and
contain
any
good
if
prior
knowledge.
3.
Support
Training
Vector
ability
time.
Machine
samples.
Mostly
used
binary
classifier
which
cannot
training
give
for
small
rate,
to
insensitiveness
VI.
Cmap
Pros
Genetic
Ability
Algorithm
to
derive
best
takes
long
additional
information
about
optimal
times.
Biologically
inspired
Over-fitting.
and
employs
selecting
parameters.
evolutionary algorithm.
5.
Fuzzy Logic
Reasoning needs to be an
High consumption of
approximation instead of
resources. Reduced,
being precise.
Effective,
identification and
scans.
runtime is a difficult
task.
CNB
V.
CONCLUSION
59
REFERENCES
[I]
[2]
S.
Schenker,
"The
Future
of
Networking,
and
the
Past
http://www.youtube.com/watch?v=YHeyuD89nl Y
[3]
[4]
Processing:
of
[5]
[6]
workshop
on
Hot
topics
in
software
defined
networking, ser. HotSDN '13. New York, NY, USA: ACM, 2013, pp. 5560.
[7]
[8]
Available:
http://www.fiercetelecom.com/storylsecurity-
implications-software-defined-networks/2012-05-14
[9]
Wasserman and S.
of
the
open
Task
Force,
Apr
2013.
[Online].
Available:
https:!ldatatracker.ietf.orgidoc/draft-mrw-sdnsec-openflow-analysisl
[12] S. Shin and G. Gu, "Attacking software-defined networks: A first
feasibility study," in Proceedings of the second workshop on Hot topics
in software defined networks, ser. HotSDN '13. New York, NY, USA:
ACM, 2013, pp. 1-2.
[13] K.
Benton, L.
J.
Camp, and C.
Small,
"OpenFlow
vulnerability
using
Machine
[Online].
[Online].
Learning
Detection
Systems.
foundation"
2014.
[Online].
Available:
York, USA
for
networking
Techniques
"Open
[19] Sharmila Kishor Wagh, Vinod K Pachghare and Satish R Kolhe. Article:
System
http://www.csit.carleton.cal-msthilairelThesis/Seyed%20Mousavi.pdf
Detection
Intrusion
Information
me16003&view=map
Intrusion
Learning-based
Computational
https:!lwww.opennetworking.orgi
on
of
http://www.digitalattackmap.coml#anim=I &color=O&country=ALL&ti
Survey
"Machine
Campus networks, " SlGCOMM Comput. Commun. Rev., vol. 38, no. 2,
ddos-attackreports.html
Controller
CAO
"Journal
Systems5:6(2009) 1825-1831.
Networks
Zhuolin
Algorithms
[16] Prolexic. (2013, December) DoS and DDoS attack reports, trends and
Defined
TANGi",
Detection
Software
D.
Map.
Cognition,
4/dos_attacks.html
Attack
of
Digital
Microstructure
internal
Distributed
[25] AA Ojugo, AO. Eboka, O.E. Okonta, R.E Yoro, F.O. Aghware "Genetic
http://www.cisco.comlweb/aboutlac123/ac147larchived_issues/ipj_7-
Oct)
"Learning
Parallel
[Online].
(2013,
errors,"
Arbor.
the
Williams,
[24] Jonatan Gomez and Dipankar Dasgupta "Evolving Fuzzy Classifiers for
[17] Google,
in
Explorations
and
1986.
HotSDN '12. New York, NY, USA: ACM, 2012, pp. 121-126.[Online].
http://doi.acm.orglI0.1145/2342441.2342466
Hinton
back-propagating
G.
by
[Online].
2011.
Protocols,"October
Rumelhart,
representations
[Online].
60