The International Arab Journal of Information Technology (IAJIT)


Machine Learning in OpenFlow Network: Comparative Analysis of DDoS Detection Techniques

Software Defined Network (SDN) allows the separation of a control layer and data forwarding at two different layers. However, centralized control systems in SDN is vulnerable to attacks namely Distributed Denial of Service (DDoS). Therefore, it is necessary for developing a solution based on reactive applications that can identify, detect, as well as mitigate the attacks comprehensively. In this paper, an application has been built based on machine learning methods including, Support Vector Machine (SVM) using Linear and Radial Basis Function kernel, K-Nearest Neighbor (KNN), Decision Tree (DTC), Random Forest (RFC), Multi-Layer Perceptron (MLP), and Gaussian Naïve Bayes (GNB). The paper also proposed a new scheme of DDOS dataset in SDN by gathering considerably static data form using the port statistic. SVM became the most efficient method for identifying DDoS attack successfully proved by the accuracy, precision, and recall approximately 100 % which could be considered

[1] Abdelraza D., Abu-Soud S., and Awajan A., “A Machine Learning System for Distinguishing Nominal and Verbal Arabic Sentences,” The International Arab Journal of Information Technology, vol. 15, no. 3A, pp. 576-584, 2018.

[2] Bakker J., Ng B., and Seah W., “Can Machine Learning Techniques Be Effectively Used in Real Networks Against DDoS Attacks?,” in Proceedings of 27th International Conference on Computer Communication and Networks, Hangzhou, pp. 1-6, 2018.

[3] Dey K. and Rahman M., “Effects of Machine Learning Approach in Flow-Based Anomaly Detection on Software-Defined Networking,” Symmetry, vol. 12, no. 1, pp. 1-7, 2019.

[4] Dong S. and Sarem M., “DDoS Attack Detection Method Based on Improved KNN with the Degree of DDoS Attack in Software-Defined Networks,” IEEE Access, vol. 8, pp. 5039-5048, 2020.

[5] Filho F., Silveira F., Junior A., Vargas-Solar G., and Silveira l., “Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using 226 The International Arab Journal of Information Technology, Vol. 18, No. 2, March 2021 Machine Learning,” Security and Communication Networks, vol. 2019, 2019.

[6] Housman O., Isnaini H., and Fauzi S., SDN- DDOS (ICMP, TCP, UDP), Mendeley Data, 2020.

[7] Kokila R., Selvi S., and Govindarajan K., “DDoS Detection and Analysis in SDN-Based Environment Using Support Vector Machine Classifier,” in Proceedings of 6th International Conference on Advanced Computing, Chennai, pp. 205-210, 2014.

[8] Meti N., Narayan D., and Baligar V., “Detection of Distributed Denial of Service Attacks Using Machine Learning Algorithms in Software Defined Networks,” in Proceedings of International Conference on Advances in Computing, Communications and Informatics, Udupi, pp. 1366-1371, 2017.

[9] Mohammed S., Hussain R., Senko O., Bimaganbetov B., Lee J., Hussain F., Kerrache C., Kerrache E., and Bhuiyan M., “A New Machine Learning-based Collaborative DDoS Mitigation Mechanism in Software-Defined Network,” in Proceedings of 14th International Conference on Wireless and Mobile Computing, Networking and Communications, Limassol, pp. 1-8, 2018.

[10] Nanda S., Zafari F., DeCusatis C., Wedaa E., and Yang B., “Predicting Network Attack Patterns in SDN Using Machine Learning Approach,” in Proceedings of IEEE Conference on Network Function Virtualization and Software Defined Networks, Palo Alto, pp. 167-172,2016.

[11] OpenFlow Switch Specification Version 1.3.0 Wire Protocol 0x04, ads/2014/10/openflow-spec-v1.3.0.pdf),Last Visited, 2020.

[12] Polat H., Polat O., and Cetin A., “Detecting DDoS Attacks in Software-Defined Networks Through Feature Selection Methods and Machine Learning Models,” Sustainability, vol. 12, no. 3, 2020.

[13] RYU Project Team, RYU SDN Framework, Ryubook 1.0 Documentation,, Last Visited, 2020.

[14] Sezer S., Scott-Hayward S., Chouhan P., Fraser B., Lake D., Finnegan J., Viljoen N., Miller M., and Rao N., “Are we Ready for SDN? Implementation Challenges for Software-Defined Networks,” IEEE Communications Magazine, vol. 51, no. 7, pp. 36-43, 2013.

[15] Singh A. and Sharma S., “Digital Era in the Kingdom of Saudi Arabia: Novel Strategies of the Telecom Service Providers Companies,” Webology, vol. 17, no. 1, pp.227-245, 2020.

[16] Singh A., “An Intelligent Reallocation of Load for Cluster Cloud Environment,” International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 8, pp. 711- 714, 2019.

[17] Singh A., “Texture-based Real-Time Character Extraction and Recognition in Natural Images,” International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 8, pp. 3302-3306, 2019.

[18] Singh A., “A Wireless Networks Flexible Adoptive Modulation and Coding Technique in advanced 4G LTE,” International Journal of Information Technology, vol. 11, no. 1, pp. 55- 66, 2019.

[19] Software Defined Networking: The Norm for Networks (2012).

[20] Uqaili I. and Ahsan S., “Machine Learning Based Prediction of Complex Bugs in Source Code,” The International Arab Journal of Information Technology, vol. 17, no. 1, pp. 26-37, 2020.

[21] Ye J., Cheng X., Zhu J., Feng L., and Song L., “A DDoS Attack Detection Method Based on SVM in Software Defined Network,” Security and Communication Networks, vol. 2018, 2018.