You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/337603875

A Flow-based IDS for SDN-enabled Tactical Networks

Conference Paper · November 2019


DOI: 10.1109/IMITEC45504.2019.9015900

CITATIONS READS

8 558

3 authors:

Skhumbuzo Zwane Paul Tarwireyi


University of Zululand University of Zululand
4 PUBLICATIONS 50 CITATIONS 44 PUBLICATIONS 208 CITATIONS

SEE PROFILE SEE PROFILE

Matthew Adigun
University of Zululand
234 PUBLICATIONS 913 CITATIONS

SEE PROFILE

All content following this page was uploaded by Skhumbuzo Zwane on 28 November 2019.

The user has requested enhancement of the downloaded file.


A Flow-based IDS for SDN-enabled Tactical
Networks
Skhumbuzo Zwane Paul Tarwireyi Matthew Adigun
Department of Computer Science Department of Computer Science Department of Computer Science
University of Zululand University of Zululand University of Zululand
KwaDlangezwa, South Africa KwaDlangezwa, South Africa KwaDlangezwa, South Africa
201144122@unizulu.ac.za tarwireyiP@unizulu.ac.za adigunM@unizulu.ac.za

Abstract—Tactical Mobile Ad hoc Networks (TMANET) reinstallation of the network in a short notice. For example,
have received much attention in recent years due to their ability [6] argued that most of the issues in the tactical network are
to provide network connectivity to tactical mobile nodes in a due to that the is no single management system by which
battlefield without any infrastructure. Additionally, they network services can be configured and provisioned. The lack
provide decentralization, self-organizing, robustness and of a central management unit makes it difficult to manage,
scalability to tactical nodes. Research in the tactical network deploy and redeploy information services which limit the
domain indicates that network security remains a critical and agility and flexibility of a military force [6]. Hence, the lack
continuous issue that needs attention. Researchers have of central management not only limit force ability but also
identified the lack of a central management and control unit as
network security applications.
one of the limitations in such networks. That is, there is no single
management system by which the network and security services Moreover, modern military equipment is gradually
can be configured and provisioned. This paper proposes a flow- embedded with ubiquitous sensing and computing devices [7].
based Intrusion Detection System (IDS) framework for Such devices are capable of collecting operational context
TMANETs. The proposed flow-based IDS framework leverages data, and communication information that can be used for the
Machine Learning (ML) and software-defined network (SDN) task of intrusion detection. For example, Flow data has
to achieve anomaly detection in TMANETs. The paper also become easy to acquire, with no significant resource
discusses the envisaged deployment scenarios and the requirements to the network devices. In this work, we propose
capabilities of the proposed system.
an intrusion detection system, which use network flow data to
Keywords—Tactical MANET, Flow-based IDS, Machine detect anomalies.
learning, Software Defined Networks, Network Security The proposed flow-based intrusion detection system
framework leverages Machine Learning (ML) and software-
I. INTRODUCTION defined network (SDN) for anomaly detection in TMANETs.
From the proposed framework, we describe the architectural
Mobile ad hoc networks (MANETs) have been adopted in components, how SDN is leveraged, and the flow of events to
modern military communication systems due to their ability to accomplish intrusion detection tasks. The paper further
support tactical field operations in different areas without discusses the envisaged deployment scenario with the
infrastructure. MANETs are decentralized and have self- advantages and drawbacks of the proposed system.
organizing capabilities, which allow them to be robust and Preliminary results indicate that flow-based detection
scalable [1]. MANETs are usually deployed in the edge of the achieves satisfactory results when compared to packet-based
tactical network to provide connectivity to individual nodes detection.
active in tactical field operations. In that sense, a Tactical
MANET (TMANET) is a military communication network The rest of the paper is organized as follows, section II
supporting operations on the battlefield. presents the background and literature review, which focuses
on the SDN paradigm, adoption of SDN for tactical networks,
The increasing growth in technology renders security a and flow-based intrusion detection methods. In section III the
critical subject in networks [2] [3], especially T-MANETs proposed framework is described, the latter provides an
because any security breach can result in detrimental effects, overview of the stages of the proposed method and the
such as soldiers being killed or manipulated to engage into application scenario and benefits achieved. Section IV
unnecessary gunfights. Over the years, researchers in the presents a performance study of machine learning methods.
security domain have investigated how network intrusion Finally, section V concludes the paper and provide future
detection systems can be effective for securing and mitigating works.
network security violations. The goal of intrusion detection is
to monitor network assets or devices to detect anomalous
behaviors and misuse [4]. However, due to the network II. BACKGROUND AND LITERATURE REVIEW
structure and operational environment, deploying security This section describes a general overview of SDN, SDN
mechanisms to secure T-MANETs is very challenging [5]. in tactical networks, Flow-based IDS, and ML approaches
Modern military communication systems present many used for intrusion detection
different challenging sets of problems to network operators A. Software Defined Networking (SDN)
[6]. Network operators have to battle with the heavy reliance
on wireless barriers, which often offer a fraction of the In Software Defined Networks (SDN), the network
required capacity, the constant changes in quality of service intelligence is logically centralized in software-based
(QoS) requirements, and the possible take down, move, or controllers, known as Control Plane (CP), and network
devices become simple packet forwarding devices, known as Generally, FIDS has a near real-time response, low
Data Plane (DP), that can be programmed via an open deployment cost, and the ability to operate on high-speed
interface such as OpenFlow [8]. The motivation for the backbone network links [10]. Networks with low energy
development of SDN was the lack of flexibility in traditional budget, high confidentiality, and real-time security
networks. In traditional networks, the task of configuring or monitoring requirements can benefit from FIDS.
updating network devices is very challenging because the C. Machine Learning enabled IDS
task is done manually. For example, configuring 100 network
The term Machine Learning (ML) was originally coined
devices located in different places could take several days or
in the 1960s by Arthur Lee Samuel. He defined ML as “a field
weeks depending on the professionals available. Applying of study that gives computers the ability to learn without
changes in the network does not happen fast and accurate being explicitly programmed”. ML is commonly used for
enough. Additionally, this approach is prone to errors. classification and prediction problems based on some known
Another issue faced with traditional networks is the large properties previously learned from some training data. ML
number of different network device vendors/manufacturers techniques have been around for years, the emergence of new
which makes it difficult to find the right professionals to scale computing technologies and availability of data allowed the
up the infrastructure when needed. usage of ML methods in a more efficiently and in real-time
A survey conducted by [6] presented some of the most [11]. Recently, researchers [3], [12]–[14] in the intrusion
common challenges experienced in tactical networks. In the detection field have been attracted by ML techniques for the
list, the heavy reliance on wireless barriers, the critical task of intrusion detection. However, since ML is not a new
dependency of the commander on timely access to field, there are many different ML algorithms that can be used
information, and also the moving, reinstalling, and taking for intrusion detection applications.
down of the network in a short notice are the critical problems The most popular ML category for intrusion detection is
reported. The authors proposed the adoption of SDN to classification. Usually, standalone, hybrid and ensemble
address problems experienced in tactical networks. Other classifiers are used, depending on the requirements and
researchers have also proposed different frameworks and resources available for the IDS. Different researchers in the
SDN based architecture for tactical communication networks field of intrusion detection have conducted performance
[1], [9]. The work of [9] presented a practical implementation analysis of machine learning methods for intrusion detection.
of an SDN mobile ad hoc network. This work is one of a few A recent study [15], reported that ensemble learning methods
studies in the wireless network community to demonstrate the performed better than single learning methods in terms of
SDN advantages in device-to-device (D2D) data accuracy. This demonstrates the applicability of ensemble
transmission and the flexibility introduced by centralized methods to address the high false-positive rate in T-MANET
network management. Another recent study in [1] proposed as reported by [5]. On the other hand, [15] also reported that
different novel architecture designs for SDN-enable mobile single learning methods tend to be quicker when building and
ad hoc network in the tactical field testing the model.
B. Intrusion Detection using Network Flow Data D. ML and SDN based IDS
Flow data have been used over the years in a number of SDN offer built-in information gathering, flexibility,
applications, which include billing, network traffic analysis, programmability, and network global view, thus, it is
network visibility, congestion control, and more recently regarded as one of the best options for network data collection
intrusion detection [10]. The importance of flow data and its and analysis. On the other hand, Machine learning has gained
applications have resulted in major vendors offering built-in popularity in the network security domain [14], [16], [17] due
flow collection and export support in their network devices. to more network-enabled devices getting connected,
Examples include sFlow, IPFIX, and Cisco’s Netflow, which malicious activities becoming stealthier, and the emergence
is more popular. of new technologies, such as SDN [3]. Over recent years,
In recent years flow-based intrusion detection methods many techniques have been proposed that use SDN and
have attracted many researchers in the network security machine learning (ML) for data collection, analysis, and
domain due to the advantages they offer over the traditional traffic classification.
packet-based intrusion detection methods [10]. Key In [18] a simple architecture for data collection in both
advantages of Flow-based IDS (FIDS) include; SDN networks and legacy networks using OpenFlow is
 The amount of data processed by FIDS is lesser, making proposed. Their method is solely based on OpenFlow and can
them better suitable for the protection of backbone links be implemented as an SDN application in the controller. The
where the processing of total network traffic is authors deployed a single OpenFlow switch in a non-SDN
computationally demanding. enterprise production network. An HP E3800 OpenFlow
 FIDS is an appropriate choice for intrusion detection enabled switch and HP VAN SDN controller were used to run
where network applications use end-to-end encryption their traffic monitoring application. The authors argued that
because no packet data scanning is required. their set up was very lightweight and does not interfere with
 FIDS has fewer privacy concerns because user the normal flow of traffic in the monitored network. The
information is protected from any intermediate scans. extracted data were classified using ensemble machine
 Because modern network hardware offer built-in flow learning methods, such as random forest (RF) and two
collection support, flow data for FIDS can be collected variations of gradient boosting classifiers, namely; Stochastic
in multiple locations across the network without any Gradient Boosting (SGB) and Extreme Gradient Boosting
additional costs. (EGB). Their initial results indicated that supervised learning
algorithms can be used with their architecture and with the
data that is collected with high accuracy levels.
The work in [19] proposed an SDN based secure IoT
framework called SoftThings to detect abnormal behaviors
and attacks and to mitigate as appropriate. Their framework
used Support Vector Machine to classify traffic. The study
applied both linear and non-linear RBF kernel. They
conducted their experiments on Mininet network emulator,
and they were able to achieve 98% precision in attack
detection. In [20] an application-aware multipath flow
routing using machine learning in SDN is proposed. This
method uses the C4.5 decision tree algorithm on a 40-feature
dataset. DDoS attack detection and mitigation system in SDN
is proposed in [21]. This method employed entropy-based
feature extraction and SVM for attack detection. [22]
Proposed traffic classification deployed at Access Point using
C5.0 decision tree algorithm. 11 ML models were made
available in a library in [23], they can allow developers to
quickly develop network security applications that can
perform real-time detection and responses.
However, although integrating these two technologies
have been an active topic in recent years, little attention has
been paid to the gap between the initial work and practical
real-world deployments. In this work, OpenFlow and sFlow
are utilized to construct an intrusion detection system capable
of feedback control that optimizes performance and
automatically adapts the network to meet challenging
demands.
Fig. 1: Flow-based IDS model
III. PROPOSED FRAMEWORK
This section presents and describes the proposed flow- 2) Data Collection and Preparation
based intrusion detection system (FIDS) model, leveraging Flow records are exported to the flow collector which
SDN, and the flow of events. receive, store, and pre-process flow data from one or more
flow exporters in the network. The flow collector also
A. Proposed FIDS model conducts feature extraction, which includes the task of
The proposed model employs flow sampling techniques picking the optimal features that will be used by the model to
to acquire network flow data from SDN enabled network and successfully classify the records. The Collector then further
use ML to analyze the flow data for anomaly detection, as export the data for storage and pass it on to the data pre-
shown in Figure 1. The model is composed of four essential processing module. Data pre-processing is the process of
components/stages, namely; Packet Observation, Flow converting flow records into a specific format that is
metering and Export, Data collection, and Data Analysis. acceptable to the detection algorithm used. This phase can
include data cleaning, fixing missing values, data encoding,
1) Flow Metering and Export and normalization. In this component, all the features of each
flow record from the data collector is encoded and scaled.
In this stage, packets are aggregated into flows and flow This allows the data analysis to be consistent while using less
records are exported. Packet aggregation is performed through processing power.
a metering process which is based on Information Elements
that define the layout of flow. Information elements are fields 3) Data Analysis
that can be exported in flow records. After the metering
process flow record sampling and filtering functions are In this stage, the results of all the previous stages come
performed. In contrast with packet sampling and filtering together. In the data analysis stage different data analysis
performed on the packet observation stage, flow sampling and methods can be applied, for example, flow analysis and
filtering work on flow records instead of packets. Flow reporting, threat detection, and performance monitoring [24].
records are packaged into a specific message format Our proposed framework employed threat detection by
depending on the protocol used. For example, the IPFIX employing Machine learning to model network behavior and
format or NetFlow format. After constructing the message, it detect anomalies. In order to use machine learning for
is then exported to the flow collector. The most implemented intrusion detection, a machine learning model is required. In
and deployed transport protocol for exporting flows is User the proposed framework, a machine learning classifier is built
Datagram Protocol (UDP) [24]. using the pre-processed data. The ML decision engine uses
the machine learning classifier constructed to classify new
instances as malicious or normal. If an instance is classified
as malicious then an alert is generated, else the instance is
dropped. In addition, the decision engine logs all the It is envisaged that the application will be capable of
instances and decision in a log file. Such log files can be classifying a network flows as malicious or normal. The
exported to a Log Management and Analysis tool, to further discussed process is described in Figure 2.
analyze and visualize generated alerts.
C. Flow of Events
B. Leveraging SDN architecture The proposed flow-based intrusion detection system can
SDN plays a significant role in the proposed machine be divided into three modules; flow sampling module, data
learning intrusion detection framework described above. The collector module and ML IDS application. The flow of events
following section presents an overview of how our method in each of these components is described in Figure 3.
leverages SDN.
1) The Sampling agents
 Data Plane (Packet Observation, Flow Metering and
The sampling agents wait for packets to be transmitted,
Export Stage): All the network devices in the data plane
and collects flow information. The agent verifies if the
are embedded with collector agents, as shown in Figure packets meet specified criteria, which is important for
1, the agents sample and send flow records to the filtering network control messages, as depicted in Fig.3. If the
centralized collector. The devices are configured to packets met specified criteria, filtering is conducted by
collect specific flow metrics and export them to the specifying a threshold. The threshold specifies and manages
collector. Today built-in flow collection and export flows by inspecting packet header. Flows are then packaged
support are already offered by major vendors, like Cisco. and sent to the collector.
 Control Plane (Data Collection and Preparation Stage): 2) The Data Collector
The data collector residing in the CP module collect The collector module is responsible for collecting the data
network flow records. It then filters the data and conduct from the different sampling agents embedded in each network
feature extraction. Thus, the collector generates and device. Its task is to collect the flow data, employ feature
creates different datasets which are important for the extraction then pass the data with appropriate features or
adopted ML technique. Data sources are all network attributes to the SDN application for data pre-processing and
devices capable of communicating with the OpenFlow cleaning.
controller.
3) The IDS Application
 Application Plane (Data Analysis Stage): The machine The IDS application periodically queries or retrieves flow
learning model is constructed and implemented as an records from the collector. It waits with time out and repeats
SDN application. Different ML methods or algorithms the process. For each new flow record, pre-processing
can be applied for different purposes as SDN methods are applied to the flow record. After converting the
applications using different datasets generated by the flow record into ML acceptable input format, the ML model
flow collector. Different applications can be constructed is used to classify it as normal or malicious. If the record is
that are powered by ML models to influence the normal, then the IDS application move on to the next flow
functioning of the network. Examples include incident record retrieved. However, if the record is malicious, the
handling applications, such as Rule or policy application makes a snapshot of the flow record’s data and
enforcement, and path selection applications. In our case, insert the information in a log file. Logging detected
a ML model is built and used as an SDN intrusion malicious incidents could then be helpful for visualization
detection application. and security incident handling

Fig. 2: SDN based ML Intrusion detection system


Although the local controllers appear to be bridges, they
can take full control when the network is interrupted and
when serving real-time transmissions. Local ML intrusion
detection will serve part of the network in real-time, and the
global controller continues with further analysis and
formulate new network operation policies and rules if a
serious breach is detected. The IDS operates hand in hand
with the SDN controller, while the controller oversees how
packets in the network are transmitted, the IDS collects and
analyses network flow data and generates alerts.
Visualization methods can then be used to visualize the
generated alerts which help address the problems of
analyzing and evaluation of the tactical networks quickly.
Besides, the proposed architecture will help network
administrators in perceiving, exploring, analyzing, and
understanding complex and abstract security incidents.
Therefore simplifying their security incident handling and
Fig. 3: Proposed model event flow decision-making capabilities. Which can help improve QoS,
incident analysis, incident containment, and incident
D. Envisaged Deployments and Capabilities recovery as they are the most appealing for military
In environments where security handling is a significant communication systems.
factor, such as military tactical networks, it is not only IV. PRELIMINARY RESULTS
important to detect intrusions but also to emphasize security
incident handling. The combination of SDN and ML becomes Initially, two popular single learner ML methods,
an obvious solution for such an implementation. This is namely; Decision Tree (DT) and Support Vector Machine
because SDN introduces centralized control and global view, (SVM), and three ensemble ML classifiers, namely;
while ML enhances network intelligence and awareness. The Adaboost, Bagging, and Random Forests are evaluated and
architecture is shown in Figure 4, illustrates an SDN based compared for their effectiveness in intrusion detection. The
TMANET architecture where the proposed ML intrusion classifiers were compared based on their performance in
detection can be useful. In the figure, local SDN controllers detecting intrusions in packet-based and flow-based network
are installed on portable stations that are near mobile nodes. datasets. The aim was to understand the relationship between
Each of them can view part of the network and have to collect ML classifiers in both packet-based and flow-based network
and send network state information to the higher level SDN traffic datasets. For the packet-based dataset evaluation, the
controller available through the cloud. ML intrusion results from the UNSW-NB15 experiments conducted in our
detection models are placed in the local controllers for previous paper [15] was used, while the CIDDS-001-
intrusion detection in partial topology, and a global IDS can external-week1 [26] dataset was used for flow-based
be applied in the global controller. This global controller evaluations. The flow-based dataset was evaluated using
constructs the universal network topology, create operational python 2.7 and scikit-learn library [27] version 0.20.0,
policies and rules, and then disseminate them to the installed in an Asus laptop with 1.80GHz Intel (R) Core i7
forwarding nodes through the local controllers. processor with 8 GB RAM.
The CIDDS-001-external-week1 is a subset of the
CIDDS-001 flow-based datasets consisting of 14 attributes,
in which 3 were used in our evaluation, namely; flow
duration, bytes, and the number of packets. These attributes
were selected because they consist of numeric values which
are useful for effective ML models. The attributes were then
normalized using the standard scaler from scikit-learn.
129628 instances were used for training and 43210 instances
used for testing.

Table 1: Packet-based and flow-based detection accuracy


Packet-based Flow-
Algorithm [15] based
Decision Tree 0.887 0.9909
Support Vector
Machine 0.882 0.6289
Adaboost 0.903 0.9915
Bagging 0.901 0.9908
Random Forest 0.902 0.9914
Fig. 4: SDN based tactical mobile ad hoc network architecture
Accuracy was used for comparison since it measures [6] J. Spencer, O. Worthington, R. Hancock, and E. Hepworth,
“Towards a tactical software defined network,” 2016 Int. Conf.
the ratio of correctly classified instances over the total Mil. Commun. Inf. Syst., pp. 1–7, 2016.
number of instances. Table 1 presents the accuracy of the five [7] A. Castiglione, R. K.-K. Choo, and M. Nappi, “Context Aware
classifiers in both packet-based and flow-based datasets. Ubiquitous Biometrics in Edge of Military Things,” IEEE Cloud
From Table 1 Adaboost outperformed the other classifiers by Computing, vol 4, no 6, pp 16-20, 2017.
obtaining 90.3% accuracy followed by Random forest with [8] D. Kreutz, F Ramos, P Verissimo, CE Rothenbergl., “Software-
90.2% accuracy in the packet-based dataset. When we Defined Networking : A Comprehensive Survey,” Proc. of the
IEEE, vol 103, no 1, pp. 14–76, 2015.
consider the flow-based data, Adaboost obtained 99.15%
[9] H. C. Yu, G. Quer, and R. R. Rao, “Wireless SDN Mobile Ad Hoc
accuracy while random forest obtained 99.14% accuracy. The Network : from Theory to Practice,” IEEE Int. Conf. on Com,
Support Vector Machine obtained poor results compared to Paris, pp 1-7, 2017.
the other classifiers in both packet and flow-based datasets, [10] M. Fahad, M. Sher, and Y. Bi, “Flow-based intrusion detection :
with 88.2% and 62.89% accuracy. The bagging classifier Techniques and challenges,” Comput. Secur., vol. 70, pp. 238–
obtained slightly better results than the decision tree classifier 254, 2017.
in the packet-based datasets. The results are graphically [11] A. L. Buczak and E. Guven, “A Survey of Data Mining and
Machine Learning Methods for Cyber Security Intrusion
illustrated in Figure 5 Detection,” vol. 18, no. 2, pp. 1153–1176, 2016.
[12] S. Agrawal and J. Agrawal, “Survey on Anomaly Detection using
Data Mining Techniques,” Procedia - Procedia Comput. Sci., vol.
60, pp. 708–713, 2015.
[13] F. Ertam, and O. Yaman, “Intrusion Detection in Computer
Networks via Machine Learning Algorithms,” Int. Arti. Intell and
Data Proc Sym, Malatya, pp 1-4, 2017.
[14] D. Jankowski and M. Amanowicz, “On Efficiency of Selected
Machine Learning Algorithms for Intrusion Detection in Software
Defined Networks,” Int. J. Electron. Telecommun., vol. 62, no. 3,
pp. 247–252, 2016.
[15] S. Zwane, P. Tarwireyi, and M. Adigun, “Performance Analysis of
Machine Learning Classifiers for Intrusion Detection,” 2018 Int.
Conf. Intell. Innov. Comput. Appl., pp. 1–5, 2019.
[16] K. F. Yu, R. E. Harang, and K. N. Wood, “Machine learning for
intrusion detection in mobile tactical networks,” vol. 10185, p.
1018504, 2017.
Fig 5: Packet and flow based accuracy for each classifier [17] M. Zaman, “Evaluation of Machine Learning Techniques for
Network Intrusion Detection,” NOMS 2018 - 2018 IEEE/IFIP
V. CONCLUSION AND FUTURE WORKS Netw. Oper. Manag. Symp., pp. 1–5, 2018.
SDN and machine learning-based intrusion detection can [18] J. Suárez-Varela and P. Barlet-Ros, “Flow monitoring in Software-
help improve network security and management in Defined Networks: Finding the accuracy/performance tradeoffs,”
TMANETs. SDN can simplify the task of managing and Comput. Networks, vol. 135, 2018.
deploying security incident handling strategies, network [19] S. Ezekiel, D. M. Divakaran, and M. Gurusamy, “Dynamic attack
mitigation using SDN,” 2017 27th Int. Telecommun. Networks
traffic classification can be achieved through ML techniques. Appl. Conf. ITNAC 2017, vol. 2017-Janua, pp. 1–6, 2017.
This paper proposed a flow-based intrusion detection system [20] S. T. V. Pasca, S. S. P. Kodali, and K. Kataoka, “AMPS:
model that can be deployed in SDN based TMANET. Application aware multipath flow routing using machine learning
Preliminary results suggest that flow-based detection in SDN,” 2017 23rd Natl. Conf. Commun. NCC 2017, 2017.
technique can perform better than packet based intrusion [21] D. Hu, P. Hong, and Y. Chen, “FADM: DDoS Flooding Attack
detection. A proof-of-concept prototype of the proposed Detection and Mitigation System in Software-Defined
method is currently under development. The prototype will be Networking,” 2017 IEEE Glob. Commun. Conf. GLOBECOM
evaluated for its effectiveness and efficiency through 2017 - Proc., vol. 2018-Janua, pp. 1–7, 2018.
accuracy-based and resource usage metrics. Moreover, [22] D. Lee and C. S. Hong, “Access point selection algorithm for
providing optimal AP in SDN-based wireless network,” 19th Asia-
insights into a practical deployment case will be acquired. Pacific Netw. Oper. Manag. Symp. Manag. a World Things,
APNOMS 2017, no. 1, pp. 362–365, 2017.
ACKNOWLEDGMENT
The authors acknowledge Armscor and CSIR for support [23] S. Lee, J. Kim, S. Shin, P. Porras, and V. Yegneswaran, “Athena:
A Framework for Scalable Anomaly Detection in Software-
and sponsorship. Defined Networks,” Proc. - 47th Annu. IEEE/IFIP Int. Conf.
Dependable Syst. Networks, DSN 2017, pp. 249–260, 2017.
REFERENCES
[1] K. Poularakis, G. Iosifidis, and L. Tassiulas, “SDN-enabled [24] R. Hofstede et al., “Flow Monitoring Explained : From Packet
Tactical Ad Hoc Networks : Extending Programmable Control to Capture to Data Analysis With NetFlow and IPFIX,” vol. 16, no.
the Edge,” IEEE Communications Magazine, pp 132-138, 2018. 4, pp. 2037–2064, 2014.
[2] S. M. Mousavi and P. Affairs, “Early Detection of DDoS Attacks [25] N. Moustafa and J. Slay, “UNSW-NB15: a comprehensive datta
in Software Defined Networks Controller ,” Diss. Carleton set for network intrusion detection systems,” Mil. Com. and Inf.
University, 2014. Sys. Conf, pp 1-6, 2015.
[3] T. N. Nguyen, “The Challenges in SDN/ML Based Network [26] M. Ring, S. Wunderlich, D. Grüdl, D. Landes, and A. Hotho,
Security : A Survey,” arXiv preprint arXiv:1804.03539, 2018. “Flow-based benchmark data sets for intrusion detection,” Eur.
Conf. Inf. Warf. Secur. ECCWS, pp. 361–369, 2017.
[4] P. Innella, “The evolution of intrusion detection systems,” Secur.
Novemb., vol. 1514, pp. 1–9, 2001. [27] F. Pedregosa, R. Weiss, and M. Brucher, “Scikit-learn : Machine
Learning in Python,” vol. 12, pp. 2825–2830, 2011.
[5] W. Pawgasame and K. Wipusitwarakun, “Tactical wireless
networks: A survey for issues and challenges,” 2015 Asian Conf.
Def. Technol., pp. 97–102, 2015.

View publication stats

You might also like