Flow Based Classification for Specification Based Intrusion Detection in Software Defined Networking: FlowClassify

Flow Based Classification for Specification Based Intrusion Detection in Software Defined Networking: FlowClassify

Nithya Sampath, Dinakaran M.
Copyright: © 2019 |Volume: 7 |Issue: 2 |Pages: 8
ISSN: 2166-7160|EISSN: 2166-7179|EISBN13: 9781522568278|DOI: 10.4018/IJSI.2019040101
Cite Article Cite Article

MLA

Sampath, Nithya, and Dinakaran M. "Flow Based Classification for Specification Based Intrusion Detection in Software Defined Networking: FlowClassify." IJSI vol.7, no.2 2019: pp.1-8. http://doi.org/10.4018/IJSI.2019040101

APA

Sampath, N. & Dinakaran M. (2019). Flow Based Classification for Specification Based Intrusion Detection in Software Defined Networking: FlowClassify. International Journal of Software Innovation (IJSI), 7(2), 1-8. http://doi.org/10.4018/IJSI.2019040101

Chicago

Sampath, Nithya, and Dinakaran M. "Flow Based Classification for Specification Based Intrusion Detection in Software Defined Networking: FlowClassify," International Journal of Software Innovation (IJSI) 7, no.2: 1-8. http://doi.org/10.4018/IJSI.2019040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Software defined networking assures the space for network management, SDNs will possibly replace traditional networks by decoupling the data plane and control plane which provides security by means of a global visibility of the network state. This separation provides a solution for developing secure framework efficiently. Open flow protocol provides a programmatic control over the network traffic by writing rules, which acts as a network attack defence. A robust framework is proposed for intrusion detection systems by integrating the feature ranking using information gain for minimizing the irrelevant features for SDN, writing fuzzy-association flow rules and supervised learning techniques for effective classification of intruders. The experimental results obtained on the KDD dataset shows that the proposed model performs with a higher accuracy, and generates an effective intrusion detection system and reduces the ratio of attack traffic.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.