AI and Machine Learning Enabled SDN
AI and Machine Learning Enabled SDN
Abstract The telecommunications industry has not been exempt from the tech-
nology sector’s massive artificial intelligence (AI) and machine learning (ML) boom
in recent years. Artificial intelligence (AI) and machine learning (ML) provide
advanced analytics and automation that are in line with modern networking concepts
like software-defined networking (SDN) and software-defined wide-area networks
(SD-WAN). Work is being done to determine how AI/ML can benefit SD-WAN and
to demonstrate these benefits in a real SD-WAN network using a workable example.
Modern ML techniques and algorithms are the extent of AI/ML. Today’s Internet
is under constant threat from DDoS (Distributed Denial of Service) attacks. As the
volume of Internet traffic grows, it’s getting harder and harder to tell what’s legiti-
mate and what’s malicious. The DDoS attack was detected using a machine learning
approach that makes use of a Random Forest classifier. To better detect DDoS attacks,
we tweak the Random Forest algorithm. The proposed machine learning approach
outperforms, as demonstrated by our results.
K. K. S. V. A. Satheesh (B)
School of Computer Science and Artificial Intelligence, SR University, Hanuma Konda,
Warangal, India
e-mail: kns9@live.com
M. Janani
IT Department, St. Joseph’s College of Engineering, Hyderabad, India
S. C. Venkateswarlu
Electronics and Communication Engineering, Institute of Aeronautical Engineering, Dundigal,
Hyderabad, Telangana, India
R. G. Kumar
Department of Computer Science and Engineering, School of Engineering and Technology,
CHRIST (Deemed to Be University), Kengeri Campus, Bangalore, India
A. Gupta
Amity Business School, Amity University, Greater Noida, Uttar Pradesh, India
B. Kotaiah
Department of CS and IT, Maulana Azad National Urdu Central University, Gachibowli,
Hyderabad, Telangana, India
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022 131
V. Bhateja et al. (eds.), Data Engineering and Intelligent Computing,
Lecture Notes in Networks and Systems 446,
https://doi.org/10.1007/978-981-19-1559-8_14
132 K. K. S. V. A. Satheesh et al.
1 Introduction
2 AI and ML in SDN
To make use of ML, the SD-WAN system’s data must be made available to the
ML system. When SD-WAN and ML are combined, they form a larger system with
capabilities that come from both of them. Consider ML as an SD-WAN capability
that can be embedded in the management layer of the orchestrator/directory node.
This approach would place ML on the management layer. However, the north bound
interface provided by SD-WAN systems is excellent for networking applications
[7]. The management layer node would be less monolithic if ML were placed in
the network application layer(s). Figure 3 shows this architecture. SD-architecture
WAN’s and design principles make using the northbound interface for new features
a no-brainer. The northbound interface can be used to fetch data, but it can also be
used to make network configuration changes and take other administrative actions.
Closed-loop automation based on ML is now possible, allowing the network to adapt
based on what it has learned. As opposed to human operators, enabling closed-loop
automation reduces reliance on human intervention in the network and speeds up
response times in the event of problems or configuration requirements. As a result
of SD-ability WAN’s to centrally manage and configure the network, this closed-
loop automation can make changes to all network devices and optimise the network
overall [8] (Fig. 4).
SDN, or software-defined networking, is a cutting-edge networking technology
that makes networking easier and more flexible. In addition to providing basic IP
3 BackGround
The NOX controller has a DDoS detection method based on Self-Organizing Maps
(SOM). Using the network flow features that are periodically gathered from the
switches, SOM creates an artificial neural network that works without human super-
vision. Based on the SOM pattern, the traffic is either classified as normal or abnormal
[10]. Figure 5 depicts this detection method, which utilises three modules running in
a loop within the NOX controller on a periodic basis. The controller’s performance
136 K. K. S. V. A. Satheesh et al.
will be impacted if switches are queried on a regular basis, especially in large cloud
architectures with a large number of switches. An additional consideration is how to
handle the large volume of flows that will be processed in the flow tables.
4 Methodlogy
to the mitigated value being lower than the default value, any malicious short-lived
flows will time out and be removed from the switch flow tables. Tables of the switch A
longer connection with a greater number of packets are expected for legitimate traffic
flows in contrast [12]. As long as the mitigated value is selected correctly, legitimate
flow entries will be unaffected, but malicious flows will be removed quickly from
the system (Fig. 6).
The previous section’s entropy-based DDoS attack detection is best suited for
detecting attacks on a single victim. We can’t rely solely on entropy to protect against
attacks with multiple victims because the attack is aimed at multiple locations. As
a result, the system includes a second DDoS detection method based on flow rate
in addition to entropy variation [12]. The switch is subjected to a large number of
DDoS attacks that use spoofed source IP addresses. To set up flows, the switch sends
numerous packet-in messages to the controller. As a result, the controller’s CPU is
taxed, and switch memory and network bandwidth are depleted. The controller or
switch may be damaged as a result.
The contact volume editor or the publication chair may be the person in charge of
reviewing all of the PDFs. The authors aren’t involved in the checking process when
this happens. Proofs are used to ensure that the text, tables and figures are free of
typographical or conversion errors, and are complete and accurate. There is no way
to make significant changes to the content, such as adding new results, fixing errors,
or changing the title or author.
DDoS detection uses a variety of machine learning techniques. Random Forest
(RF) classifier was used as a classification technique in our investigation. There
are numerous software tools available today for detecting DDoS attacks. Malicious
traffic, on the other hand, can take many forms. The assailants frequently alter their
138 K. K. S. V. A. Satheesh et al.
methods of attack. As a result, it’s critical to draw lessons from past mistakes.
Machine learning can help with this. Analyzing traffic with the Machine Learning
algorithm can reveal an attack pattern [13]. Random Forest Algorithm for Prediction
We can use Majority voting to predict the unknown test data after building a forest
with the training data.
• Select the test features and use the rules of each randomly created decision tree
to predict the result. Save the result as the target.
• Calculate the votes for each predicted target.
• High voted target is declared as final prediction.
The random forest algorithm generates a large number of decision trees, each
with its own set of rules based on the input variables. Classification rules can be set
automatically. As a result, the dataset is critical in this case. Our datasets must be
error-free if we are to get reliable results (Fig. 7).
Finally, the machine learning models are ready to be trained. Figure 8 depicts the
training process. Get the input dataset (UCLA) and process it are the first two steps.
In other words, columns or features with zero values must be edited or removed based
on the data’s importance. In order for the algorithms to process the data, any values
containing characters must be converted to numeric. In order to detect an attack, you
must first select the features that will be useful. As a result, we use the scikit-learn
libraries’ random forest algorithm to build the models, which we then cross-validate
to get better predictions. Finally, we store and use the cross-validated results to build
new models.
Figure 9 depicts our proposed system’s machine learning model’s testing phase.
Assemble a random forest classifier model in training and feed it the data from
the controller every 10 s. To see if you’ve been attacked, run this test. If an attack
is discovered, notify authorities and create a log file to document it. If this is the
case, go ahead and get more input. Our RF classifier will be built and applied to the
training data after which we will perform tenfold cross-validation to determine the
AI and Machine Learning Enabled Software Defined Networks 139
5 Results
However, the controller programme has been modified to include two machine
learning modules: a classifier module that has access to the training dataset and
a prediction module that classifies incoming network traffic as attack traffic or not
(Fig. 10).
Because a single victim attack is easy to detect, the experiment focuses on attacks
on multiple victims. We’re running two Scapy programmes in parallel during the
simulation. The person who is launching the attack sends packets at a faster rate than
the person who is sending out regular traffic. Our detection system’s performance is
evaluated by running a simulation 50 times based on the calculated threshold values.
Pattern B attack traffic is generated on four hosts for each run. There are several
simulations running at the same time, and they each take about 30 min. Table 1
summarises the False Positive and False Negative results, which were documented.
Table 1 shows that an attack traffic can pass through the detection system as
normal traffic, which is harmful to the system, based on the values therein. The way
the thresholds are derived differs significantly between the conventional approach
and ours. Figure 11 illustrates the contrast between the basic approach’s accuracy rate
AI and Machine Learning Enabled Software Defined Networks 141
and our modified approach’s accuracy rate. Thus, using thresholds derived from mean
and standard deviation, we’ve seen an increase in the detection system’s accuracy.
In order to keep the switches from failing, the mitigation module is activated after
an attack has been confirmed by our detection system’s Stage II. Figure 12 depicts the
results of running the POX controller’s mitigation module to stop the attack traffic.
In Fig. 13, the proposed statistical approach to attack detection and mitigation is
depicted in full.
6 Conclusion
In order to complete a literature review on the use of AI/ML in SD-WAN, the study
conducted a case study to show how AI/ML can be used in SD-WAN as a proof-of-
concept example. Until recently, AI/ML was restricted to the use of modern machine
learning algorithms and techniques. There are many moving parts to detecting and
countering a DDoS attack. We began our investigation initially with the goal of
enhancing our DDoS detection system. To arrive at various cutoff points, we calcu-
lated the mean and standard deviation. A better mitigation method was also intro-
duced to guard against failures on the controller and switches themselves. Despite
our best efforts, the detection rate still falls short of our expectations. In order to
further improve the detection rate, we proposed an ML strategy. We propose using
an RF algorithm with weighted voting to implement our strategy. As a result of our
findings, we believe the approach we’ve proposed performs the best overall.
References
1. Vasseur J (2020) Why (and How) machine learning will change (SD)WAN and the ınternet.
English. Presented on 25.11.2020 in the SD-WAN & SASE Virtual Summit
2. Sumantra I, Indira Gandhi S (2020) DDoS attack detection and mitigation in software defined
networks. 2020 ınternational conference on system, computation, automation and networking
(ICSCAN). pp 1–5. https://doi.org/10.1109/ICSCAN49426.2020.9262408
3. Zhang D, Yu FR, Yang R (2019) Blockchain-based distributed software-defined vehicular
networks: a dueling deep ${Q}$-learning approach. IEEE Trans Cogn Commun Networking
5(4):1086–1100. https://doi.org/10.1109/TCCN.2019.2944399
4. Zhao Y, Li Y, Zhang X, Geng G, Zhang W, Sun Y (2019) A survey of networking applications
applying the software defined networking concept based on machine learning. IEEE Access
7:95397–95417. https://doi.org/10.1109/ACCESS.2019.2928564
5. Rafique W, Qi L, Yaqoob I, Imran M, Rasool RU, Dou W (2020) Complementing IoT
services through software defined networking and edge computing: a comprehensive survey.
IEEE Commun Surv Tutorials 22(3):1761–1804. https://doi.org/10.1109/COMST.2020.299
7475. Thirdquarter
6. Alves RCA, Oliveira DAG, Nunez Segura GA, Margi CB (2019) The cost of software-defining
things: a scalability study of software-defined sensor networks. In: IEEE Access vol 7, pp
115093–115108. https://doi.org/10.1109/ACCESS.2019.2936127
7. Zhang P et al (2021) Network-wide forwarding anomaly detection and localization in soft-
ware defined networks. IEEE/ACM Trans Networking 29(1):332–345. https://doi.org/10.1109/
TNET.2020.3033588
8. Theodorou T, Mamatas L (2020) A versatile out-of-band software-defined networking solution
for the internet of things. IEEE Access 8:103710–103733. https://doi.org/10.1109/ACCESS.
2020.2999087
9. Tadros CN, Rizk MRM, Mokhtar BM (2020) Software defined network-based management
for enhanced 5G network services. IEEE Access 8:53997–54008. https://doi.org/10.1109/ACC
ESS.2020.2980392
10. Wang J et al (2019) A software-defined clustering mechanism for underwater acoustic sensor
networks. IEEE Access 7:121742–121754. https://doi.org/10.1109/ACCESS.2019.2937832
144 K. K. S. V. A. Satheesh et al.