Major Review 1.2
Major Review 1.2
SUPERVISED BY PRESENTED BY
1. V.NAGALAKSHMAN (VTU 20442) (21UECS0667)
2. A.AKSHITH (VTU 20063)(21UECS0029)
Mrs.S.KIRUTKIGA/Assistant professor
3. G.GOPAL REDDY (VTU 20292)(21UECM0071)
• Publication Status
• Introduction:
Distributed Denial of Service (DDoS) attacks represent one of the most significant
cybersecurity threats to modern networks. These attacks overwhelm network resources by sending a
flood of traffic from multiple sources, rendering services
unavailable to legitimate users. The impact of DDoS attacks can be devastating, causing service
downtime, financial loss, and reputational damage to organizations. With the increasing sophistication
and scale of these attacks, detecting and mitigating DDoS events in real time is becoming a critical
necessity.The detection of DDoS attacks in SDNs is an ongoing challenge because of the dynamic
nature of the traffic patterns in SDN environments. Traditional DDoS detection methods, which rely on
signature-based techniques, struggle to identify new, previously unseen attack patterns and adapt
to the constantly evolving landscape of network traffic. Machine learning (ML), with its ability to
analyze large volumes of traffic data and
identify patterns, offers an effective solution for detecting such attacks in real-time.
• Problem Statement:
Traditional DDoS detection methods struggle with the dynamic nature of SDN traffic and fail to
identify new attack patterns, compromising the security and stability of SDN environments..
• Project Goal:
To develop a hybrid AI model combining transformer architectures and neural networks for accurate,
2/21/20 NO :MA DEPARTMENT OF COMPUTER SCIENCE &
25 adaptive, and scalable DDoS BATCH
attack
136 detection in SDNs.
ENGINEERING
Project Goals & Objectives
Overall Goal:
Develop a Reliable and Accurate DDoS Attack Detection
System.
Use Real-Time Traffic Monitoring for Attack Detection.
Implement Feature Extraction and Preprocessing
Techniques.
Enhance the Adaptability of the Detection System
•Specific Objectives:
Data Collection and Traffic Monitoring: To gather real-time network traffic data from SDN
environments, focusing on flow- level information such as packet rates, flow sizes, and network
latency.
Development and Training of Machine Learning Models: To build and train machine learning
models capable of detecting DDoS attacks based on traffic features.
Real-Time DDoS Attack Detection: To implement a real-time detection system that monitors SDN
traffic and flags DDoS attacks as soon as they occur.
Adaptability and Model Retraining: To ensure the detection system remains effective over time as
attack patterns evolve.
Limitations: Existing solutions struggle with adaptability to evolving attack patterns, limited
scalability
novel attack forvectors
real-time, high- volume SDN traffic, and inadequate temporal pattern recognition.
and are Lorem ipsum dolor
Additionally,
computati o nmany
L o re m
a llymethods
i n e ff iclacki errobustness
ip s u m d o loamet,
nstconsectetur
it
. against sitamet, consectetur
Our Approach: This project integrateadips trisacninsgfoerlitm. Neurllsamfor advancedatdeipmispciongraellipt.
aNuttlleamrn recognition with neural networks for high-level feature extraction, ensuring
egestas elit a, consequat egestas elit a,
evolving
slauoattack
preeertiopatterns, surpassing
risruascfrincu graillac,y and
consequat the adaptab laiolirteye.t Irtisausdfdrirnegsillase, s scalability, real-time
Methodology:
• Data Collection:
Gather real-time network traffic data in SDN environments, which includes both normal traffic and
DDoS attack traffic. This will be used to train machine learning models.
.
• Feature Engineering and Preprocessing:
Extract relevant features from the raw data and prepare it for machine learning.
Integrati
on
Continuous Ongoing Implement feedback loop, plan for model
2/21/20
25 Improvem BATCH NO :MA
136 ENGINEERING retraining.
DEPARTMENT OF COMPUTER SCIENCE &
Technology Stack & Tools
Hardware:
Servers/Workstations
Network Devices
Monitoring/Traffic Capture Devices
Software:
SDN Controllers
Machine Learning Libraries
Data Preprocessing and Feature
Engineering Tools
Real-time Monitoring Tools
Flow Data Collection and Analysis
Tools:
Cloud Deployment
Real-Time Data Ingestion
Performance Evaluation
Security Tools
DDoS Detection System Prototype: A fully functioning prototype of the DDoS detection
system integrated with an SDN controller (e.g., OpenDaylight or Ryu). The system will detect
and classify DDoS traffic and trigger mitigation actions automatically.
Machine Learning Model: A trained machine learning model capable of classifying network
traffic as either normal or DDoS. The model will be validated and evaluated based on several
performance metrics (accuracy, precision, recall, F1- score).
Real-time Traffic Monitoring Interface: A dashboard or interface (e.g., using Grafana and
Prometheus) to visualize traffic
flow, real-time attack detection, and mitigation actions.
Automated Mitigation Module: A set of scripts or tools that automatically trigger actions (e.g.,
filtering malicious traffic or rate-limiting attackers) once a DDoS attack is detected.
Scalability and Distributed Detection: Ensure that the system can scale to handle
large networks and high
• Timeline
volumes for
of traffic while maintaining
next step: low latency. Lorem ipsum dolor
Lorem ipsum dolor
sitamet, consectetur sitamet, consectetur
TIMELINE DURATION adipiscing elit. adipiscing elit. STEPS
Nullam laoreet risus Nullam laoreet risus
fringilla,
egestas elit a, fringilla,
egestas elit a,
Month 1 4 weeks consequat Complete Testing with Real-world Traffic.
consequat
augue. Phasellus augue. Phasellus
Month 2–3 5 weeks sollicitudin
quis
felis mi,
Improve Automated Mitigation Module
sollicitudin
quis
felis mi,
The publication process for the project is currently ongoing. The research findings, methodology,
and results are being compiled into a manuscript for submission to a reputed peer-reviewed
journal/conference. Initial drafting of the paper is ongoing, and the team is in the process of
refining the content, validating experimental results, and ensuring compliance with IEEE
publication standards. Potential target journals and conferences are being shortlisted to
align with the research scope and impact. The final submission is expected to be completed
within the next phase of the project timeline.
• [2] Yijie Li, Boyi Liu, Shang Zhai and Mingrui Chen ,”DDoS attack detection method based
on feature extraction of deep belief networks.”IOP Conference Series: Earth
and Environmental Science, Vol. 252, Issue 3,2019.
• [3] Peng Xiao,Wenyu Qu,Heng Qi ,Zhiyang Li.”Detecting DDoS attacks against datacenters
using correlation analysis.” Computer Communications, 67,2015,
• [4] Fatima Khashab, Joanna Moubarak, Antoine Feghali , and Carole Bassil.”DDoS Attack
Detection and Mitigation in SDN using Machine Learning”,IEEE 7th International
Conference on Network Softwarization (NetSoft),2021.
• [6] Dharma, N.G., Muthohar, M.F., Prayuda, J.A., Priagung, K. and Choi, D., 2015, August.
Time-based DDoS detection and mitigation for SDN controller. In 2015, the 17th Asia-Pacific
Network Operations and Management Symposium (APNOMS) (pp. 550-553). IEEE.
• [7] da Silveira Ilha, A., Lapolli, A.C., Marques, J.A. and Gaspary, L.P., 2020. Euclid: A fully in-
network, P4-based approach for real-time DDoS attack detection and mitigation. IEEE
Transactions on Network and Service Management, 18(3), pp.3121-3139.
• [8] Singh, J. and Behal, S., 2020. Detection and mitigation of DDoS attacks in SDN: a
comprehensive review, research challeng es, and future directions. Computer Science Review
37, p.100279.
• [10] Miao, R., Yu, M. and Jain, N., 2014. Nimbus: cloud-scale attack detection and mitigation.
Acm Sigcomm Computer Communication Review, 44(4), pp.121-122.
• [11] "Securing the Software-Defined Network Control Layer" , Phillip Porras, Steven Cheung,
Martin Fong, Keith Skinner, and Vinod Yegneswara.
• [12] Towards Secure and Dependable SDN, Diego Kreutz , Fernando M.V. Ramos , Paulo
Verissimo.
• [15] Role-Based Multiple Controllers for Load Balancing and Security in SDN, Dharmendra
Chourishi; Ali Miri; Mihailo Milić; Salam Ismaeel, IEEE, 2015.