An Intrusion Detection System for 5G SDN Network Utilizing Binarized Deep Spiking Capsule Fire Hawk Neural Networks and Blockchain Technology
Abstract
:1. Introduction
- The utilization of a lightweight encryption algorithm (LEA) in the data acquisition layer ensures data security during mobile user authentication, enhancing network integrity and user privacy.
- Implementation of the Mud-Ring Algorithm (MRA) for optimal switch selection, preventing flow table overloading, and dynamically managing switch resources for efficient network operation.
- The deployment of blockchain technology with searchable encryption and decryption techniques ensures the authenticity and reliability of flow rules, improving network resilience against malicious modifications. This innovation significantly strengthens network security.
- The application of the BSHNN method at the domain controller layer enables real-time data packet classification and management of network traffic based on dynamic conditions and requirements.
- Employing an enhanced adapting hidden attribute-weighted naive bayes (EAWNB) approach for identifying suspicious packets during data transmission.
2. Related Works
3. Proposed Methodology
3.1. LightWeight Encryption Algorithm
Algorithm 1: LEA pseudocode for mobile user authentication |
Input: ‘’ (MAC address, identity, password, PUF information, location data) Begin Initialize ‘’ /* “ the data inputs */ Request ‘’ for authentication define preprocess user data return define register with TTP /* indicates secret key generation process */ return /* “ denotes the secret key */ define encryption and authentication process /* specifies the encrypted key */ decrypt and verify if(valid) authentication success else rejected end if End Output: Authentication successful |
3.2. Mud-Ring Algorithm for Switch Selection
- Step 1: Initially, the software entities (intelligent searching agents) and switches (“prey”) are distributed randomly in a ring topology network, with interconnections resembling “mud rings”.
- Step 2: The software entities explore the switches with random movements throughout the network to select an optimal switch. The new positions of these software entities are adjusted based on switch proximity, utilizing Equation (1).
- Step 3: The software entities evaluate and update their positions based on their fitness function, which is determined by factors such as switch proximity and flow table usage. These updates are calculated to strategically position the software entities around the chosen switch, using Equation (2).
- Step 4: Assess the software entities fitness function with respect to proximity to the selected switch and overall network conditions. Select the best switch for routing based on factors such as proximity, flow table usage, and network metrics to maximize flow table efficiency.
- Step 5: The procedure concludes upon selecting an optimal switch for routing. Figure 2 shows the flow chart of the Mud-Ring algorithm.
Algorithm 2: Searchable encrypted data query algorithm |
Input: a protection metric ‘’. Output: Document identifiers ‘’.
|
Algorithm 3: Decryption algorithm |
Input: Master key ‘ and a set ‘’ of encrypted document ‘’. Output: Document identifiers ‘’.
|
3.3. Binarized Deep Spiking Capsule Fire Hawk Neural Network Based Packet Classification
3.4. Enhanced Adapting Hidden Attribute Weighted Naïve Baye Based Data Packet Transmission
3.5. Computational Complexity Analysis
4. Results and Discussion
4.1. Performance Analysis
4.1.1. Detection Rate
4.1.2. Authentication Time
4.1.3. Delay
4.1.4. Throughput
4.1.5. Packet Loss Ratio (PLR)
4.1.6. Accuracy
4.1.7. Recall
4.1.8. Performance Metrics Comparisons: (Accuracy, Precision, Recall, and Delay)
4.2. Discussion of the Proposed Work’s Scalability, Implications, and Insights
5. Conclusions and Future Scope
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Ferrag, M.A.; Shu, L.; Friha, O.; Yang, X. Cyber security intrusion detection for agriculture 4.0: Machine learning-based solutions, datasets, and future directions. IEEE/CAA J. Autom. Sin. 2021, 9, 407–436. [Google Scholar] [CrossRef]
- Siddamsetti, S.; Srivenkatesh, M. Implementation of Blockchain with Machine Learning Intrusion Detection System for Defending IoT Botnet and Cloud Networks. Ing. Syst. D’inf. 2022, 27, 1029–1038. [Google Scholar] [CrossRef]
- Hernandez-Jaimes, M.L.; Martinez-Cruz, A.; Ramírez-Gutiérrez, K.A.; Feregrino-Uribe, C. Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets, and Cloud-Fog-Edge architectures. Internet Things 2023, 23, 100887. [Google Scholar] [CrossRef]
- Shrestha, R.; Omidkar, A.; Roudi, S.A.; Abbas, R.; Kim, S. Machine-learning-enabled intrusion detection system for cellular connected UAV networks. Electronics 2021, 10, 1549. [Google Scholar] [CrossRef]
- Krishnan, P.; Jain, K.; Buyya, R.; Vijayakumar, P.; Nayyar, A.; Bilal, M.; Song, H. MUD-based behavioral profiling security framework for software-defined IoT networks. IEEE Internet Things J. 2021, 9, 6611–6622. [Google Scholar] [CrossRef]
- Pandey, B.K.; Saxena, V.; Barve, A.; Bhagat, A.K.; Devi, R.; Gupta, R. Evaluation of soft computing in intrusion detection for secure social Internet of Things based on collaborative edge computing. Soft Comput. 2023, 1–11. [Google Scholar] [CrossRef]
- Kaur, J.; Singh, G. A blockchain-based machine learning intrusion detection system for internet of things. In Principles and Practice of Blockchains; Springer International Publishing: Cham, Switzerland, 2022; pp. 119–134. [Google Scholar]
- De Souza, C.A.; Westphall, C.B.; Machado, R.B.; Loffi, L.; Westphall, C.M.; Geronimo, G.A. Intrusion detection and prevention in fog based IoT environments: A systematic literature review. Comput. Netw. 2022, 214, 109154. [Google Scholar] [CrossRef]
- Sharma, P.; Jain, S.; Gupta, S.; Chamola, V. Role of machine learning and deep learning in securing 5G-driven industrial IoT applications. Ad Hoc Netw. 2021, 123, 102685. [Google Scholar] [CrossRef]
- Malhotra, P.; Singh, Y.; Anand, P.; Bangotra, D.K.; Singh, P.K.; Hong, W.C. Internet of things: Evolution, concerns, and security challenges. Sensors 2021, 21, 1809. [Google Scholar] [CrossRef]
- Arisdakessian, S.; Wahab, O.A.; Mourad, A.; Otrok, H.; Guizani, M. Survey on IoT intrusion detection: Federated learning, game theory, social psychology, and explainable AI as future directions. IEEE Internet Things J. 2022, 10, 4059–4092. [Google Scholar] [CrossRef]
- Zhang, D.; Shi, W.; St-Hilaire, M.; Yang, R. Multiaccess edge integrated networking for Internet of Vehicles: A blockchain-based deep compressed cooperative learning approach. IEEE Trans. Intell. Transp. Syst. 2022, 23, 21593–21607. [Google Scholar] [CrossRef]
- Shams, R.; Suri, D.O.; Hanif, F.; Otero, P. Comparative Analysis of Intrusion Detection Systems in SDN. In Proceedings of the 2023 Global Conference on Wireless and Optical Technologies (GCWOT), Malaga, Spain, 8–10 October 2023; pp. 1–9. [Google Scholar]
- Nayak, N.K.S.; Bhattacharyya, B. MAC protocol based IoT network intrusion detection using improved efficient shuffle bidirectional COOT channel attention network. IEEE Access 2023, 11, 77385–77402. [Google Scholar] [CrossRef]
- Singh, S.K.; Sharma, S.K.; Singla, D.; Gill, S.S. Evolving requirements and application of SDN and IoT in the context of industry 4.0, blockchain and artificial intelligence. In Software Defined Networks: Architecture and Applications; Scrivener Publishing LLC: Austin, TX, USA, 2022; pp. 427–496. [Google Scholar]
- Chaganti, R.; Suliman, W.; Ravi, V.; Dua, A. Deep learning approach for SDN-enabled intrusion detection system in IoT networks. Information 2023, 14, 41. [Google Scholar] [CrossRef]
- Abdulqadder, I.H.; Zhou, S.; Zou, D.; Aziz, I.T.; Akber, S.M.A. Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms. Comput. Netw. 2020, 179, 107364. [Google Scholar] [CrossRef]
- Polat, H.; Türkoğlu, M.; Polat, O.; Şengür, A. A novel approach for accurate detection of the DDoS attacks in SDN-based SCADA systems based on deep recurrent neural networks. Expert Syst. Appl. 2022, 197, 116748. [Google Scholar] [CrossRef]
- Almazyad, A.; Halman, L.; Alsaeed, A. Probe Attack Detection Using an Improved Intrusion Detection System. Comput. Mater. Contin. 2023, 74, 4769–4784. [Google Scholar] [CrossRef]
- Miranda, C.; Kaddoum, G.; Boukhtouta, A.; Madi, T.; Alameddine, H.A. Intrusion prevention scheme against rank attacks for software-defined low power IoT networks. IEEE Access 2022, 10, 129970–129984. [Google Scholar] [CrossRef]
- Al Ghamdi, M.A. An optimized and secure energy-efficient blockchain-based framework in IoT. IEEE Access 2022, 10, 133682–133697. [Google Scholar] [CrossRef]
- Saba, T.; Rehman, A.; Sadad, T.; Kolivand, H.; Bahaj, S.A. Anomaly-based intrusion detection system for IoT networks through deep learning model. Comput. Electr. Eng. 2022, 99, 107810. [Google Scholar] [CrossRef]
- Yazdinejadna, A.; Parizi, R.M.; Dehghantanha, A.; Khan, M.S. A kangaroo-based intrusion detection system on software-defined networks. Comput. Netw. 2021, 184, 107688. [Google Scholar] [CrossRef]
- Zainudin, A.; Akter, R.; Kim, D.S.; Lee, J.M. Federated learning inspired low-complexity intrusion detection and classification technique for sdn-based industrial cps. IEEE Trans. Netw. Serv. Manag. 2023, 20, 2442–2459. [Google Scholar] [CrossRef]
- Dat-Thinh, N.; Xuan-Ninh, H.; Kim-Hung, L. MidSiot: A multistage intrusion detection system for internet of things. Wirel. Commun. Mob. Comput. 2022, 2022, 9173291. [Google Scholar] [CrossRef]
- Serrano, W. The blockchain random neural network for cybersecure IoT and 5G infrastructure in smart cities. J. Netw. Comput. Appl. 2021, 175, 102909. [Google Scholar] [CrossRef]
- Asgharzadeh, H.; Ghaffari, A.; Masdari, M.; Gharehchopogh, F.S. Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm. J. Parallel Distrib. Comput. 2023, 175, 1–21. [Google Scholar] [CrossRef]
- Abdulqadder, I.H.; Zou, D.; Aziz, I.T. The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller-based load balancing in SDN 5G. Future Gener. Comput. Syst. 2023, 141, 339–354. [Google Scholar] [CrossRef]
- Almaraz-Rivera, J.G.; Perez-Diaz, J.A.; Cantoral-Ceballos, J.A. Transport and application layer DDoS attacks detection to IoT devices by using machine learning and deep learning models. Sensors 2022, 22, 3367. [Google Scholar] [CrossRef]
- Logeswari, G.; Bose, S.; Anitha, T. Designing a SDN-Based Intrusion Detection and Mitigation System Using Machine Learning Techniques. In Proceedings of the International Conference on Advanced Communications and Machine Intelligence, Karur, India, 9–11 December 2022; Springer Nature: Singapore, 2022; pp. 303–314. [Google Scholar]
- Panahi, P.; Bayılmış, C.; Çavuşoğlu, U.; Kaçar, S. Performance evaluation of lightweight encryption algorithms for IoT-based applications. Arab. J. Sci. Eng. 2021, 46, 4015–4037. [Google Scholar] [CrossRef]
- Kheradpisheh, S.R.; Mirsadeghi, M.; Masquelier, T. BS4NN: Binarized spiking neural networks with temporal coding and learning. Neural Process. Lett. 2022, 54, 1255–1273. [Google Scholar] [CrossRef]
- Vijayakumar, T. Comparative study of capsule neural network in various applications. J. Artif. Intell. 2019, 1, 19–27. [Google Scholar]
- Shishehgarkhaneh, M.B.; Azizi, M.; Basiri, M.; Moehler, R.C. BIM-based resource tradeoff in project scheduling using fire hawk optimizer (FHO). Buildings 2022, 12, 1472. [Google Scholar] [CrossRef]
- Zhou, X.; Wu, D.; You, Z.; Wu, D.; Ye, N.; Zhang, L. Adaptive Two-Index Fusion Attribute-Weighted Naive Bayes. Electronics 2022, 11, 3126. [Google Scholar] [CrossRef]
- Abdelghany, M.; Zaki, W.; Ashour, M. Modified Dijkstra shortest path algorithm for SD networks. Int. J. Electr. Comput. Eng. Syst. 2022, 13, 203–208. [Google Scholar] [CrossRef]
Packet Features | Description |
---|---|
Service type | Service request to destination, e.g., HTTP |
Packet header length | Size of packet header |
Flags | Indicates connection status: normal (flag = 0) or error (flag = 1) |
Epoch time | Epoch completion time duration |
Protocol used | TCP/UDP |
RRT | Response reply time |
TTL | Time to live |
Port Number | Port number of switches |
Packet count | Packets per flow amount |
Byte count | Bytes per flow amount |
Duration | Alive time of switch (nanoseconds) |
Parameters | Value |
---|---|
Simulation area | 500 m × 500 m |
Simulation time | 45 s |
Number of APs | 8 |
Number of MUs | 50 |
Number of controllers | 1 |
Number of switches | 7 |
Attacks | 20% |
Flow type | MAC-IP flow |
SDN controller | OpenFlow |
Protocol used | TCP |
Packet length | 1500 |
Mobility of MUs | 0–2 m/s |
Mobility model of MU | RandomWalk2D |
Interval time | Random |
Block size | 100 Transactions |
Block header | Previous block hash + timestamp + nonce + difficulty target |
Number of transactions | 600 in 45 s |
Hash generation | SHA256 |
Metrics | Proposed Approach |
---|---|
Detection rate (%) | 96.41 |
Authentication time (s) | 16.2 |
Delay (s) | 0.09 |
Throughput (Mbps) | 428 |
Packet loss ratio (%) | 1.5 |
Accuracy (%) | 98.02 |
Precision (%) | 96.40 |
Recall (%) | 97.53 |
Methods | Evaluation Metrics | ||
---|---|---|---|
Accuracy (%) | Precision (%) | Recall (%) | |
LSTM [16] | 93.1 | 76.24 | 86.13 |
RNN [18] | 95 | 90.24 | 93.7 |
IDS [19] | 95.8 | 91.4 | 96.7 |
BSHNN (Proposed) | 98.02 | 96.40 | 97.53 |
Detection Rate | Authentication Time | Delay | ||||||
---|---|---|---|---|---|---|---|---|
% of Attacks | Methods | No. of Mobile Users | Methods | Number of Switches | Methods | |||
ML-IDP (%) | BSHNN (%) | ML-IDP (s) | BSHNN (s) | ML-IDP | BSHNN | |||
4 | 92.87 | 94.75 | 10 | 9.76 | 5.22 | 1 | 0.001 | 0.001 |
8 | 93.23 | 95.18 | 20 | 10.25 | 6.14 | 2 | 0.04 | 0.05 |
12 | 93.45 | 96.15 | 30 | 15.76 | 8.27 | 3 | 0.05 | 0.04 |
16 | 93.89 | 96.44 | 40 | 18.23 | 12.64 | 4 | 0.09 | 0.05 |
20 | 94.08 | 96.41 | 50 | 21.9 | 16.2 | 7 | 0.12 | 0.09 |
Throughput | Packet Loss Ratio | ||||
---|---|---|---|---|---|
% of Attacks | Methods | Number of Switches | Methods | ||
ML-IDP (Mbps) | BSHNN (Mbps) | ML-IDP (%) | BSHNN (%) | ||
2 | 137 | 157 | 2 | 0.9 | 0.5 |
4 | 189 | 204 | 3 | 1 | 0.8 |
6 | 220 | 246 | 4 | 1.4 | 1.0 |
8 | 250 | 276 | 5 | 1.7 | 1.2 |
10 | 384 | 428 | 6 | 2.5 | 1.5 |
Parameter | Dijkstra’s Algorithm | Mud Ring Algorithm (Proposed) |
---|---|---|
Bandwidth (Mbps) | 52.4679 | 69.325 |
Jitter (ms) | 0.3501 | 0.241 |
Delay (ms) | 1 | 0.09 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Nayak, N.K.S.; Bhattacharyya, B. An Intrusion Detection System for 5G SDN Network Utilizing Binarized Deep Spiking Capsule Fire Hawk Neural Networks and Blockchain Technology. Future Internet 2024, 16, 359. https://doi.org/10.3390/fi16100359
Nayak NKS, Bhattacharyya B. An Intrusion Detection System for 5G SDN Network Utilizing Binarized Deep Spiking Capsule Fire Hawk Neural Networks and Blockchain Technology. Future Internet. 2024; 16(10):359. https://doi.org/10.3390/fi16100359
Chicago/Turabian StyleNayak, Nanavath Kiran Singh, and Budhaditya Bhattacharyya. 2024. "An Intrusion Detection System for 5G SDN Network Utilizing Binarized Deep Spiking Capsule Fire Hawk Neural Networks and Blockchain Technology" Future Internet 16, no. 10: 359. https://doi.org/10.3390/fi16100359
APA StyleNayak, N. K. S., & Bhattacharyya, B. (2024). An Intrusion Detection System for 5G SDN Network Utilizing Binarized Deep Spiking Capsule Fire Hawk Neural Networks and Blockchain Technology. Future Internet, 16(10), 359. https://doi.org/10.3390/fi16100359