{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T09:40:04Z","timestamp":1732354804068,"version":"3.28.0"},"reference-count":31,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T00:00:00Z","timestamp":1719878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"A revolutionary concept of Multi-controller Software-Defined Networking (MC-SDN) is a promising structure for pursuing an evolving complex and expansive large-scale modern network environment. Despite the rich operational flexibility of MC-SDN, it is imperative to protect the network deployment against potential vulnerabilities that lead to misuse and malicious activities on data planes. The security holes in the MC-SDN significantly impact network survivability, and subsequently, the data plane is vulnerable to potential security threats and unintended consequences. Accordingly, this work intends to design a Federated learning-based Security (FedSec) strategy that detects the MC-SDN attack. The FedSec ensures packet routing services among the nodes by maintaining a flow table frequently updated according to the global model knowledge. By executing the FedSec algorithm only on the network-centric nodes selected based on importance measurements, the FedSec reduces the system complexity and enhances attack detection and classification accuracy. Finally, the experimental results illustrate the significance of the proposed FedSec strategy regarding various metrics.<\/jats:p>","DOI":"10.3390\/a17070290","type":"journal-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T13:01:39Z","timestamp":1719925299000},"page":"290","source":"Crossref","is-referenced-by-count":0,"title":["Federated Learning-Based Security Attack Detection for Multi-Controller Software-Defined Networks"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-7711-4776","authenticated-orcid":false,"given":"Abrar","family":"Alkhamisi","sequence":"first","affiliation":[{"name":"Computer Science Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3376-3218","authenticated-orcid":false,"given":"Iyad","family":"Katib","sequence":"additional","affiliation":[{"name":"Computer Science Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]},{"given":"Seyed M.","family":"Buhari","sequence":"additional","affiliation":[{"name":"UTB School of Business, Universiti Teknologi Brunei, Bandar Seri Begawan BE1410, Brunei"}]}],"member":"1968","published-online":{"date-parts":[[2024,7,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","article-title":"Software-Defined Networking: A Comprehensive Survey","volume":"103","author":"Kreutz","year":"2015","journal-title":"Proc. IEEE"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Mohammed, A.H., Khaleefah, R.M., and Abdulateef, I.A. (2020, January 26\u201328). A review software defined networking for internet of things. Proceedings of the 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Ankara, Turkey.","DOI":"10.1109\/HORA49412.2020.9152862"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1016\/j.compeleceng.2017.02.026","article-title":"Software defined wireless sensor networks application opportunities for efficient network management: A survey","volume":"66","author":"Modieginyane","year":"2018","journal-title":"Comput. Electr. Eng."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"15980","DOI":"10.1109\/ACCESS.2018.2814738","article-title":"Multi-controller based software-defined networking: A survey","volume":"6","author":"Hu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.jnca.2017.11.015","article-title":"A survey on software defined networking with multiple controllers","volume":"103","author":"Zhang","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MCOM.001.2100128","article-title":"Vulnerability Challenges of Software Defined Networking","volume":"59","author":"Haas","year":"2021","journal-title":"IEEE Commun. Mag."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"e4150","DOI":"10.1002\/ett.4150","article-title":"Network intrusion detection system: A systematic study of machine learning and deep learning approaches","volume":"32","author":"Ahmad","year":"2021","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"3533","DOI":"10.1007\/s13369-023-08075-2","article-title":"A comprehensive analysis of machine learning-and deep learning-based solutions for DDoS attack detection in SDN","volume":"49","author":"Aslam","year":"2023","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3089","DOI":"10.1007\/s10586-023-04069-9","article-title":"Deep learning for the security of software-defined networks: A review","volume":"26","author":"Taheri","year":"2023","journal-title":"Clust. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Lee, T.H., Chang, L.H., and Syu, C.W. (2020, January 7\u201311). Deep learning enabled intrusion detection and prevention system over SDN networks. Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops), Dublin, Ireland.","DOI":"10.1109\/ICCWorkshops49005.2020.9145085"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"102942","DOI":"10.1016\/j.jnca.2020.102942","article-title":"A GRU deep learning system against attacks in software defined networks","volume":"177","author":"Assis","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1016\/j.future.2019.10.015","article-title":"Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN","volume":"111","author":"Pervez","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.future.2021.06.047","article-title":"Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments","volume":"125","author":"Novaes","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"53015","DOI":"10.1109\/ACCESS.2022.3172304","article-title":"Cyber Threats Detection in Smart Environments Using SDN-Enabled DNN-LSTM Hybrid Framework","volume":"10","author":"Javeed","year":"2022","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"9965945","DOI":"10.1155\/2023\/9965945","article-title":"DDoS Attack Detection and Classification Using Hybrid Model for Multicontroller SDN","volume":"2023","author":"Gebremeskel","year":"2023","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Dey, S.K., and Rahman, M.M. (2019). Effects of machine learning approach in flow-based anomaly detection on software-defined networking. Symmetry, 12.","DOI":"10.20944\/preprints201911.0113.v1"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Javeed, D., Gao, T., and Khan, M.T. (2021). SDN-enabled hybrid DL-driven framework for the detection of emerging cyber threats in IoT. Electronics, 10.","DOI":"10.3390\/electronics10080918"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Wang, J., and Wang, L. (2022). SDN-Defend: A Lightweight Online Attack Detection and Mitigation System for DDoS Attacks in SDN. Sensors, 22.","DOI":"10.3390\/s22218287"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"138732","DOI":"10.1109\/ACCESS.2023.3340142","article-title":"CNN-BiLSTM: A Hybrid Deep Learning Approach for Network Intrusion Detection System in Software Defined Networking with Hybrid Feature Selection","volume":"11","author":"Said","year":"2023","journal-title":"IEEE Access"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.comcom.2023.12.041","article-title":"Abnormal traffic detection system in SDN based on deep learning hybrid models","volume":"216","author":"Wang","year":"2024","journal-title":"Comput. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"3855","DOI":"10.1109\/TDSC.2021.3108782","article-title":"Detecting and mitigating DDoS attacks in SDN using spatial-temporal graph convolutional network","volume":"19","author":"Cao","year":"2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_22","first-page":"39","article-title":"Enhancing QoS and Security in Software Defined Networks Using Perceptron-Based Deep Learning","volume":"9","author":"Ismail","year":"2024","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1109\/TCCN.2021.3102971","article-title":"Federated deep reinforcement learning for traffic monitoring in SDN-based IoT networks","volume":"7","author":"Nguyen","year":"2021","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Ali, M.N., Imran, M., din MS, U., and Kim, B.S. (2023). Low rate DDoS detection using weighted federated learning in SDN control plane in IoT network. Appl. Sci., 13.","DOI":"10.3390\/app13031431"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"4163825","DOI":"10.1155\/2020\/4163825","article-title":"Deep Learning-Based Network Security Data Sampling and Anomaly Prediction in Future Network","volume":"2020","author":"Liu","year":"2020","journal-title":"Discret. Dyn. Nat. Soc."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"104216","DOI":"10.1016\/j.engappai.2021.104216","article-title":"Supervised feature selection techniques in network intrusion detection: A critical review","volume":"101","author":"Galatro","year":"2021","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"195929","DOI":"10.1109\/ACCESS.2020.3031718","article-title":"Mayfly in harmony: A new hybrid meta-heuristic feature selection algorithm","volume":"8","author":"Bhattacharyya","year":"2020","journal-title":"IEEE Access"},{"key":"ref_28","unstructured":"(2024, March 16). NSL-KDD Dataset. Available online: https:\/\/www.kaggle.com\/datasets\/hassan06\/nslkdd."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Alkhamisi, A., Katib, I., and Buhari, S.M. (2023, January 6\u20138). Blockchain -Assisted Hybrid Deep Learning-Based Secure Mechanism for Software Defined Networks. Proceedings of the 2023 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA.","DOI":"10.1109\/ICCE56470.2023.10043401"},{"key":"ref_30","unstructured":"(2024, February 01). UNSW_NB15 Dataset. Available online: https:\/\/www.kaggle.com\/datasets\/mrwellsdavid\/unsw-nb15."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"165263","DOI":"10.1109\/ACCESS.2020.3022633","article-title":"InSDN: A novel SDN intrusion dataset","volume":"8","author":"Elsayed","year":"2024","journal-title":"IEEE Access"}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/17\/7\/290\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T08:32:11Z","timestamp":1732350731000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/17\/7\/290"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,2]]},"references-count":31,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2024,7]]}},"alternative-id":["a17070290"],"URL":"https:\/\/doi.org\/10.3390\/a17070290","relation":{},"ISSN":["1999-4893"],"issn-type":[{"type":"electronic","value":"1999-4893"}],"subject":[],"published":{"date-parts":[[2024,7,2]]}}}