dc.contributor.author |
Abbas, Nadine |
|
dc.contributor.author |
Nasser, Youssef |
|
dc.contributor.author |
Shehab, Maryam |
|
dc.contributor.author |
Sharafeddine, Sanaa |
|
dc.date.accessioned |
2023-01-04T13:11:24Z |
|
dc.date.available |
2023-01-04T13:11:24Z |
|
dc.date.copyright |
2021 |
en_US |
dc.date.issued |
2023-01-04 |
|
dc.identifier.isbn |
9781665434447 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10725/14334 |
|
dc.description.abstract |
Due to the rapid advancement of technologies including the tremendous growth of multimedia content, cloud computing and mobile usage, conventional networks are not able to meet the demands. Software-Defined Networks (SDN) are considered one of the key enabling technologies providing a new powerful network architecture that allows the dynamic operation of different services using a common infrastructure. Despite their notable gains, SDNs may not be secure and are vulnerable to attacks. In this paper, we address the SDN vulnerabilities and present attack-specific feature selection to identify the features that have the most impact on anomaly detection. We first use the InSDN intrusion dataset that considers different attacks including Denial-of-Service (DoS), Distributed-DoS (DDoS), brute force, probe, web and botnet attacks. We then perform data pre-processing and apply univariate feature selection to select the features having the highest impact on the different attacks. These selected features can then be used to train the model which reduces the computational cost of modeling while keeping the high performance of the model. Detailed analysis and simulation results are then presented to show the predominant features and their impact on the different attacks. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IEEE |
en_US |
dc.title |
Attack-Specific Feature Selection for Anomaly Detection in Software-Defined Networks |
en_US |
dc.type |
Conference Paper / Proceeding |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
201802638 |
en_US |
dc.author.department |
Computer Science And Mathematics |
en_US |
dc.publication.place |
Piscataway, N.J. |
en_US |
dc.keywords |
Computational modeling |
en_US |
dc.keywords |
Botnet |
en_US |
dc.keywords |
Simulation |
en_US |
dc.keywords |
Multimedia computing |
en_US |
dc.keywords |
Network architecture |
en_US |
dc.keywords |
Feature extraction |
en_US |
dc.keywords |
Probes |
en_US |
dc.description.bibliographiccitations |
Includes bibliographical references. |
en_US |
dc.identifier.doi |
https://doi.org/10.1109/MENACOMM50742.2021.9678279 |
en_US |
dc.identifier.ctation |
Abbas, N., Nasser, Y., Shehab, M., & Sharafeddine, S. (2021, December). Attack-Specific Feature Selection for Anomaly Detection in Software-Defined Networks. In 2021 3rd IEEE Middle East and North Africa COMMunications Conference (MENACOMM) (pp. 142-146). IEEE. |
en_US |
dc.author.email |
nadine.abbas@lau.edu.lb |
en_US |
dc.conference.date |
03-05 December 2021 |
en_US |
dc.conference.pages |
142-146 |
en_US |
dc.conference.place |
Agadir, Morocco |
en_US |
dc.conference.title |
2021 3rd IEEE Middle East and North Africa Communications Conference (MENACOMM) |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
https://ieeexplore.ieee.org/abstract/document/9678279 |
en_US |
dc.orcid.id |
https://orcid.org/0000-0003-3028-326X |
en_US |
dc.publication.date |
2021 |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |