Research Area:  Software Defined Networks
An experimental setup of 32 honeypots reported 17M login attempts originating from 112 different countries and over 6000 distinct source IP addresses. Due to decoupled control and data plane, Software Defined Networks (SDN) can handle these increasing number of attacks by blocking those network connections at the switch level. However, the challenge lies in defining the set of rules on the SDN controller to block malicious network connections. Historical network attack data can be used to automatically identify and block the malicious connections. There are a few existing open-source software tools to monitor and limit the number of login attempts per source IP address one-by-one. However, these solutions cannot efficiently act against a chain of attacks that comprises multiple IP addresses used by each attacker. In this paper, we propose using machine learning algorithms, trained on historical network attack data, to identify the potential malicious connections and potential attack destinations. We use four widely-known machine learning algorithms: C4.5, Bayesian Network (BayesNet), Decision Table (DT), and Naive-Bayes to predict the host that will be attacked based on the historical data. Experimental results show that average prediction accuracy of 91.68% is attained using Bayesian Networks.
Keywords:  
Network Attack
Machine Learning
Honeypots
SDN
Author(s) Name:  Saurav Nanda; Faheem Zafari; Casimer DeCusatis; Eric Wedaa; Baijian Yang
Journal name:  
Conferrence name:  2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)
Publisher name:  IEEE
DOI:  10.1109/NFV-SDN.2016.7919493
Volume Information:  
Paper Link:   https://ieeexplore.ieee.org/abstract/document/7919493