DOI QR코드

DOI QR Code

Research on DDoS Detection using AI in NFV

인공지능 기술을 이용한 NFV 환경에서의 DDoS 공격 탐지 연구

  • Kim, HyunJin (Department of Computer Engineering, Chungnam National University) ;
  • Park, Sangho (JiranSoft Researh Center) ;
  • Ryou, JaeCheol (Department of Computer Engineering, Chungnam National University)
  • Received : 2018.04.18
  • Accepted : 2018.04.28
  • Published : 2018.04.30

Abstract

Recently, the cloud technology has made dynamical network changes by enabling the construction of a logical network without building a physical network. Despite recent research on the cloud, it is necessary to study security functions for the identification of fake virtual network functions and the encryption of communication between entities. Because the VNFs are open to subscribers and able to implement service directly, which can make them an attack target. In this paper, we propose a virtual public key infrastructure mechanism that detects a fake VNFs and guarantees data security through mutual authentication between VNFs. To evaluate the virtual PKI, we built a management and orchestration environment to test the performance of authentication and key generation for data security. And we test the detection of a distributed denial of service by using several AI algorithms to enhance the security in NFV.

최근 클라우드 기술은 물리적인 네트워크를 구축하지 않고, 동적으로 논리적인 네트워크를 구축할 수 있게 만들 수 있다는 특징으로 인해 각광받고 있다. 최근의 클라우드 분야의 연구에도 불구하고, 가입자가 공개적으로 VNF를 이용한 서비스를 제공 받을 수 있는 NFV 환경의 특성으로 공격의 타겟이 될 수 있기 때문에 가짜 VNF에 대한 식별과 개체 간의 통신 암호화에 대한 연구가 필요하다. 따라서 본 논문에서는 가짜 VNF를 탐지하고, VNF 간의 상호 인증을 통해서 통신 구간의 보안성을 향상시킬 수 있는 Virtual PKI를 이용한 보안 메커니즘을 제안한다. 그리고 NFV 환경에서 DDoS 공격에 대한 공격의 탐지율을 향상시키기 위한 다수의 인공지능 알고리즘을 비교 분석함으로써 공격탐지에 효과적인 인공지능 알고리즘을 도출하였다.

Keywords

References

  1. Sanjeet Kumar Nayak, Sujata Mohanty and Banshidhar Majhi. "CLB-ECC: Certificateless Blind Signature Using ECC", Journal of Information Processing Systems(JIPS), Vol. 13, pp. 392-397, 2017.
  2. Mihir Bellare, Anand Desai, David Pointcheval; Phillip Rogaway, "Lecture Notes in Computer Science", CRYPTO: Annual International Cryptology Conference, Vol. 1462, pp. 26-45, 1998.
  3. Ki-Woong Park, Jaesun Han, JaeWoong Chun and Kyu Ho Park, "THEMIS: A mutually Verifiable Billing System for the Cloud Computing Environment", IEEE Transactions on Services Computing, Vol. 6, Issue 3, pp. 300-313, 2013. https://doi.org/10.1109/TSC.2012.1
  4. Saket Acharya and Namita Tiwari, "Survey Of DDoS Attacks Based On TCP/IP Protocol Vulnerabilities", IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 18, Issue 3, pp. 68-76, 2016.
  5. Won Min Kang, Seo Yeon Moon and Jong Hyuk Park, "An enhanced security framework for home applicances in smart home", Human-centric Computing and Information Sciences(HCIS), 2017.
  6. Syed Mujtiba Hussain and Ghulam Rasool Beigh, "Impact of DDoS attack (UDP Flooding) on queuing models", 4th International Conference on Computer and Communication Technology (ICCCT), pp.210-216, 2013.
  7. Neha Gupta, Ankur Jain, Pranav Saini and Vaibhav Gupta, "DDoS attack algorithm using ICMP flood", Computing for Sustainable Global Development(INDIACom), pp. 4082-4084, 2016.
  8. Dimitrios Moustis and Panayiotis Kotzanikolaou, "Evaluating security controls against HTTP-based DDoS attacks", 4th International Conference on Information Intelligence, Systems and Applications (IISA), 2013.
  9. Wei Chen and Dit-Yan Yeung, "Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing", Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006.
  10. Nathan Keegan, Soo-Yeon Ji, Aastha Chaudhary, Claude Concolate and Byunggu Yu, "A survey of cloud-based network intrusion detection analysis", Human-centric Computing and Information Sciences, 2016.
  11. U. Maulik and S. Bandyopadhyay, "Performance evaluation of some clustering algorithms and validity indices", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 24, Issue 12, pp.1650-1654, 2002. https://doi.org/10.1109/TPAMI.2002.1114856
  12. Sharmila and Mukesh Kumar, "An optimized farthest first clustering algorithm", Nirma University International Conference on Engineering (NUiCONE), 2013.
  13. Seema Bandyopadhyay and E. J. Coyle, "An energy efficient hierarchical clustering algorithm for wireless sensor networks", INFOCOM, Vol. 3, pp.1713-1723, 2003.
  14. R.Inokuchi and S. Miyamoto, "LVQ clustering and SOM using a kernel function", International Conference on Fuzzy System, Vol. 3, pp.1497-1500, 2004.
  15. Sin-seok Seo, Young J. Won and James Won-Ki Hong, "Witnessing Distributed Denial-of-Service traffic from an attacker's network", Network and Service Management (CNSM), pp. 241-247, 2011.

Cited by

  1. Security in Network Virtualization: A Survey vol.17, pp.4, 2018, https://doi.org/10.3745/jips.04.0220