Cyber Attacks in SDN-Based IoT Environment: A Review

Authors

  • Yusra Sh. Ajaj Department of Computer Engineering, College of Engineering, Al-Iraqia University, Baghdad, Iraq
  • Bilal R. Al-Kaseem Department of Communication Engineering, College of Engineering and Information Technology, AlShaab University, Baghdad, Iraq
  • Yousif Al-Dunainawi Department of Information Security Engineering, College of Engineering and Information Technology, AlShaab University, Baghdad, Iraq

DOI:

https://doi.org/10.58564/IJSER.2.3.2023.89

Keywords:

Artificial Intelligence (AI), Cybersecurity Improvement, Internet of Things (IoT), Software Defined Networking (SDN)

Abstract

As the Internet of Things (IoT) continues to grow, integrating Software-Defined Networking (SDN) has brought numerous benefits to IoT deployments. However, this convergence also introduces new challenges in terms of cybersecurity. This review paper explores the landscape of cyber-attacks in SDN-based IoT environments, providing an overview of the various attack vectors, vulnerabilities, and potential security risks associated with this emerging paradigm. This paper examines the unique characteristics of SDN-based IoT networks and their implications for cybersecurity. It delves into different types of cyber-attacks that can target SDN-based IoT deployments, including port scanning, Operating System (OS) fingerprinting, fuzzing, Denial-of-Service (DoS), and Distributed Denial-of-Service (DDoS) attacks. In addition, this paper examines the existing research and case studies that leverage Deep Learning (DL) techniques for cyber-attack detection and prevention in SDN-based IoT environments. It highlights the advantages of using DL, including its ability to learn complex patterns and adapt to evolving attack strategies. This paper emphasizes the need for robust datasets and the importance of feature selection and preprocessing techniques to enhance the effectiveness of DL models in the context of SDN-based IoT security. It also discusses the integration of DL with other security measures, such as encryption and access control, to provide a comprehensive defense mechanism. In summary, this review paper contributes to understanding how Artificial Intelligence (AI) can enhance the security of SDN-based IoT environments. It serves as a valuable resource for researchers and practitioners in the field of cyber security, exploring the current research, obstacles, and potential solutions for using DL to identify and mitigate cyber-attacks in SDN-based IoT settings.

Author Biographies

Yusra Sh. Ajaj, Department of Computer Engineering, College of Engineering, Al-Iraqia University, Baghdad, Iraq

Email: yusra.sh.ajaj@gmail.com

https://orcid.org/0009-0001-1544-4179

Bilal R. Al-Kaseem, Department of Communication Engineering, College of Engineering and Information Technology, AlShaab University, Baghdad, Iraq

Email: bilal.al-kaseem@alshaab.edu.iq

https://orcid.org/0000-0001-8264-6339

Yousif Al-Dunainawi, Department of Information Security Engineering, College of Engineering and Information Technology, AlShaab University, Baghdad, Iraq

Email: yousif@alshaab.edu.iq

https://orcid.org/0000-0003-1293-3345

 

References

İ. Kök, F. Y. Okay, Ö. Muyanlı and S. Özdemir, "Explainable Artificial Intelligence (XAI) for Internet of Things: A Survey," in IEEE Internet of Things Journal, vol. 10, no. 16, pp. 14764-14779, August, 2023.

S. He, K. Shi, C. Liu, B. Guo, J. Chen and Z. Shi, "Collaborative Sensing in Internet of Things: A Comprehensive Survey," in IEEE Communications Surveys & Tutorials, vol. 24, no. 3, pp. 1435-1474, Thirdquarter 2022.

S. Vashi, J. Ram, J. Modi, S. Verma and C. Prakash, "Internet of Things (IoT): A vision, architectural elements, and security issues," in 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 2017, pp. 492-496.

M. Kavre, A. Gadekar and Y. Gadhade, "Internet of Things (IoT): A Survey," in 2019 IEEE Pune Section International Conference (PuneCon), Pune, India, 2019, pp. 1-6.

K. Singh and D. S. Tomar, "Architecture, Enabling Technologies, Security and Privacy, and Applications of Internet of Things: A Survey," in 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on, Palladam, India, 2018, pp. 642-646.

A. Khanna and S. Kaur, “Internet of Things (IoT), Applications and Challenges: A Comprehensive Review,” in Wireless Personal Communications, vol. 114, no. 2., pp. 1687–1762, May, 2020.

A. Abdullah, R. Hamad, M. Abdulrahman, H. Moala, and S. Elkhediri, “CyberSecurity: A Review of Internet of Things (IoT) Security Issues, Challenges and Techniques,” in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), 2019, pp. 1–6.

M. Elbediwy, B. Pontikakis, J. -P. David and Y. Savaria, "A Hardware Architecture of a Dynamic Ranking Packet Scheduler for Programmable Network Devices," in IEEE Access, vol. 11, pp. 61422-61436, 2023.

J. Chen, Y. Wang, M. Ye and Q. Jiang, "A Secure Cloud-Edge Collaborative Fault-Tolerant Storage Scheme and Its Data Writing Optimization," in IEEE Access, vol. 11, pp. 66506-66521, 2023.

D. Javeed, T. Gao, and M. T. Khan, “SDN-Enabled Hybrid DL-Driven Framework for the Detection of Emerging Cyber Threats in IoT,” in Electronics, vol. 10, no. 8, p. 918, Apr. 2021.

H. Ahmadvand, C. Lal, H. Hemmati, M. Sookhak and M. Conti, "Privacy-Preserving and Security in SDN-Based IoT: A Survey," in IEEE Access, vol. 11, pp. 44772-44786, 2023.

V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal and B. Sikdar, "A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures," in IEEE Access, vol. 7, pp. 82721-82743, 2019.

R. W. Anwar, A. Zainal, T. Abdullah, and S. Iqbal, “Security Threats and Challenges to IoT and its Applications: A Review,” in 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), 2020, pp. 301–305.

R. A. Elsayed, R. A. Hamada, M. I. Abdalla, and S. A. Elsaid, “Securing IoT and SDN Systems Using Deep-Learning Based Automatic Intrusion Detection,” in Ain Shams Engineering Journal, vol. 14, no. 10., pp. 102211, October, 2023.

A. K. Sarica and P. Angin, “Explainable Security in SDN-Based IoT Networks,” in Sensors, vol. 20, no. 24, p. 7326, Dec. 2020.

R. I. Mukhamediev et al., “Review of Artificial Intelligence and Machine Learning Technologies: Classification, Restrictions, Opportunities and Challenges,” Mathematics, vol. 10, no. 15, p. 2552, Jul. 2022.

R. Chaganti, W. Suliman, V. Ravi, and A. Dua, “Deep Learning Approach for SDN-Enabled Intrusion Detection System in IoT Networks,” Information, vol. 14, no. 1, p. 41, Jan. 2023.

D. Javeed, T. Gao, M. T. Khan, and I. Ahmad, “A Hybrid Deep Learning-Driven SDN Enabled Mechanism for Secure Communication in Internet of Things (IoT),” Sensors, vol. 21, no. 14, p. 4884, Jul. 2021.

S. K. Dey, Md. Raihan Uddin, and Md. Mahbubur Rahman, “Performance Analysis of SDN-Based Intrusion Detection Model with Feature Selection Approach,” in Proceedings of International Joint Conference on Computational Intelligence, 2019, pp. 483–494.

T. G. Nguyen, T. V. Phan, B. T. Nguyen, C. So-In, Z. A. Baig and S. Sanguanpong, "SeArch: A Collaborative and Intelligent NIDS Architecture for SDN-Based Cloud IoT Networks," in IEEE Access, vol. 7, pp. 107678-107694, 2019.

A. O. Alzahrani and M. J. F. Alenazi, “Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks,” in Future Internet, vol. 13, no. 5, p. 111, April 2021.

T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi and M. Ghogho, "Deep learning approach for Network Intrusion Detection in Software Defined Networking," in 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), 2016, pp. 258-263.

O. Hannache and M. Batouche, “Neural Network-Based Approach for Detection and Mitigation of DDoS Attacks in SDN Environments,” in International Journal of Information Security and Privacy, vol. 14, pp. 50–71, 2020.

Y. Hande and A. Muddana, "Intrusion Detection System Using Deep Learning for Software Defined Networks (SDN)," in 2019 International Conference on Smart Systems and Inventive Technology (ICSSIT), 2019, pp. 1014-1018.

T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, M. Ghogho, and F. El Moussa, “DeepIDS: Deep Learning Approach for Intrusion Detection in Software Defined Networking,” in Electronics, vol. 9, no. 9, p. 1533, Sep. 2020.

A. Wani, R. S, and R. Khaliq, “SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL),” in CAAI Transactions on Intelligence Technology, vol. 6, no. 3, pp. 281–290, March, 2021.

J. Li, Z. Zhao, R. Li and H. Zhang, "AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks," in IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2093-2102, April, 2019.

Q. Tian, D. Han, M.-Y. Hsieh, K.-C. Li, and A. Castiglione, “A Two-Stage Intrusion Detection Approach for Software-Defined IoT Networks,” in Soft Computing, vol. 25, no. 16, pp. 10935–10951, April, 2021.

J. Ye, X. Cheng, J. Zhu, L. Feng, and L. Song, “A DDoS Attack Detection Method Based on SVM in Software Defined Network,” in Security and Communication Networks, vol. 2018, pp. 1–8, 2018.

P. Hadem, D. K. Saikia, and S. Moulik, “An SDN-Based Intrusion Detection System Using SVM with Selective Logging for IP Traceback,” in Computer Networks, vol. 191, pp. 108015, May 2021.

P. Kumar, G. P. Gupta, and R. Tripathi, “An Ensemble Learning and Fog-Cloud Architecture-Driven Cyber-Attack Detection Framework for IoMT Networks,” in Computer Communications, vol. 166, pp. 110–124, January, 2021.

K. Atefi, H. Hashim and T. Khodadadi, "A Hybrid Anomaly Classification with Deep Learning (DL) and Binary Algorithms (BA) as Optimizer in the Intrusion Detection System (IDS)," in 2020 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA), 2020, pp. 29-34.

U. Sabeel, S. S. Heydari, H. Mohanka, Y. Bendhaou, K. Elgazzar and K. El-Khatib, "Evaluation of Deep Learning in Detecting Unknown Network Attacks," in 2019 International Conference on Smart Applications, Communications and Networking (SmartNets), 2019, pp. 1-6.

D. Kshirsagar and S. Kumar, “An ensemble feature reduction method for web-attack detection,” in Journal of Discrete Mathematical Sciences and Cryptography, vol. 23, no. 1, pp. 283–291, January, 2020.

M. Said Elsayed, N.-A. Le-Khac, S. Dev, and A. D. Jurcut, “Network Anomaly Detection Using LSTM Based Autoencoder,” in Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, November, 2020, pp. 37–45.

M. S. Elsayed, H. Z. Jahromi, M. M. Nazir, and A. D. Jurcut, “The Role of CNN for Intrusion Detection Systems: An Improved CNN Learning Approach for SDNs,” in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 91–104, 2021.

Downloads

Published

2023-09-01

How to Cite

Sh. Ajaj, Y., R. Al-Kaseem, B., & Al-Dunainawi, Y. (2023). Cyber Attacks in SDN-Based IoT Environment: A Review. Al-Iraqia Journal for Scientific Engineering Research, 2(3), 74–83. https://doi.org/10.58564/IJSER.2.3.2023.89

Issue

Section

Articles