Cognitive Security in Software Define Network Layer

Authors:

R. Kavitha,N.Priya,

DOI NO:

https://doi.org/10.26782/jmcms.spl.2019.08.00009

Keywords:

SDN-Software Defined Networks,WAN,

Abstract

The need for better security is always increasing in exponential demand with the elevation of the security concerns created by the vulnerable code and software being produced. A smart, self-healing and cognitive security network is the demand of the generation. With machine learning capabilities and advanced deep learning, we explore the possibility of architecting such a network build on a SDN network. Software Defined Networking replaces the conventional way of traditional networking with an application layer giving the programming capability to the networks thus increasing the flexibility of the network in terms of adaptability. Programming machine learning capability by introducing a learning element to the SDN network. We deploy security and classification algorithm to identify and classify traffic into potential attacks and intrusion. The results show improved accuracy that can detect all possible attacks over the neural network based on our pattern recognition algorithm for intrusion detection and recognition. The network can also self-optimize itself to defend itself real-time.

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices “ Journal of Chemical and Pharmaceutical Sciences(JCPS)
Volume 9 Issue 2, April – June 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and
Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg. No. 103-S106, 2016
VIII. Priya, N. Sridhar, J. Sriram, M. “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June 2016

View | Download