ArticlePDF Available

Optimizing Network Security and Performance Through the Integration of Hybrid GAN-RNN Models in SDN-based Access Control and Traffic Engineering

Authors:

Abstract

By offering flexible and adaptable infrastructures Software-Defined Networking (SDN) has emerged as a disruptive technology that has completely changed network provisioning and administration. By seamlessly integrating Hybrid Generative Adversarial Network-Recurrent Neural Network (GAN-RNN) modeling into the foundation of SDN-based traffic engineering and accessibility control methods, this work presents a novel and comprehensive method to improve network efficiency and security. The proposed Hybrid GAN-RNN models address two important aspects of network management: traffic optimization and access control. They combine the benefits of Generative Adversarial Networks (GANs) and Recurrent Neural Networks (RNNs). Traditional traffic engineering techniques frequently find it difficult to quickly adjust to situations that are changing quickly within today's dynamic networking environments. The models' capacity to generate synthetic traffic patterns that nearly perfectly replicate the complexity of real network traffic demonstrates the power of GANs. Network administrators can now allocate resources and routing methods more dynamically, as well as in responding to real-time network inconsistencies, due to this state-of-the-art technology. The technique known as Hybrid GAN-RNN addresses the enduring problem of network security. With their reputation for continuous learning and by utilizing Python software, recurrent neural networks (RNNs) are at the forefront of developing flexible management of access rules. With an incredible 99.4% accuracy rate, the "Proposed GAN-RNN" approach outperforms the other approaches. A comprehensive evaluation of network traffic and new safety risks allow for the immediate modification of these policies. This work is interesting because it combines hybrid GAN-RNN algorithms to strengthen security protocols with adaptive access control while also optimizing network efficiency through realistic traffic modeling.
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 12, 2023
596 | P a g e
www.ijacsa.thesai.org
Optimizing Network Security and Performance
Through the Integration of Hybrid GAN-RNN
Models in SDN-based Access Control and Traffic
Engineering
Ganesh Khekare1, Dr.K.Pavan Kumar2, Kundeti Naga Prasanthi3, Dr. Sanjiv Rao Godla4,
Venubabu Rachapudi5, Dr. Mohammed Saleh Al Ansari6, Prof. Ts. Dr. Yousef A.Baker El-Ebiary7
Associate Professor, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu, India1
Sr Asst.Prof, Dept.of IT, Prasad V Potluri Siddhartha Institute of Technology, Kanuru, Vijayawada -072
Dept.of CSE, Lakireddy Balireddy College of Engineering, Mylavaram3
Professor, Department of CSE (Artificial Intelligence & Machine Learning), Aditya College of Engineering & Technology,
Surampalem, Andhra Pradesh, India4
Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram,
Guntur, Andhra Pradesh, India-5223025
Associate Professor, College of Engineering-Department of Chemical Engineering, University of Bahrain, Bahrain6
Faculty of Informatics and Computing, UniSZA University, Malaysia7
AbstractBy offering flexible and adaptable infrastructures
Software-Defined Networking (SDN) has emerged as a disruptive
technology that has completely changed network provisioning
and administration. By seamlessly integrating Hybrid Generative
Adversarial Network-Recurrent Neural Network (GAN-RNN)
modeling into the foundation of SDN-based traffic engineering
and accessibility control methods, this work presents a novel and
comprehensive method to improve network efficiency and
security. The proposed Hybrid GAN-RNN models address two
important aspects of network management: traffic optimization
and access control. They combine the benefits of Generative
Adversarial Networks (GANs) and Recurrent Neural Networks
(RNNs). Traditional traffic engineering techniques frequently
find it difficult to quickly adjust to situations that are changing
quickly within today's dynamic networking environments. The
models' capacity to generate synthetic traffic patterns that nearly
perfectly replicate the complexity of real network traffic
demonstrates the power of GANs. Network administrators can
now allocate resources and routing methods more dynamically,
as well as in responding to real-time network inconsistencies, due
to this state-of-the-art technology. The technique known as
Hybrid GAN-RNN addresses the enduring problem of network
security. With their reputation for continuous learning and by
utilizing Python software, recurrent neural networks (RNNs) are
at the forefront of developing flexible management of access
rules. With an incredible 99.4% accuracy rate, the "Proposed
GAN-RNN" approach outperforms the other approaches. A
comprehensive evaluation of network traffic and new safety risks
allow for the immediate modification of these policies. This work
is interesting because it combines hybrid GAN-RNN algorithms
to strengthen security protocols with adaptive access control
while also optimizing network efficiency through realistic traffic
modeling.
KeywordsSoftware-defined networking; generative
adversarial networks; recurrent neural networks; traffic
engineering
I. INTRODUCTION
Network performance directly impacts the efficiency of
operations within an organization. Faster data transfer and
lower latency lead to increased productivity, reduced
downtime, and better user experiences, all of which are critical
in today's fast-paced digital world [1]. Slow or unreliable
networks result in poor user experiences. This can frustrate
customers, employees, and partners, leading to dissatisfaction
and potentially driving them away. Ensuring a high-
performing network enhances user satisfaction and loyalty. In
an era where data is a valuable asset, efficient network
performance is crucial for transferring large volumes of data
quickly and securely [2]. This is especially important for
industries like healthcare, finance, and media, where sensitive
information needs to be transmitted reliably. Cyber security
threats are on the rise, and networks are prime targets for
attacks. A secure network helps protect sensitive data,
prevents unauthorized access, and mitigates risks associated
with data breaches, which can have severe legal, financial, and
reputational consequences. Many industries and organizations
must adhere to strict regulatory compliance standards
regarding data security and privacy. Maintaining a secure
network is essential to meeting these requirements and
avoiding legal penalties. A well-optimized network ensures
that network resources, such as bandwidth and hardware, are
used efficiently. This reduces costs associated with network
maintenance and upgrades while maximizing resource
availability [3]. Network failures or security breaches can
disrupt business operations, leading to downtime and financial
losses. Ensuring network resilience and security is crucial for
business continuity and disaster recovery planning. As
businesses grow, their network needs often grow too. A well-
optimized network can scale to accommodate increased
traffic, new devices, and expanding operations without
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 12, 2023
597 | P a g e
www.ijacsa.thesai.org
sacrificing performance or security. Organizations with high-
performing, secure networks can gain a competitive advantage
[4]. They can offer faster services, better customer
experiences, and innovative solutions that competitors with
subpar networks may struggle to match. Improved network
performance and security enable the adoption of advanced
technologies like IoT (Internet of Things), cloud computing,
and AI, which can drive innovation and digital transformation
within an organization. Innovative solutions are required due
to the constantly changing network infrastructure landscape in
order to improve security and performance. SDN, or software-
defined networking, has become a game-changing network
management technology that gives network administrators the
freedom to customize access control and traffic engineering
[5]. In order to enhance network performance and security in
SDN settings, this study investigates a unique method that
combines hybrid generative adversarial networks (GANs) with
recurrent neural networks (RNNs). The project intends to
address important issues in traffic engineering and access
control by smoothly integrating these cutting-edge machine
learning approaches, leading to ultimately more effective and
secure network operations [6]. The article digs into the
principles of Software-Defined Networking (SDN) and
discusses how it applies to contemporary network architecture.
It gives an overview of how SDN can provide centralized
network administration and dynamic traffic engineering by
separating the control and data planes. As a prelude to the
suggested remedy, the section also illustrates the difficulties in
optimizing traffic flows in SDN settings [7].
The use of techniques based on machine learning has a lot
of potential to enhance network performance in several ways.
ML algorithms have the capacity to analyses network data,
adjust to changing circumstances, and make choices in real
time, which can improve network operations' efficiency,
dependability, and security. ML models can spot unusual
network activity that may indicate security risks or
performance problems. Network assaults may be swiftly
detected and responded to by intrusion detection systems
(IDS) and intrusion prevention systems (IPS) driven by ML,
improving security while minimizing service interruption [8].
Applications will perform better and use resources more
effectively as a result of getting the resources they require
when they need them. To maintain equitable server utilization,
ML models may track server load and distribute requests that
arrive around servers. Based on past data and user behavior,
ML may help forecast future network requirements [9]. This
can assist network administrators in making plans for
infrastructure or capacity modifications so that the network is
ready to meet growing demand. For instance, during periods
of high demand, they might give priority to particular sorts of
traffic. GANs use a loss function that guides the training
process. The generator's loss depends on how well the
discriminator is fooled, while the discriminator's loss is based
on its ability to distinguish real from fake data. The training
aim to find a balance where the generator generates highly
convincing data and the discriminator becomes uncertain
about its classifications. Access control in the context of SDN
is covered in the second part. It explains the idea of dynamic
access control lists and discusses the significance of access
control for network security [10]. It examines the difficulties
with access control in SDN, highlighting the requirement for
more sophisticated and flexible security mechanisms.
The merging of Hybrid GANs and RNNs, the research's
main novelty, is presented in the publication. It describes how
RNNs may examine this data to find patterns and
abnormalities using synthetic network traffic data produced by
GANs. This hybrid strategy tries to simultaneously improve
network security and performance. The practical use of the
hybrid GAN-RNN models for traffic engineering is covered in
this section. It offers information on how dynamic network
traffic flow optimization may be accomplished using synthetic
traffic data produced by GANs. The advantages of this
strategy are explored in terms of decreased congestion,
enhanced Quality of Service (QoS), and effective resource
utilization. The research examines the use of hybrid GAN-
RNN models in SDN access control. It explains how RNNs
may inspect network traffic data for irregularities and security
risks. The flexibility of this strategy to changing security
threats is discussed, as is how it enhances access control by
dynamically updating access lists in response to threat
detection in real time. The article covers the overall effects of
incorporating Hybrid GAN-RNN models into SDN settings,
highlighting the enhancements to network security and
performance. It also describes possible future avenues for
study and application in the area of SDN-based traffic
engineering and access management. The current limitation of
these investigations is the lack of focus on scalability and real-
world implementation, which makes it difficult to actually
apply suggested security solutions in intricate network
systems. Furthermore, there isn't much talk about possible
interoperability issues, resource limitations, and how well
these solutions may change to meet new threats in the
cyberspace. A more thorough examination of these factors
might improve the research findings' relevance and efficacy in
real-world contexts.
Key contributions of the research include:
Using traffic trends produced by GANs, SDN
controllers can optimize the allocation of network
resources, reducing latency and enhancing QoS.RNN-
based authorization rules continuously identify trends
in network activity, minimising potential
vulnerabilities and adapting to new threats.
By automating both access control and traffic design,
the method lessens the operational load on the
network's management and promotes more effective
resource utilization.
Assessing the efficacy of the hybrid GAN-RNN
models in SDN scenarios through multiple simulations
and real-world experiments. The results show notable
gains in network security and effectiveness,
highlighting the approach's potential for contemporary
network management.
This study offers a ground-breaking framework for
utilizing the powers of hybrid GAN-RNN models to
optimize software-defined networking. The next phase
of network administration is anticipated with the
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 12, 2023
598 | P a g e
www.ijacsa.thesai.org
integration of flexible access controls and realistic
traffic generation.
The Section I provides an overview of the paper. The
Section II reviews existing literature and emphasizes the gap
in addressing techniques for network security enhancement.
Section III defines the central research problem concerning
driver drowsiness detection complexities. Section IV outlines
data collection, preprocessing, feature extraction, and the
integration of Hybrid GAN-RNN. Section V presents
empirical findings, compares classifier performance, and
explores implications and future research directions is in
Section VI, which is solidifying the research's significance in
Network security.
II. RELATED WORKS
Ramprasath and Seethalakshmi [11] examines a crucial
element of SDN, focusing on the requirement for improved
security controls in SDN systems. By separating the
information plane from the control plane, SDN enables on-
demand services and the ability to configure networks
dynamically. The study correctly highlights the fact that,
despite the fact that SDN controls traffic flows and flow labels
based on Open Flow virtual switches successfully, it lacks
built-in security safeguards to combat malicious traffic, such
as Denial-of-Service (DoS) assaults, which can significantly
lower service availability. It is laudable that the paper's main
emphasis is on identifying and reducing DoS threats by
dynamically setting firewalls within SDN setups. The study
makes an effort to close this security gap by using dynamic
access control lists. This study's noteworthy feature is the use
of Mininet to simulate SDN with dynamic access control list
attributes. This enables real-world testing and
experimentation. The practical relevance of the findings is
given more weight by this empirical confirmation. The work
would benefit from a more thorough examination of the exact
methods and tools employed for DoS attack detection and
mitigation inside the SDN environment to further strengthen
its contribution. Readers would have a better grasp of the
suggested strategy if more information was provided about the
dynamic access control list implementation and the standards
for differentiating malicious from normal traffic. In order to
reduce DoS attacks, the article tackles a critical security issue
in SDN systems and offers a potential solution using dynamic
access control lists. The research offers important insights
towards strengthening the security of SDN systems by fusing
theoretical understanding with real-world testing. The study
would be even more helpful and effective if it elaborated on
the technical specifics of the suggested strategy.
Vimal et al. [12] provides a fascinating and current
investigation into how integrating Internet of Things (IoT)
devices might improve the security of Software-Defined
Networks (SDN), with an emphasis on boosting information
access control using encryption. The research's emphasis on
creating a strong infrastructure for IoT devices is well-placed
given the quick spread of IoT devices. The notion of a stability
routing protocol, which evaluates the reliability of devices and
packet flows, is introduced in this work. To create dependable
SDN routes, this method makes use of the mutual trust
between network components, Quality of Service (QoS), and
energy circumstances. An important advancement is the
incorporation of SDN architecture into the Cognitive Protocol
Network (CPN) technology platform to improve energy
efficiency. A novel strategy for tackling security issues is the
use of stochastic neural networks (SNNs) for decentralized
decision-making based on data gleaned from perceptual
packets. It is a praiseworthy effort to include these
components into SerIoT approaches to provide IoT encryption
for information access control. The implementation of various
techniques and technologies, particularly the precise
approaches utilized for IoT encryption and access control,
might need more explicit explanations in the study. The
complexity of the study would also be increased by providing
more detail on how the suggested network infrastructure
solves issues like erratic connectivity, constrained
cryptographic capacity, and energy restrictions. The study
emphasizes the significance of tackling cluster instability for
platform efficiency as well as the necessity of collaboration. A
deeper grasp of the research's practical relevance might be
provided by providing additional information on the
difficulties and potential solutions linked to these issues.
Shin et al. [13] addresses the potential of Software-
Defined Networking to improve network security as it goes
into a crucial and modern junction of technology. Because it
can separate control logic from conventional network
hardware, SDN has attracted a lot of interest as a
transformational technology that can improve network
administration and innovation. The authors note that despite
its capabilities, SDN is still largely disregarded by the security
community, highlighting the underutilized potential of SDN in
the area of network security. The article presents a thorough
overview of the prospects offered by this technology by
meticulously evaluating how the distinctive features and
capabilities of SDN may strengthen network security and the
larger information security process. This in-depth analysis of
SDN's potential to advance network security research creates
fresh directions for future study in this crucial area. The article
does a good job of outlining the main ideas and goals, but it
might make a bigger impact if it went into more detail with
examples or case studies of how SDN has been used to
successfully handle security issues. Giving readers specific
examples of how SDN is used to enhance network security
can help readers understand the real-world applications of the
technology and may encourage more research projects. The
report effectively discusses the important role that SDN may
play in strengthening network security and sheds light on an
exciting yet underappreciated field of study. It is a useful tool
for academics and professionals who want to strengthen
network security in the context of a changing technological
environment by utilizing SDN's capabilities. Extending on
actual use cases and useful implementations might increase
the paper's impact and usefulness.
Ahmad et al. [14] focuses on the use of machine learning
(ML) approaches to thwart Denial of Service (DoS) and
Distributed DoS (DDoS) attacks inside the SDN framework. It
provides a timely analysis of the essential confluence between
Software Defined Networking (SDN) and security. With its
logically centralized control plane, SDN offers enhanced
network administration as a viable response to a number of
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 12, 2023
599 | P a g e
www.ijacsa.thesai.org
issues in conventional networks. But because of the security
flaws introduced by this centralization, SDN control systems
are becoming tempting targets for malicious attacks. Given
ML's shown efficacy in finding security vulnerabilities, the
paper made a sound decision to use ML approaches for
recognizing and mitigating DoS and DDoS attacks. It is a
useful addition to test these ML approaches in practice in an
SDN system, especially by subjecting the SDN controller to
DDoS attacks. It offers useful perceptions on the applicability
and constraints of ML-based security methods for upcoming
communication networks. The work may benefit from a more
in-depth examination of the various ML approaches used and
the standards for judging their efficacy. Readers would
comprehend the use of ML models or algorithms to SDN
security more clearly if examples or case studies of these
applications were given. This article discusses security flaws
resulting from centralized control, a serious issue in the SDN
space. The work offers a significant addition to the area by
outlining and assessing ML strategies to defend against DoS
and DDoS assaults within SDN. It highlights the value of ML-
based solutions in securing upcoming communication
networks and provides a viable path for boosting network
security. The paper's usefulness and effect would be increased
with additional clarification of the ML approaches employed.
Pérez-Díaz et al. [15] provides a significant and pertinent
addition to the continuing problem of LR-DDoS attack
mitigation in the context of Software-Defined Networks
(SDN). Due to the notoriously difficult-to-detect nature of LR-
DDoS assaults and the potential harm they pose in SDN
environments, a flexible modular architecture for their
detection and mitigation has been developed. The study
utilizes Machine Learning models such as J48, Random Tree,
REP Tree, Random Forest, Multi-Layer Perceptron and
Support Vector Machines to train an Intrusion Detection
System (IDS). Despite the inherent difficulties presented by
LR-DDoS assaults, the assessment of these ML models using
the Canadian Institute of Cyber security (CIC) DoS dataset
showed a remarkable detection rate of 95%. One of the key
advantages of this study is the practical implementation of the
open network operating system (ONOS) controller within a
Mini-net virtual machine, which tries to faithfully imitate real
production network circumstances. This strategy strengthens
the paper's credibility and explains how it may be used in real-
world network security settings. The article also emphasizes
that the intrusion prevention detection system successfully
mitigates all assaults identified by the IDS, highlighting the
usefulness of the suggested architecture in LR-DDoS attack
detection and mitigation. This study presents a novel approach
that combines ML approaches with a flexible modular
architecture to solve the ongoing problem of LR-DDoS
assaults in SDN systems. Its potential as a formidable tool for
network security is highlighted by its easy deployment and
remarkable detection results. The impact of the work would be
increased and new insights would be provided for security
practitioners and academics with a more thorough
investigation of the difficulties and model choices.
Latif et al. [16] discusses security, a key concern in the
context of the Industrial Internet of Things environment.
Smart cities, agriculture, and healthcare are just a few areas
where IIoT is crucial due to its integration of sensors, devices,
and databases. This study acknowledges the distinct security
risks that the IIoT presents as a result of its integration into
more complex operational systems. In this research, a unique
method for anticipating and detecting several cybersecurity
attacksincluding denial of service, malicious operation,
malicious control, data type probing, espionage, scan, and
incorrect setupthat are frequently seen in IIoT contexts is
presented. It undertakes a comparison analysis with
conventional machine learning methods including artificial
neural networks, support vector machines, and decision trees,
and proposes a lightweight random neural network (RaNN) as
the foundation for its prediction model. The study's main
conclusions show that the suggested RaNN-based model
performs admirably, with accuracy rates of 99.20%, precision,
recall, and the F1 score all above 99%. The model also has
short prediction duration of 34.51 milliseconds. These
findings show how well the RaNN model predicts and
recognises IIoT cybersecurity threats. The work makes an
important addition to the area since it tackles the urgent
demand for reliable security solutions in IIoT. It is an
intriguing option for boosting IIoT security since it uses a
lightweight RaNN model and performs better than
conventional approaches.
The claimed accuracy gains of 5.65% for IoT security over
cutting-edge machine learning algorithms is notable and
demonstrates the practical applicability of this study.
Nevertheless, when using this approach in complex IIoT
contexts, it's critical to take into account potential limits, such
as the range and variety of attack scenarios, and scalability,
including real-world deployment issues. Despite this, the
article offers a useful framework for more study and
advancement in the field of IIoT security, including the
potential for real-world use in securing vital industrial
systems. While the previously discussed works provide
important insights into various aspects of protecting SDN and
addressing cybersecurity concerns within the IIoT framework,
a common shortcoming of these studies is the lack of
comprehensive real-world implementation and evaluation.
Although some studies employ simulation techniques, little is
known regarding whether the proposed solutions can be scaled
and applied in complex, real-world large-scale network
environments. A more thorough analysis of the potential
challenges and setbacks that came across throughout the
development of their safety processes, such as issues with
interoperability, resource constraints, and adaptability to
evolving attack strategies, would also greatly increase the
study's practical significance and utility.
III. PROBLEM STATEMENT
Although SDN presents the possibility of dynamic and
adaptable network management, efficiency optimization and
security remain major obstacles. Lack of integrated security
measures to thwart malicious traffic, particularly Denial-of-
Service (DoS) attacks, is one of the major problems that can
seriously impair service availability. Many times, existing
SDN solutions are unable to adequately handle these security
issues. As such, the development of a comprehensive strategy
that enhances security protocols while simultaneously
optimizing network performance is imperative. The purpose of
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 12, 2023
600 | P a g e
www.ijacsa.thesai.org
this research is to determine how well a hybrid GAN-RNN
approach, which sets firewalls dynamically using dynamic
access control lists, can handle this dual challenge.
Furthermore, it aims to provide a new solution that improves
network safety and efficiency in SDN environments.
The ability of the proposed Hybrid GAN-RNN method to
focus on both security concerns and network efficiency
optimizing in SDN systems is what makes it effective. By
using Generative Adversarial Networks (GANs) to simulate
feasible traffic patterns and Recurrent Neural Networks
(RNNs) for adaptable controls on access, this method offers a
multidimensional solution. GANs can be used to model
various traffic scenarios, and RNNs can be used to flexibly set
access control rules based on real-time threat detection to
achieve optimal network designs. This hybrid paradigm
effectively adapts to changing network conditions and security
threats, significantly enhancing the overall resilience of SDN
systems. Moreover, employing the Mini net for real-world
assessment boosts the practical value of the results and
increases the possibility of their successful implementation in
operational networks. More information about the specific
methods and tools employed for DoS attack detection and
avoidance in an SDN environment is required in order to
improve the strategy's effectiveness.
IV. PROPOSED HYBRID GAN-RNN FOR NETWORK
SECURITY
The proposed methodology represented in Fig. 1 starts
with the collection of network traffic data, which is then
meticulously pre-processed to cleanse, format, and extract
relevant features. A tailored Generative Adversarial Network
(GAN) architecture is crafted to generate synthetic traffic
patterns that closely resemble real network data. These
synthetic patterns are crucial for enhancing security analysis.
Simultaneously, a Recurrent Neural Network (RNN) is
employed to predict network attacks based on the generated
traffic patterns. The RNN learns to recognize temporal
patterns and anomalies in the data, aiding in the proactive
identification of potential security threats. Following the
hybrid GAN-RNN approach, the system's performance is
thoroughly analyzed, assessing its ability to generate realistic
traffic and predict attacks accurately. Additionally, a
comparative evaluation is conducted to benchmark the
proposed methodology against existing approaches, providing
insights into its effectiveness in bolstering network security.
A. Data Collection
The CICIDS2017 dataset provides a valuable resource for
improving network performance and security through the
utilization of Hybrid GAN-RNN models within Software-
Defined Networking (SDN) environments. This dataset
incorporates both benign network traffic and a wide range of
common attacks, making it a suitable foundation for our
research and development in the field of networks security and
optimization. The CICIDS2017 dataset offers a
comprehensive view of network traffic, encompassing benign
background traffic and real-world attack scenarios. The
dataset is constructed with meticulous attention to realism,
featuring the following key components: Generated using the
B-Profile system, the dataset simulates the naturalistic
behaviors of 25 users engaging in various protocols such as
email, HTTP, FTP, HTTPS, and SSH. This component
mimics real-world user interactions, contributing to the
authenticity of the dataset. The dataset represents a complete
network infrastructure, including components like Modem,
Firewall, Switches, Routers, and a diverse array of operating
systems (e.g., Ubuntu, Windows, and Mac OS X). This
realistic topology ensures that the dataset mirrors complex
network environments. The CICIDS2017 dataset incorporates
real attacks from the Attack-Network, enabling researchers to
analyze and develop security measures against a wide range of
threats. This includes the most up-to-date common attacks,
adding relevance to the research context [17].
B. Data Pre-processing using Handling Missing Values
The time series dataset representing network-wide traffic
states, which is denoted as. This dataset encompasses
observations collected over time, each of which corresponds
to a specific time step. The dimensionality of the dataset is
determined by the amount of sensor stations in the network,
denoted as. Mathematical representation of this time series
dataset as follows in Eq. (1):
 󰇝 󰢹󰇞 (1)
Fig. 1. Proposed workflow.
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 12, 2023
601 | P a g e
www.ijacsa.thesai.org
Signifies the total number of time steps in our dataset.
signifies the number of sensor stations distributed across the
network. Each vector󰣐, associated with time step, belongs to
the real numbers󰢩. This vector encapsulates the traffic state
information of the sensor stations at that specific time [18].
Within this vector, each element
corresponds to the
traffic speed observed at the d-th sensor station. This research
discusses "traffic state," It specifically focuses on traffic
speed. This definition aligns with the characteristics of the
datasets we employ, particularly those used in our
experimental section. Traffic sensors, such as inductive
looping detector, may encounter failures due to various
reasons, including wire insulations breakdown, damage from
building activities, or electronic unit failures. These sensors
failures result in missing values within our collected data. To
address the issue of missing values, Research employs a
masking vector, which is binary and takes values from the
set {0, 1}, to indicate whether traffic states are missing at a
specific time step t. The masking vectors for  is defined as
follows in Eq. (2):


 (2)
Consequently, for a given traffic state data sample
in, derivation of a corresponding masking data sample
M, is represented in Eq. (3):
 󰇝 󰢹󰇞 󰢹 (3)
The traffic state prediction problem revolves around the
objective of learning a function󰇛󰇜. This function is designed
to map T historical traffic state datas observations to the
subsequent traffic state data at the next time step. This
problem can be formally described as in Eq. (4):
󰇛󰇟󰢹󰇠󰇟󰢹󰇠󰇜󰇟󰇠
(4)
where, aims to predict the traffic state at time step
depend on the historical traffic state data up to time step,
taking into account the masking information to handle missing
values.
C. Hybrid GAN-RNN Architecture for Generating Traffic
Patterns and Access Control
The Hybrid GAN-RNN architecture is designed to
enhance network security by generating realistic network
traffic patterns and making access control decisions based on
those patterns. This architecture comprises two main
components: a Generative Adversarial Network (GAN) for
traffic pattern generation and a Recurrent Neural Network
(RNN) for access control. The hybrid GAN-RNN architecture
is shown in Fig. 2. In the GAN component, the generator (G)
takes random noise (z) as input and generates synthetic traffic
patterns (X_synthetic). The discriminator (D) then evaluates
these synthetic patterns and real traffic patterns (X_real),
aiming to distinguish between them. The objective is to train
the generator to produce traffic patterns that are
indistinguishable from real ones, while the discriminator
becomes more adept at differentiating real from synthetic
patterns. This adversarial training process is guided by a GAN
loss function that encourages the generator to improve its
pattern generation capabilities. The discriminator's formal
objective is to acquire characteristics that maximize the
likelihood of properly categorizing both training and produced
data; the generator's objective is to discover settings  that
minimize  󰇛󰇛󰇜󰇜 the following two-player
minimax game with value functions 󰇛󰇜is therefore
played by the two neural networks.
󰇛󰇜 󰇝󰇟󰇛󰇜󰇠 󰇟󰇛
󰇛󰇛󰇜󰇜󰇜󰇠󰇞 (5)
where, G(z) is the created false data provided by the noise
vector z, D(G(z)) is the estimated chance of a fake instance
being honest, and D(x) is the estimated likelihood of an actual
model being real generated by the discriminating neural
networks. The generator theoretically learns to produce
genuine samples when it reaches equilibrium.
Fig. 2. Hybrid GAN-RNN architecture.
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 12, 2023
602 | P a g e
www.ijacsa.thesai.org
Algorithm 1: Hybrid GAN-RNN Algorithm for Network Security Enhancement
Input: Network Traffic data
Output: Predicting the attack in Network traffic data
Load input data
 󰇝  󰢹󰇞
// data acquisition
Preprocess network traffic data
Cleanse and Handling missing traffic data’s, and normalize.
//handling missing values
Split the data into training and testing sets.
Generation of Traffic Patterns
// GAN Training
Initialize the GAN model with a generator (G) and discriminator (D).
Train the GAN by iteratively optimizing G and D
Generate synthetic traffic patterns using G
Calculate the GAN loss based on D's ability to distinguish real from synthetic patterns.
Back propagate the loss and update the G and D weights.
Repeat until convergence or a predefined number of epochs
Attack Prediction
//RNN Training
Initialize the RNN model for attack prediction.
Define the RNN architecture, loss function, and optimizer.
Train the RNN using the generated synthetic traffic patterns
Input the synthetic traffic data sequence to the RNN
Calculate the loss based on the predicted attacks and actual labels (ground truth).
Back propagate the loss and update the RNN weights
Repeat until convergence or a predefined number of epochs
Prediction of Attack in Network
//RNN
Evaluate the hybrid GAN-RNN system's performance using testing data
//Performance Evaluation
Measure the accuracy of attack predictions
Calculate other relevant metrics such as precision, recall, and F1-score
Assess the quality of generated traffic patterns
The RNN component processes the generated traffic
patterns (X_synthetic) and performs access control. For this
purpose, the RNN can employ a LSTM architecture, which
allows it to consider temporal dependencies in the traffic data.
The RNN's internal state (ht) evolves as it processes the traffic
patterns, and at each time step, it produces access control
decisions (yt) through a Softmax layer. These decisions can
take various forms, such as binary access control (allows or
deny) or multiclass access policies based on the traffic content
and context.
The key innovation of this architecture lies in its
combination of GAN and RNN components. The GAN
generates synthetic traffic patterns that are realistic and
diverse, reflecting various network activities. The RNN, in
turn, leverages these patterns to make access control decisions
in real-time. This approach enables a more dynamic and
adaptable access control system that can respond effectively to
evolving network conditions and potential security threats.
During training, the entire hybrid architecture is optimized
through a joint loss function that balances the GAN loss and
the access control loss. This ensures that the generated traffic
patterns are not only realistic but also suitable for access
control decision making. The RNN's parameters are fine-tuned
to make accurate access control decisions based on the
generated patterns, thereby enhancing network security.
V. RESULTS AND DISCUSSION
The result section provides a comprehensive evaluation of
the proposed network security enhancement method,
employing various evaluation metrics such as accuracy,
precision, recall, and F1-score. The analysis begins with a
comparison of the method's accuracy on different datasets,
highlighting the notably high accuracy of the "Proposed GAN-
RNN" approach on the CICIDS2017 dataset. A comparative
assessment with existing methods further underscores the
method's superiority, showcasing exceptional precision, recall,
and F1-score. Graphs depict the performance trends,
demonstrating the model's convergence and its ability to
generalize to unseen information. The training and testing
graphs illustrate the model's progression, while the loss graph
reveals its capacity to avoid overfitting. The results validate
the effectiveness of the proposed methods in network intrusion
detection, emphasizing its potential to enhance network
security with impressive accuracy and robustness. The
practical usefulness of the Hybrid GAN-RNN technique
extends to dynamic business networks, allowing for adaptive
routing and resource allocation. Its 99.4% accuracy in
cybersecurity guarantees quick access policy changes, which
are essential for sectors like banking and healthcare and
improve overall network security and efficiency.
A. Evaluation Metrics
Four assessment measures were used in the study to
evaluate the designs: F1-score, accuracy, precision, and recall.
Such specific variables are described as in Eq. (6), (7), (8) and
(9):
 
 (6)
 
 (7)
 
 (8)
 
 (9)
TP is the number of information that, irrespective of every
one of the types of information which was genuinely positive,
was precisely identified as positive. TN is the number of
information that, irrespective of all the results which was truly
negative, were properly identified as negatives. The number of
variables that the equation incorrectly categorized as negative
despite the fact they had been positive in the input data is
represented by the letter FN. The number of values that the
algorithm incorrectly categorized as positive when they had
been negative in the source data is known as false positives, or
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 12, 2023
603 | P a g e
www.ijacsa.thesai.org
FP. The percentage of the number of information that the
algorithm identified as being positive to the number of
positive results that were really present in the collection of
data is known as recall. Precision can be defined as the
proportion of the entire amount of information that the model
properly identified as positive to the number of data which the
algorithm categorized as positive. Lastly, as mentioned in, the
F1-score represents the harmonious average of recall and
precision Top of Form [19].
This Table I present the performance results of different
intrusion detection methods on these datasets, with the
"Proposed GAN-RNN" method achieving notably high
accuracy on the CICIDS2017 dataset at 99.4%. It's important
to note that the choice of dataset and the specific evaluation
metrics used can significantly impact the reported accuracy,
and the effectiveness of a method may vary depending on the
dataset's characteristics and the complexity of the network
security task.
The graph in Fig. 3 depicts, the methods consistently
outperform others across multiple datasets and which ones
may excel in specific contexts. This comparison aids in the
selection of the most robust intrusion detection method for
diverse network security environments, contributing to
informed decision-making in network security strategy.
Table II presents a comparative overview of different
methods applied to network intrusion detection, showcasing
their performance across multiple evaluation metrics. It
includes the methods GRU, CNN, B-GRU, and the "Proposed
GAN-RNN." the "Proposed GAN-RNN" method exhibits
exceptional accuracy, achieving an impressive 99.4%,
surpassing the other methods in the accuracy metric.
Furthermore, it excels in precision with a score of 99.25%,
ensuring a high proportion of correctly classified positive
predictions. It demonstrates remarkable recall at 99.6%,
effectively capturing a significant portion of actual positive
instances. The F1-score, a balanced measure of precision and
recall, remains strong at 99.4%, further affirming the method's
robustness in network intrusion detection, making it a highly
promising approach for bolstering network security.
The Graph represents in Fig. 4 shows the performance
comparison of different intrusion detection methods on
various metrics, including accuracy, precision, recall, and F1-
score.
Fig. 5 represents the training and testing graph for the
proposed network security enhancement method illustrates the
model's performance throughout the training process. During
the training phase, the metrics are plotted as they evolve with
each epoch, showing how the model learns and improves its
performance over time. The testing phase is also depicted on
the same graph, showcasing how the model generalizes to
unseen data. This graph provides a clear visualization of the
model's convergence and its ability to avoid overfitting or
underfitting, thus assisting in the evaluation and refinement of
our network security enhancement approach. The testing
accuracy attained is 99.4%.
Fig. 6 represents the training and testing loss graph is a
graphical representation that illustrates the changes in the loss
function values of a machine learning or deep learning model
during both the training and testing phases. The testing loss
curve reveals the model generalizes to unseen data, and
ideally, it should exhibit a similar decreasing trend, indicating
that the model is not overfitting.
TABLE I. ACCURACY COMPARISON OF DATASET
Dataset
Methods
Accuracy
KDD99 [20]
DT
92.3
UNSW-NB15 [20]
LR
85.56
CICIDS2017
Proposed GAN-RNN
99.4
TABLE II. PERFORMANCE COMPARISON WITH EXISTING METHODS
Methods
Accuracy
Recall
F1-score
GRU [21]
99
99
99
CNN [21]
97.7
98.2
99
B-GRU [21]
98.74
99
99
Proposed GAN-RNN
99.4
99.6
99.4
Fig. 3. Dataset comparison.
75 80 85 90 95 100 105
DT
LR
Proposed GAN-RNN
KDD99 UNSW-
NB15 CICIDS
2017
Percentages
Accuracy
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 12, 2023
604 | P a g e
www.ijacsa.thesai.org
Fig. 4. Evaluation of performance with existing approaches.
Fig. 5. Training and testing accuracy.
Fig. 6. Training and testing loss.
The Fig. 7 displays a Generative Adversarial Network with
Recurrent Neural Network (GAN-RNN) model's Receiver
Operating Characteristic (ROC) curve. The model's ability to
distinguish between classes, especially in issues with binary
classification, is represented graphically by the ROC curve.
The true positive rate (sensitivity) during each threshold,
which ranges from 0 to 0.7, is paired with a corresponding
threshold value in the table. The true positive rate tends to rise
in tandem with the threshold, suggesting that the model is
becoming more accurate at identifying positive instances. The
true positive rate increases gradually from 0.07 to 0.994 to be
the threshold increases, indicating that the GAN-RNN model
has high discriminatory power. This indicates that the model
performs well in classifying positive instances, demonstrating
its efficacy in achieving high sensitivity across a range of
threshold values.
Fig. 7. ROC of GAN-RNN model.
B. Discussion
The accuracy of several methods for identifying intrusions
on a range of datasets is assessed at the outset of the findings
section. The efficiency results for the three different
datasetsKDD99, UNSW-NB15, and CICIDS2017are
shown in Table I. On the CICIDS2017 dataset, the "Proposed
GAN-RNN" approach notably obtains a very high accuracy
value of 99.4%. This extraordinary accuracy demonstrates
how well the approach works in a specific dataset to recognize
network security problems. However, given that network data
can differ greatly in complexity and feature sets, it is
imperative to recognize that the selection of dataset is a
critical factor in deciding accuracy. As a tool for comparing
datasets, the chart in Fig. 3 shows how the techniques
96
96.5
97
97.5
98
98.5
99
99.5
100
Accuracy Precision Recall F1-score
Percentages
Performance Comparison
GRU
CNN
B-GRU
Proposed GAN-RNN
0
0.2
0.4
0.6
0.8
1
1.2
020 40 60 80 100
Accuracy
Epoch
Train-Test Accuracy
Train
Test
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
010 20 30 40 50
loss
Epoch
Train-Test Loss
Train
Test
0
0.2
0.4
0.6
0.8
1
0 0.2 0.4 0.6 0.8
FPR
TPR
ROC of GAN-RNN Model
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 12, 2023
605 | P a g e
www.ijacsa.thesai.org
continually perform better than others on a variety of datasets.
It makes it possible to pinpoint the approaches that work best
in certain situations. The comparison is essential because it
helps choose the most reliable intrusion detection technique
for various network security scenarios. The graph presents the
overall efficacy of the "Proposed GAN-RNN" approach,
indicating a potential option for improving network security
on a variety of datasets.
Table II provides an extensive comparative analysis of
various intrusion detection techniques, such as GRU, CNN, B-
GRU, and the "Proposed GAN-RNN." The "Proposed GAN-
RNN" approach performs exceptionally well according to a
number of evaluation parameters. It is noteworthy for
achieving a 99.4% accuracy rate, which is higher than the
other approaches. The technique also performs exceptionally
well in terms of precision (99.25%), guaranteeing a large
percentage of accurately identified positive predictions.
Furthermore, it exhibits exceptional memory (99.6%),
successfully catching a substantial proportion of true positive
cases. At 99.4%, the F1-scorea measure that strikes a
compromise between recall and precisionremains robust.
All of these findings support the "Proposed GAN-RNN"
approach's robustness and dependability in detecting network
intrusions. Because of its exceptional performance, the
approach offers both accuracy and precision in spotting
security issues, making it a very viable alternative to
strengthen network security. The suggested network security
enhancement approach is thoroughly evaluated in the results
section, which highlights its remarkable accuracy, precision,
recall, and F1-score. It demonstrates how the approach can
continuously beat other approaches on various datasets, which
makes it a strong option for secure network application. These
results provide insightful information that may be used to
make well-informed decisions about network security
planning and technological implementation. The access
control as well as traffic engineering systems that are now
dependent on network security may not be scalable, may have
trouble adapting to changing threats in real-time, and may find
it difficult to properly handle growing cyber threats [8].
VI. CONCLUSION AND FUTURE WORK
In the framework of SDN-based traffic management and
access control, hybrid GAN-RNN models were proposed and
their efficacy was shown in the present investigation. The
results obtained suggest that this novel technique holds
significant potential for improving software-defined network
security and performance. The Hybrid GAN-RNN design has
demonstrated notable gains in network effectiveness and
threat reduction through the creation of realistic patterns of
traffic and accurate access control choices. In today's intricate
and constantly evolving network systems, the capacity to
detect abnormalities, adjust to changing conditions, and
optimize traffic flows is an essential skill. The suggested
technique's high recall, accuracy, and precision highlight its
potential as a vital resource for network managers and security
experts. This strategy has the ability to enable enterprises to
strengthen their safety posture, maximize resource efficiency,
and handle their networks more effectively as the network
environment changes. Through the integration of Hybrid
GAN-RNN models within SDN, this study considerably
improves knowledge while improving the efficiency and
security of networks. Results validate hypotheses and lay the
groundwork for more investigation into adaptive access
management and optimizing traffic in dynamic contexts in the
future.
Provide means by which access control policies can be
automatically modified in response to threat assessments and
network conditions in real time, enabling more flexible and
responsive security. Instead of depending only on historical
data, investigate real-time analysis abilities that allow the
system to identify and address security threats and operational
issues as they arise. To convert created traffic trends into
useful network configurations and rules, tighten the
connection with SDN controllers. In multi-domain or mixed-
cloud situations, when network intricacy and safety issues are
heightened, expand the Hybrid GAN-RNN technique to
optimize network security and performance. To ensure
resilience in the midst of sophisticated dangers, assess the
proposed method's resistance against adversarial assaults that
attempt to interfere with traffic patterns or evade control of
access. To handle increasing threats, future research might
focus on improving the hybrid GAN-RNN method's
scalability and flexibility. A more thorough and forward-
thinking approach would involve looking into effective ways
of managing larger networks and new security challenges.
REFERENCES
[1] P. Mishra, V. Varadharajan, U. Tupakula, and E. S. Pilli, ―A Detailed
Investigation and Analysis of Using Machine Learning Techniques for
Intrusion Detection,‖ IEEE Commun. Surv. Tutorials, vol. 21, no. 1, pp.
686728, 2019, doi: 10.1109/COMST.2018.2847722.
[2] V. Kapoor and R. Yadav, ―A Hybrid Cryptography Technique for
Improving Network Security,‖ IJCA, vol. 141, no. 11, pp. 2530, May
2016, doi: 10.5120/ijca2016909863.
[3] C. Yu, J. Lan, Z. Guo, and Y. Hu, ―DROM: Optimizing the Routing in
Software-Defined Networks With Deep Reinforcement Learning,‖ IEEE
Access, vol. 6, pp. 6453364539, 2018, doi:
10.1109/ACCESS.2018.2877686.
[4] N. Awadallah Awad, ―Enhancing Network Intrusion Detection Model
Using Machine Learning Algorithms,‖ Computers, Materials &
Continua, vol. 67, no. 1, pp. 979990, 2021, doi:
10.32604/cmc.2021.014307.
[5] Muthukumaran V., V. V. Kumar, R. B. Joseph, M. Munirathanam, and
B. Jeyakumar, ―Improving Network Security Based on Trust-Aware
Routing Protocols Using Long Short-Term Memory-Queuing Segment-
Routing Algorithms:,‖ International Journal of Information Technology
Project Management, vol. 12, no. 4, pp. 4760, Oct. 2021, doi:
10.4018/IJITPM.2021100105.
[6] S. Akbar, J. A. Chandulal, K. N. Rao, and G. S. Kumar, ―Improving
network security using machine learning techniques,‖ in 2012 IEEE
International Conference on Computational Intelligence and Computing
Research, Coimbatore, India: IEEE, Dec. 2012, pp. 15. doi:
10.1109/ICCIC.2012.6510197.
[7] R. Ahmad, R. Wazirali, and T. Abu-Ain, ―Machine Learning for
Wireless Sensor Networks Security: An Overview of Challenges and
Issues,‖ Sensors, vol. 22, no. 13, p. 4730, Jun. 2022, doi:
10.3390/s22134730.
[8] S. Anbalagan et al., ―Machine-Learning-Based Efficient and Secure
RSU Placement Mechanism for Software-Defined-IoV,‖ IEEE Internet
Things J., vol. 8, no. 18, pp. 1395013957, Sep. 2021, doi:
10.1109/JIOT.2021.3069642.
[9] S. Nanda, F. Zafari, C. DeCusatis, E. Wedaa, and B. Yang, ―Predicting
network attack patterns in SDN using machine learning approach,‖ in
2016 IEEE Conference on Network Function Virtualization and
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 14, No. 12, 2023
606 | P a g e
www.ijacsa.thesai.org
Software Defined Networks (NFV-SDN), Palo Alto, CA: IEEE, Nov.
2016, pp. 167172. doi: 10.1109/NFV-SDN.2016.7919493.
[10] M. A. Alsheikh, S. Lin, D. Niyato, and H.-P. Tan, ―Machine Learning in
Wireless Sensor Networks: Algorithms, Strategies, and Applications,‖
IEEE Commun. Surv. Tutorials, vol. 16, no. 4, pp. 19962018, 2014,
doi: 10.1109/COMST.2014.2320099.
[11] J. Ramprasath and V. Seethalakshmi, ―Secure access of resources in
software‐defined networks using dynamic access control list,‖ Int J
Communication, vol. 34, no. 1, p. e4607, Jan. 2021, doi:
10.1002/dac.4607.
[12] V. Vimal et al., ―Enhance Software-Defined Network Security with IoT
for Strengthen the Encryption of Information Access Control,‖
Computational Intelligence and Neuroscience, vol. 2022, pp. 110, Oct.
2022, doi: 10.1155/2022/4437507.
[13] S. Shin, L. Xu, S. Hong, and G. Gu, Enhancing Network Security
through Software Defined Networking (SDN)‖.
[14] A. Ahmad, E. Harjula, M. Ylianttila, and I. Ahmad, ―Evaluation of
Machine Learning Techniques for Security in SDN,‖ in 2020 IEEE
Globecom Workshops (GC Wkshps, Taipei, Taiwan: IEEE, 2020, pp. 1
6. doi: 10.1109/GCWkshps50303.2020.9367477.
[15] J. A. Pérez-Díaz, I. A. Valdovinos, K.-K. R. Choo, and D. Zhu, ―A
Flexible SDN-Based Architecture for Identifying and Mitigating Low-
Rate DDoS Attacks Using Machine Learning,‖ IEEE Access, vol. 8, pp.
155859155872, 2020, doi: 10.1109/ACCESS.2020.3019330.
[16] S. Latif, Z. Zou, Z. Idrees, and J. Ahmad, ―A Novel Attack Detection
Scheme for the Industrial Internet of Things Using a Lightweight
Random Neural Network,‖ IEEE Access, vol. 8, pp. 89337–89350,
2020, doi: 10.1109/ACCESS.2020.2994079.
[17] ―CICIDS2017.‖ https://www.kaggle.com/datasets/cicdataset/cicids2017
(accessed Sep. 18, 2023).
[18] Z. Cui, R. Ke, Z. Pu, and Y. Wang, ―Stacked Bidirectional and
Unidirectional LSTM Recurrent Neural Network for Forecasting
Network-wide Traffic State with Missing Values.‖ arXiv, May 23, 2020.
Accessed: Sep. 19, 2023. [Online]. Available:
http://arxiv.org/abs/2005.11627.
[19] B. Jang, M. Kim, G. Harerimana, S. Kang, and J. W. Kim, ―Bi-LSTM
Model to Increase Accuracy in Text Classification: Combining
Word2vec CNN and Attention Mechanism,‖ Applied Sciences, vol. 10,
no. 17, p. 5841, Aug. 2020, doi: 10.3390/app10175841.
[20] N. Moustafa and J. Slay, ―The evaluation of Network Anomaly
Detection Systems: Statistical analysis of the UNSW-NB15 data set and
the comparison with the KDD99 data set,‖ Information Security Journal:
A Global Perspective, vol. 25, no. 13, pp. 1831, Apr. 2016, doi:
10.1080/19393555.2015.1125974.
[21] H. Wang and W. Li, ―DDosTC: A Transformer-Based Network Attack
Detection Hybrid Mechanism in SDN,‖ Sensors, vol. 21, no. 15, p. 5047,
Jul. 2021, doi: 10.3390/s21155047.
... Network performance plays a vital role in organizational efficiency. Fast data transmission and low latency contribute to higher productivity, reduced downtime, and improved overall performance in today's fast-paced digital environment [1]. Cloud storage is a service model that operates across multiple network services, connecting devices and systems to remote data centers. ...
... The study in [1] introduces a coverage perception interference model for Wireless Networked Systems (WNS), focusing on the challenges of homogeneous interference in regions of interest. Although the model performs well in high-security environments, its scalability to larger and more complex WNS poses challenges. ...
... In contrast, weak clusters may host fewer replicas, leading to performance bottlenecks and longer response times for some users. Despite this trade-off, the algorithm effectively boosts scalability [20], [1]. ...
Article
Network performance plays a vital role in organizational efficiency, where large volumes of data, fast transmission, and low latency significantly enhance productivity and reduce downtime. Cloud storage offers a service model that enables remote data management and efficient content distribution. In such systems, data replication is widely used to improve availability, reliability, fault tolerance, and throughput. However, static replication policies often allocate replicas during system initialization, failing to adapt to the dynamic and heterogeneous nature of cloud environments. These environments are susceptible to challenges such as data loss, node failures, and fluctuating demand, which can degrade service quality. To address this, we propose a dynamic replica management strategy that considers data popularity, active peer participation, and peer capacity. Virtual peers are grouped into strong, medium, and weak clusters based on their weight values, which are derived from bandwidth, CPU speed, memory size, and access delay. Content is categorized into Class I, II, and III based on access frequency. Highly popular data (Class I) is replicated in strong clusters, while less frequently accessed data is placed in medium and weak clusters. A hierarchical routing mechanism ensures that queries are directed to the appropriate cluster. The proposed system was implemented and evaluated through simulations. Results show up to 25% improvement in throughput, 20% reduction in packet drops, 97% query efficiency, and decreased bandwidth utilization under high load. By maintaining optimal replica counts without compromising availability, the system supports cloud SLA compliance while minimizing overhead. This solution is aligned with the ninth UN Sustainable Development Goal: Industry, Innovation, and Infrastructure.
... D. Javeed et al. 28 use Cu-BLSTM for SCEN, offering scalability for 5G. Maddu M et al. 29 and Khekare Ganesh et al. 30 focus on DCGAN for data augmentation and GAN-RNN for traffic management, respectively. D.M. Brandao Lent et al. 31 and P F de Araujo-Filho et al. 35 use GAN with GRU and temporal convolution for DDoS detection and edge computing. ...
... Once the attack is detected, a predefined defense module restores the connectivity of the SDN network. Khekare Ganesh et al.30 integrate the GAN with a Recurrent neural network (GAN-RNN) to manage traffic engineering and accessibility control in the SDN environment. The GAN-RNN's performance analysis shows the model performs well in flexible rule access management. ...
Article
Full-text available
Detecting attacks in 5G software-defined network (SDN) environments requires a comprehensive approach that leverages traditional security measures, such as firewalls, intrusion prevention systems, and specialized techniques personalized to the unique characteristics of a 5G network. The attack detection in 5G SDN involves Machine learning (ML) and Deep learning (DL) algorithms to analyze large volumes of network data and identify patterns indicative of attacks. The study’s main objective is to develop an efficient DL model to improve the detection performance and respond to security breaches effectively in a 5G SDN environment. The DL model integrates the Particle Swarm Optimizer-Gated Recurrent Unit Layer-Generative Adversarial Network-Intrusion Detection System classifier (PSO-GRUGAN-IDS). The PSO optimizes the network weight of the GAN model to improve the backpropagation while generating the synthetic data (attack data) in the generator model using GRU. The discriminator model uses the PSO-optimized generator model to produce synthetic and real attack data to forecast the attack. Finally, a deep classification (IDS) model is trained using a GRU network with a GAN model-produced attack data and real data to classify whether the SDN traffic is malicious or normal. Moreover, the performance of this model is evaluated using the InSDN dataset and compared with existing DL model-based intrusion detection approaches and the results demonstrate a significantly higher accuracy rate of 98.4%, precision rate of 98%, recall rate of 98.5%, less detection time of 2.464 s, lesser Log loss rate of 1.0 and more metrics instilling confidence in the effectiveness of the proposed method.
... Table 1 illustrates the challenges in UPI Security and the corresponding solutions offered by Voice Authentication. [17] have demonstrated a speaker recognition model using a hybrid GRU [18] and CNN technique [19] for attribute selection to optimize the loss and select the optimal feature vector [20]. A feature extraction method [21], based on statistics, is later applied to select and combine the best features. ...
Article
Full-text available
The identity of a person can be determined based on their voice, through the process of speaker identification. It can be used to improve the security of the United Payments Interface (UPI) framework. The process involves capturing and analyzing the acoustic features of the user’s speech and comparing them to certain voice profiles that are stored in a database to find a match. Once a match is found the transaction can proceed smoothly. A model is built using the Fast Fourier Transform (FFT) and a 1-D CNN and it shows 98.46% accuracy on the data provided to it from the beginning and 98% on the validation data. This model is then compared with other existing models using different methods to obtain important attributes like Mel Spectrogram and MFCC. A process to integrate the model into the UPI ecosystem is successfully developed. This involves designing a protocol and developing an Application Programming Interface (API) for integration with UPI and Security Layering for additional threats. This paper addresses the current security concerns as well as paving the way for further research to improve security in the UPI ecosystem.
... Ganesh Khekare et al. [15] introduced a hybrid intrusion detection model that integrates a Generative Adversarial Network (GAN) with a Recurrent Neural Network (RNN) to enhance network security. The model comprises two key components: a GAN, which generates synthetic traffic patterns to enrich the training dataset and improve security analysis, and an RNN, which focuses on predicting potential network attacks. ...
Preprint
Full-text available
As SDN continues to play a crucial role in modern network infrastructures, particularly in IoT-driven smart city applications, securing these environments against cyber threats is essential. This paper presents the deployment and evaluation of an Intrusion Detection System (IDS) within a Software-Defined Networking (SDN) environment, emphasizing its real-world impact on network performance. The IDS is implemented as an SDN-native application within the Ryu controller. A simulated SDN testbed is constructed using Mininet and Open vSwitch (OvS) to assess the IDS’s effect on key performance metrics such as latency, throughput, packet loss, CPU usage, and memory consumption. The results reveal that IDS increased network latency by an average of 0.016ms. Throughput decreased by approximately 100 kBps. Additionally, CPU usage rose by 5%, while memory usage increased by less than 1%. Unlike many existing studies that focus solely on Deep Learning (DL) model metrics, this research establishes a benchmark for evaluating the impact of DL-based IDS deployment in SDN environments.
... C. Zhang et al. (2020) proposed a new framework for the dynamic deployment of virtual network functions that reduces resource costs and request rejection rates, which This study also demonstrated that the integration of SDN with broadband access networks effectively optimises traffic management, providing improved throughput and reduced latency. In turn, G. Khekare et al. (2023) demonstrated models that can achieve 99.4% accuracy in traffic optimisation and access control using synthetic traffic models. The study also confirmed a significant increase in resource management efficiency in real networks, while A. Alioua (2019) demonstrated that the developed algorithms for data processing in automotive networks reduce delays and energy costs. ...
Article
Full-text available
The study aimed to develop an empirical model for optimising the quality of service (QoS) and improving the efficiency of telecommunications networks by integrating software-defined networking (SDN) and broadband Internet access technologies. The study employed simulation modelling, scenario analysis and analytical models with the use of modelling tools. The main findings of the study highlighted the significant potential of integrating SDN and broadband technologies to improve the QoS and efficiency of telecommunications networks. SDN concepts were demonstrated, which provide centralised network management and flexibility in configuration, as well as broadband access, which offers high data rates and improved bandwidth. The role of each network element, including routers, switches and controllers, and their impact on network efficiency was identified. An analysis of the interaction of SDN with broadband access networks has shown that the use of such networks allows optimising routing, load balancing and traffic management, which helps to improve network speed and reliability. QoS metrics demonstrated that the integration of different technologies leads to significant improvements in bandwidth, packet loss, latency and latency variability. In general, the network model showed the effectiveness of SDN and broadband integration in optimising network performance and QoS, and a review of network modelling methods showed that the use of simulation tools allows for a detailed assessment of the effectiveness of technology integration and confirmation of their positive impact on network performance. Thus, results confirmed that the integration of SDN and broadband technologies significantly improves the efficiency of telecommunications networks, which indicates the effectiveness of new technologies in increasing the overall performance of networks
... The nexus between management decision-making and sustainability strategies within the context of smart cities forms the focal point of this research [8]. As smart city initiatives proliferate, the pressing need arises to scrutinize the factors influencing decision-making processes and their subsequent impact on the development and execution of sustainability initiatives [9]. ...
Article
Full-text available
The rapid urbanization and technological advancements of the 21st century have given rise to the concept of smart cities, where innovative technologies are integrated to enhance urban living. In the pursuit of sustainability, effective decision-making by city management becomes paramount. This research explores the intersection of management decision-making and sustainability strategies within the context of smart cities. Problem Statement: While the implementation of smart technologies in cities has gained momentum, the effectiveness of management decision-making in integrating sustainability strategies remains a challenge. There is a need to investigate the factors influencing decision-making processes and their impact on the development and execution of sustainability initiatives in smart cities. Objective: This research aims to analyze the dynamics of management decision-making in the context of smart cities and evaluate its implications for the successful integration of sustainability strategies. The objective is to identify key factors influencing decision-making, assess their effects on sustainability initiatives, and propose recommendations for enhancing the synergy between management decisions and sustainable urban development. Methodology: A mixed-methods approach will be employed, involving qualitative research methods. Unstructured interviews will be conducted with city managers, policymakers, and technology experts to gather insights into decision-making processes. Data analysis will involve statistical tools to identify patterns and correlations between decision-making factors and the success of sustainability strategies. Results: This research adopts a multi-faceted methodology, combining literature reviews, case studies, and expert interviews. The literature review will provide a comprehensive understanding of existing resilience frameworks and disaster management practices in smart cities. Case studies will be analyzed to identify successful strategies and lessons learned. Expert interviews with urban planners, technology specialists, and emergency responders will offer valuable perspectives on the current challenges and potential solutions. Conclusion: This research contributes to the growing body of knowledge on smart cities by shedding light on the intricate relationship between management decision-making and sustainability Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition) strategies. The findings will have practical implications for city managers, policymakers, and stakeholders involved in the development and implementation of smart city initiatives. Ultimately, the research aims to facilitate informed decision-making processes that align with sustainability goals, fostering a more resilient and liveable urban environment.
... Traditional methods, such as statistical analysis, rule-based approaches, and early machine learning models, struggle to handle the high-dimensional, dynamic, and heterogeneous nature of IoT data. To address these limitations, recent advancements have focused on deep learning techniques like CNNs, RNNs, LSTMs, and GANs, along with ensemble learning strategies, to enhance detection accuracy and identify complex attack patterns [8]- [10]. Various studies have explored improvements in IDS by refining machine learning models; for instance, decision trees with optimized feature selection [11] and entropy-weighted KNN arXiv:2503.03037v1 ...
Preprint
Full-text available
The rapid expansion of Internet of Things (IoT) networks has introduced new security challenges, necessitating efficient and reliable methods for intrusion detection. In this study, a detection framework based on hyperdimensional computing (HDC) is proposed to identify and classify network intrusions using the NSL-KDD dataset, a standard benchmark for intrusion detection systems. By leveraging the capabilities of HDC, including high-dimensional representation and efficient computation, the proposed approach effectively distinguishes various attack categories such as DoS, probe, R2L, and U2R, while accurately identifying normal traffic patterns. Comprehensive evaluations demonstrate that the proposed method achieves an accuracy of 99.54%, significantly outperforming conventional intrusion detection techniques, making it a promising solution for IoT network security. This work emphasizes the critical role of robust and precise intrusion detection in safeguarding IoT systems against evolving cyber threats.
... The subtleties of endpoint-based evasion are examined in modern research, including the application of machine learning to behavioural analysis and heuristic detection. Assessments of endpoint security solutions' efficacy against new threats aid in the continuous enhancement of devicelevel defenses [11]. ...
Conference Paper
Full-text available
Because of the rising sophistication of cybersecurity threats, it is imperative to have a thorough grasp of the evasion strategies used by malevolent actors. This study offers a detailed analysis of evasion strategies in several cybersecurity sectors, such as intrusion detection systems, network security, and endpoint protection. This paper employs a methodical approach to examine the development of these methods, showcases actual case studies, and suggests approaches for detection and mitigation. The findings emphasize how crucial it is to conduct ongoing research and development to combat new cyber threats. Key discoveries are reviewed, and directions for further research are indicated.
... The research [6] was conducted during the Coronavirus pandemic as a means to ascertain whether lip reading was possible on a masked face. This encompassed a 20-fold cross-validation performed for three conditions; uttering words with a mask on, uttering them without the mask, and both combined, which were then evaluated. ...
Article
Full-text available
The Internet of Things (IoT) is legitimately growing quicker. The operators have already started setting up a diligent infrastructure for these gadgets. Various technologies need to be developed for this type of sensor, including enterprise safety initiatives. This paper covers the stability routing protocol, which assumes an assessment of credibility in gadgets and packet flow. To build reliable Software-Defined Network (SDN) routes, build on the trust between network element flows and Quality of Service (QoS) or energy conditions. The SDN architecture is used for the Cognitive Protocol Network (CPN) technical platform to increase the energy level. Stochastic Neural Networks (SNNs) are accredited with information extracted from perceptual packets and make decentralized decisions. The proposed network infrastructure is designed and integrated into the SerIoT techniques to strengthen IoT encryption for information access control. The versatility of the technology is to circumvent the unpredictable connectivity of the system and the node decreases in terms of potential cryptographic capacity, limited interval, a target node, and deterministic energy. Based on factual statistical data, appropriate marketing generates an end-to-end antitheft solution that meets a set of predetermined circuit restrictions. A study must collaborate by demonstrating numerous flaws due to the obvious instability of clusters, which is essential for the efficiency of the platform.
Article
Full-text available
Software-defined networking (SDN) has emerged in recent years as a form of Internet architecture. Its scalability, dynamics, and programmability simplify the traditional Internet structure. This architecture realizes centralized management by separating the control plane and the data-forwarding plane of the network. However, due to this feature, SDN is more vulnerable to attacks than traditional networks and can cause the entire network to collapse. DDoS attacks, also known as distributed denial-of-service attacks, are the most aggressive of all attacks. These attacks generate many packets (or requests) and ultimately overwhelm the target system, causing it to crash. In this article, we designed a hybrid neural network DDosTC structure, combining efficient and scalable transformers and a convolutional neural network (CNN) to detect distributed denial-of-service (DDoS) attacks on SDN, tested on the latest dataset, CICDDoS2019. For better verification, several experiments were conducted by dividing the dataset and comparisons were made with the latest deep learning detection algorithm applied in the field of DDoS intrusion detection. The experimental results show that the average AUC of DDosTC is 2.52% higher than the current optimal model and that DDosTC is more successful than the current optimal model in terms of average accuracy, average recall, and F1 score.
Article
Full-text available
After the digital revolution, large quantities of data have been generated with time through various networks. The networks have made the process of data analysis very difficult by detecting attacks using suitable techniques. While Intrusion Detection Systems (IDSs) secure resources against threats, they still face challenges in improving detection accuracy, reducing false alarm rates, and detecting the unknown ones. This paper presents a framework to integrate data mining classification algorithms and association rules to implement network intrusion detection. Several experiments have been performed and evaluated to assess various machine learning classifiers based on the KDD99 intrusion dataset. Our study focuses on several data mining algorithms such as; naïve Bayes, decision trees, support vector machines, decision tables, k-nearest neighbor algorithms, and artificial neural networks. Moreover, this paper is concerned with the association process in creating attack rules to identify those in the network audit data, by utilizing a KDD99 dataset anomaly detection. The focus is on false negative and false positive performance metrics to enhance the detection rate of the intrusion detection system. The implemented experiments compare the results of each algorithm and demonstrate that the decision tree is the most powerful algorithm as it has the highest accuracy (0.992) and the lowest false positive rate (0.009).
Article
Full-text available
Software‐defined networking (SDN) creates a platform to dynamically configure the networks for on‐demand services. SDN can easily control the data plane and the control plane by implementing the decoupling concept. SDN controller will regulate the traffic flow and creates the new flow label based on the packet dump received from the OpenFlow virtual switches. SDN governs both data information and control information toward the destination based on flow label, but it does not contain security measure to restrict the malicious traffic. The malicious denial‐of‐service (DoS) attack traffic is generated inside the SDN environment; it leads to the service unavailability. This paper is mainly focused on the detection of DoS attacks and also mitigates the malicious traffic by dynamically configuring the firewall. The SDN with dynamic access control list properties is emulated by mininet, and the experimental results exemplify the service unavailable gap between acceptance and rejection ratio of the packets. Software‐defined networking creates a platform to dynamically configure the networks for on‐demand services. The malicious DOS attack traffic is generated inside the SDN environment; it leads to the service unavailability. This paper is mainly focused on the detection of DoS attacks and also mitigate the malicious traffic by dynamically configuring the firewall. The SDN with dynamic ACL properties emulated by and the experimental results exemplify the service unavailable gap between acceptance and rejection ratio of the packets.
Conference Paper
Full-text available
Software Defined Networking (SDN) has emerged as the most viable programmable network architecture to solve many challenges in legacy networks. SDN separates the network control plane from the data forwarding plane and logically centralizes the network control plane. The logically centralized control improves network management through global visibility of the network state. However, centralized control opens doors to security challenges. The SDN control platforms became the most attractive venues for Denial of Service (DoS) and Distributed DoS (DDoS) attacks. Due to the success and inevitable benefits of Machine Learning (ML) in fingerprinting security vulnerabilities, this article proposes and evaluates ML techniques to counter DoS and DDoS attacks in SDN. The ML techniques are evaluated in a practical setup where the SDN controller is exposed to DDoS attacks to draw important conclusions for ML-based security of future communication networks.
Article
Full-text available
While there have been extensive studies of denial of service (DoS) attacks and DDoS attack mitigation, such attacks remain challenging to mitigate. For example, Low-Rate DDoS (LR-DDoS) attacks are known to be difficult to detect, particularly in a software-defined network (SDN). Hence, in this paper we present a flexible modular architecture that allows the identification and mitigation of LR-DDoS attacks in SDN settings. Specifically, we train the intrusion detection system (IDS) in our architecture using six machine learning (ML) models (i.e., J48, Random Tree, REP Tree, Random Forest, Multi-Layer Perceptron (MLP), and Support Vector Machines (SVM)) and evaluate their performance using the Canadian Institute of Cybersecurity (CIC) DoS dataset. The findings from the evaluation demonstrate that our approach achieves a detection rate of 95%, despite the difficulty in detecting LR-DoS attacks. We also remark that in our deployment, we use the open network operating system (ONOS) controller running on Mininet virtual machine in order for our simulated environment to be as close to real-world production networks as possible. In our testing topology, the intrusion prevention detection system mitigates all attacks previously detected by the IDS system. This demonstrates the utility of our architecture in identifying and mitigating LR-DDoS attacks.
Article
Full-text available
There is a need to extract meaningful information from big data, classify it into different categories, and predict end-user behavior or emotions. Large amounts of data are generated from various sources such as social media and websites. Text classification is a representative research topic in the field of natural-language processing that categorizes unstructured text data into meaningful categorical classes. The long short-term memory (LSTM) model and the convolutional neural network for sentence classification produce accurate results and have been recently used in various natural-language processing (NLP) tasks. Convolutional neural network (CNN) models use convolutional layers and maximum pooling or max-overtime pooling layers to extract higher-level features, while LSTM models can capture long-term dependencies between word sequences hence are better used for text classification. However, even with the hybrid approach that leverages the powers of these two deep-learning models, the number of features to remember for classification remains huge, hence hindering the training process. In this study, we propose an attention-based Bi-LSTM+CNN hybrid model that capitalize on the advantages of LSTM and CNN with an additional attention mechanism. We trained the model using the Internet Movie Database (IMDB) movie review data to evaluate the performance of the proposed model, and the test results showed that the proposed hybrid attention Bi-LSTM+CNN model produces more accurate classification results, as well as higher recall and F1 scores, than individual multi-layer perceptron (MLP), CNN or LSTM models as well as the hybrid models.
Article
Full-text available
The Industrial Internet of Things (IIoT) brings together many sensors, machines, industrial applications, databases, services, and people at work. The IIoT is improving our lives in several ways including smarter cities, agriculture, and e-healthcare, etc. Although the IIoT shares several characteristics with the consumer IoT, different cybersecurity mechanisms are adopted for both networks. Unlike consumer IoT solutions that are used by an individual user for a single purpose, IIoT solutions tend to be integrated into larger operational systems. As a result, IIoT security solutions require additional planning and awareness to ensure the security and privacy of the system. In this paper, different cybersecurity attacks such as denial of service (DoS), malicious operation, malicious control, data type probing, spying, scan, and wrong setup are predicted by applying machine learning techniques. To predict the aforementioned attacks, a novel lightweight random neural network (RaNN)-based prediction model has been proposed in this article. To investigate the performance of the RaNN-based prediction model, several evaluation parameters such as accuracy, precision, recall, and F1 score were calculated and compared with the traditional artificial neural network (ANN), support vector machine (SVM) and decision tree (DT). The evaluation results show that the proposed RaNN model achieves an accuracy of 99.20% for a learning rate of 0.01, with a prediction time of 34.51 milliseconds. Other performance parameters such as the precision, recall, and F1 score were 99.11%, 99.13%, and 99.20%, respectively. The proposed scheme improves the attack detection accuracy by an average of 5.65% compared to that of state-of-the-art machine learning schemes for IoT security.
Article
Defending all single connection failures for a particular system, segment routing issue, the switch will focus on the problems of selecting a small subset of trust-aware routing to improve the deep learning (DL). In the end, even if there were multiple path failures, these paths may introduce long-term, unnecessary overload in the proposed long short-term memory networks-based queuing routing segmentation (LSTM-QRS) experience of reducing traffic delays and adjusting traffic length by reducing network bandwidth. The critical factor is a novel traffic repair technique used to create a traffic repair path that switches to software-defined network (SDN) using multiple routing and providing additional flexibility in re-routing using long short-term memory networks (LSTM)-based queuing routing segment (LSTM-QRS) algorithms. It reduces the repair path length and recommends replacing the target-based traffic with the connection-based traffic fault detection router to avoid targeted traffic network congestion.
Article
The massive increase in computing and network capabilities has resulted in a paradigm shift from vehicular networks to the Internet of Vehicles (IoV). Owing to the dynamic and heterogeneous nature of IoV, it requires efficient resource management using smart technologies such as Software Defined Network (SDN), Machine Learning (ML), and so on. Road Side Units (RSUs) in Software Defined-IoV (SD-IoV) networks are responsible for network efficiency and offer several safety functions. However, it is not viable to deploy enough RSUs, and also the existing RSU placement lacks universal coverage within a region. Further, any disruption in network performance or security impacts vehicular activities severely. Thus, this work aims to improve network efficiency through optimal RSU placement and enhance security with a malicious IoV detection algorithm in an SD-IoV network. Therefore, the Memetic-based RSU (M-RSU) placement algorithm is proposed to reduce communication delay and increase the coverage area among IoV devices through an optimum RSU deployment. Besides the M-RSU algorithm, the work also proposes a Distributed ML (DML)-based Intrusion Detection System (IDS) that prevents the SD-IoV network from disastrous security failures. The simulation results show that M-RSU placement reduces the transmission delay. The DML-based IDS detects the malicious IoV with an accuracy of 89.82% compared to traditional ML algorithms.