Performance Analysis of DDOS Attack Mitigation in Software Define Networking
Implementation Plan:
*********************
Step 1: Initially, we will create a Software defined network (SDN), it consists of 10- Host Nodes, 3 Switches and 1 Controller [POX Controller] .
Step 2: Then, we will simulate and collect network flow data based on the CIC-IDS 2017 dataset.
Step 3: Next, we will analyse the packet based on the sliding window technique using collected data.
Step 4: Next, we will compute both Information and Log energy entropies, fuse them both to form a single entropy value and train the data using LSTM Deep learning Algorithm based on collected data.
Step 5: Next, we detect and block malicious traffic based on a predefined threshold using collected data.
Step 6: Finally Plot the performance Metrics:
6.1: Number of Epochs Vs. Accuracy (%)
6.2: Number of Epochs Vs. Loss (%)
6.3: True Positive Rate Vs. False Positive Rate
6.4: Number of Packets vs. Computed Entropy
Software requirement:
*********************
1. Development Tool: i) Mininet-2.0 or Above Version
ii) Python-2.7 or Above version
iii) Wireshark [If needed]
2. Operating System: Ubuntu 16.04 LTS (64-bit) or Above
Dataset:
********
Link : https://www.kaggle.com/datasets/sateeshkumar6289/cicids-2017-dataset
Note:
*****
1) If the proposed plan does not fully align with your requirements, please provide all necessary details—including steps, parameters, models, and expected outcomes—in advance. Kindly ensure that any missing configurations or specifications are clearly outlined in the plan before confirming.
2) If there’s no built-in solution for what the project needs, we can always turn to reference models, customize our own, different math models or write the code ourselves to fulfil the process.
3) If the plan satisfies your requirement, Please confirm with us.
4) Project based on Simulation only.
| Technology | Ph.D | MS | M.Tech |
|---|---|---|---|
| NS2 | 75 | 117 | 95 |
| NS3 | 98 | 119 | 206 |
| OMNET++ | 103 | 95 | 87 |
| OPNET | 36 | 64 | 89 |
| QULANET | 30 | 76 | 60 |
| MININET | 71 | 62 | 74 |
| MATLAB | 96 | 185 | 180 |
| LTESIM | 38 | 32 | 16 |
| COOJA SIMULATOR | 35 | 67 | 28 |
| CONTIKI OS | 42 | 36 | 29 |
| GNS3 | 35 | 89 | 14 |
| NETSIM | 35 | 11 | 21 |
| EVE-NG | 4 | 8 | 9 |
| TRANS | 9 | 5 | 4 |
| PEERSIM | 8 | 8 | 12 |
| GLOMOSIM | 6 | 10 | 6 |
| RTOOL | 13 | 15 | 8 |
| KATHARA SHADOW | 9 | 8 | 9 |
| VNX and VNUML | 8 | 7 | 8 |
| WISTAR | 9 | 9 | 8 |
| CNET | 6 | 8 | 4 |
| ESCAPE | 8 | 7 | 9 |
| NETMIRAGE | 7 | 11 | 7 |
| BOSON NETSIM | 6 | 8 | 9 |
| VIRL | 9 | 9 | 8 |
| CISCO PACKET TRACER | 7 | 7 | 10 |
| SWAN | 9 | 19 | 5 |
| JAVASIM | 40 | 68 | 69 |
| SSFNET | 7 | 9 | 8 |
| TOSSIM | 5 | 7 | 4 |
| PSIM | 7 | 8 | 6 |
| PETRI NET | 4 | 6 | 4 |
| ONESIM | 5 | 10 | 5 |
| OPTISYSTEM | 32 | 64 | 24 |
| DIVERT | 4 | 9 | 8 |
| TINY OS | 19 | 27 | 17 |
| TRANS | 7 | 8 | 6 |
| OPENPANA | 8 | 9 | 9 |
| SECURE CRT | 7 | 8 | 7 |
| EXTENDSIM | 6 | 7 | 5 |
| CONSELF | 7 | 19 | 6 |
| ARENA | 5 | 12 | 9 |
| VENSIM | 8 | 10 | 7 |
| MARIONNET | 5 | 7 | 9 |
| NETKIT | 6 | 8 | 7 |
| GEOIP | 9 | 17 | 8 |
| REAL | 7 | 5 | 5 |
| NEST | 5 | 10 | 9 |
| PTOLEMY | 7 | 8 | 4 |