Autonomic Resilience in Cybersecurity: Designing the Self-Healing Network Protocol for Next-Generation Software-Defined Networking
DOI:
https://doi.org/10.22399/ijcesen.640Keywords:
Networking Protocols, SHNP, Conventional Networking, Performance Metrics, Data Latency, Data Transfer Rate, Resource EfficiencyAbstract
This study rigorously compares the Self-Healing Network Protocol (SHNP) with a traditional protocol, utilizing simulations and data analysis to examine crucial network performance metrics.The research meticulously assesses latency averages—a critical measure of network responsiveness; peak data transfer rates, indicative of the network's throughput capabilities; average resource utilization, reflective of network efficiency; and resilience ratings, which gauge the network's ability to withstand and recover from operational perturbations. The SHNP emerges as a robust solution, significantly lowering latency to an average of 38.53 milliseconds, thereby facilitating expedited real-time data transmission. It also achieves notable resource utilization efficiency, evidenced by a 48.14% improvement, and shows enhanced resilience with a rating near 1.47, solidifying its superior dependability in challenging conditions. Conversely, the conventional protocol shines in its peak data transfer rate, reaching around 860.05 Mbps, which may be advantageous in situations demanding high-speed data handling. The insights derived from this analysis are pivotal for network managers and strategists, offering a nuanced perspective that supports strategic decision-making in protocol selection to meet precise network performance goals and adapt to specific operational contexts. This study underscores the dynamic evolution of network protocols and serves as a guidepost for stakeholders in selecting the most fitting protocol to meet their network's unique needs and challenges.
References
Wen, G., Yu, W., Yu, X., & Lü, J. (2017). Complex cyber-physical networks: From cybersecurity to security control. Journal of Systems Science and Complexity, 30(1), 46-67. https://doi.org/10.1007/s11424-017-6181-x
Verma, A., & Bhardwaj, N. (2016). A review on routing information protocol (RIP) and open shortest path first (OSPF) routing protocol. International Journal of Future Generation Communication and Networking, 9(4), 161-170. DOI:10.14257/IJFGCN.2016.9.4.13
Alotaibi, H. S., Gregory, M. A., & Li, S. (2022). Multidomain sdn-based gateways and border gateway protocol. Journal of Computer Networks and Communications, 2022, Article ID 3955800, 23 pages https://doi.org/10.1155/2022/3955800
Tomasz Bosakowski, David Hutchison, & P. Radhika Raju. (2024). CyberEcoGuard: Evolutionary algorithms and nature-mimetic defenses for enhancing network resilience in cloud infrastructures. International Journal of Computer Engineering in Research Trends, 11(3),10–19. https://doi.org/10.22362/ijcert/2024/v11/i3/v11i302
P. Siva, Cherukuri Sudhish, Ogirala Divyanand, & K Sai Ananya Madhuri. (2023). Routenet: Using Graph Neural Networks for SDN Network Modeling and Optimizations. International Journal of Computer Engineering in Research Trends, 10(7), 32–38. https://doi.org/10.22362/ijcert/2023/v10/i07/v10i0705
Korra Bichya. (2015). Vampire Attacks in Wsn Can Lead By Eloa. Macaw International Journal of Advanced Research in Computer Science and Engineering, 1(1), 21-27.
Mokhtar, B., & Eltoweissy, M. (2011, October). Memory-enabled autonomic resilient networking. In 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom) (pp. 132-141). IEEE.
Coppolino, L., D’Antonio, S., Nardone, R., & Romano, L. (2023). A self-adaptation-based approach to resilience improvement of complex internets of utility systems. Environment Systems and Decisions, 43(4), 708-720. DOI:10.1007/s10669-023-09937-8
P.Venkata Krishna, K Venkatesh Sharma, & A MallaReddy. (2023). A Machine Learning-based Approach for Detecting Network Intrusions in Large-scale Networks . International Journal of Computer Engineering in Research Trends, 10(2), 69–76. https://doi.org/10.22362/ijcert/2023/v10/i02/v10i0204
Zhao, Z., Schiller, E., Kalogeiton, E., Braun, T., Stiller, B., Garip, M. T., ... & Matta, I. (2017). Autonomic communications in software-driven networks. IEEE journal on selected areas in communications, 35(11), 2431-2445. DOI:10.1109/JSAC.2017.2760354
Muhammad, T. (2019). Revolutionizing Network Control: Exploring the Landscape of Software-Defined Networking (SDN). International Journal of Computer Science and Technology, 3(1), 36-68.
Nikoloudakis, Y., Kefaloukos, I., Klados, S., Panagiotakis, S., Pallis, E., Skianis, C., & Markakis, E. K. (2021). Towards a machine learning based situational awareness framework for cybersecurity: an SDN implementation. Sensors, 21(14);4939. https://doi.org/10.3390/s21144939
Elhadj Benkhelifa, Lokhande Gaurav, & Vidya Sagar S.D. (2024). BioShieldNet: Advanced biologically inspired mechanisms for strengthening cybersecurity in distributed computing environments. International Journal of Computer Engineering in Research Trends, 11(3), 1–9. https://doi.org/10.22362/ijcert/2024/v11/i3/v11i301
Islam, U., Al-Atawi, A., Alwageed, H. S., Ahsan, M., Awwad, F. A., & Abonazel, M. R. (2023). Real-Time Detection Schemes for Memory DoS (M-DoS) Attacks on Cloud Computing Applications. IEEE Access. DOI: 10.1109/ACCESS.2023.3290910
Kanwal, A., Nizamuddin, M., Iqbal, W., Aman, W., Abbas, Y., & Mussiraliyeva, S. (2024). Exploring Security Dynamics in SDN Controller Architectures: Threat Landscape and Implications. IEEE Access. 12, 56517-56553. https://doi.org/10.1109/ACCESS.2024.3390968
Al-Sakran, H., Al-Sakran, S., & Al-Duwaish, H. (2023). Autonomic resilience in IT networks: Leveraging machine learning and AI for self-healing systems. Journal of Network and Systems Management, 31(1), 89-104. https://doi.org/10.1007/s10922-022-09671-8
Mittal, S., Mahapatra, R. N., & Rao, S. (2019). Self-healing networks: A survey. IEEE Transactions on Network and Service Management, 16(2), 543-556. https://doi.org/10.1109/TNSM.2019.2904076
Tian, Y., Wang, L., & Chen, J. (2021). Real-time threat detection in autonomic networks using machine learning algorithms. ACM Computing Surveys, 54(3), 1-35. https://doi.org/10.1145/3434140
Perlman, R. (2013). Interconnections: Bridges, Routers, Switches, and Internetworking Protocols (2nd ed.). Addison-Wesley Professional.
Bandyopadhyay, S., & Mukherjee, A. (2020). A comprehensive review on security issues and solutions in Software-Defined Networking. IEEE Communications Surveys & Tutorials, 22(2), 903-940. https://doi.org/10.1109/COMST.2020.2966823
Cheng, S. W. (2008). Rainbow: cost-effective software architecture-based self-adaptation (Doctoral dissertation, Carn Talebian, S., Mehrali, M., Taebnia, N., Pennisi, C. P., Kadumudi, F. B., Foroughi, J., ... & Dolatshahi‐Pirouz, A. (2019). Self‐healing hydrogels: the next paradigm shift in tissue engineering?. Advanced Science, 6(16), 1801664. egie Mellon University).
Sterbenz, J. P., Hutchison, D., Çetinkaya, E. K., Jabbar, A., Rohrer, J. P., Schöller, M., & Smith, P. (2009). Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. Computer Networks, 54(8), 1245-1265. https://doi.org/10.1016/j.comnet.2009.01.013
Karakus, M., & Durresi, A. (2017). A survey: Control plane scalability issues and approaches in software-defined networking (SDN). Computer Networks, 112, 279-293. https://doi.org/10.1016/j.comnet.2016.11.017
Hayes, M., Ng, B., Pekar, A., & Seah, W. K. (2017). Scalable architecture for SDN traffic classification. IEEE Systems Journal, 12(4), 3203-3214. DOI:10.1109/JSYST.2017.2690259
Sahoo, A. K., Swain, S. K., & Panigrahi, S. (2012). Leveraging SDN for scalable and efficient self-healing networks. Proceedings of the 2012 IEEE International Conference on Communication Systems and Networks (COMSNETS), 1-6. https://doi.org/10.1109/COMSNETS.2012.6151354
Dhadhania, A., Bhatia, J., Mehta, R., Tanwar, S., Sharma, R., & Verma, A. (2024). Unleashing the power of SDN and GNN for network anomaly detection: State‐of‐the‐art, challenges, and future directions. Security and Privacy, 7(1), e337. https://doi.org/10.1002/spy2.337
R. S. Loomis, J. Rockström, & M.Bhavsingh. (2023). Synergistic Approaches in Aquatic and Agricultural Modeling for Sustainable Farming. Synthesis: A Multidisciplinary Research Journal, 1(1), 32-41.
Silvânio Rodrigues dos Santos, Marcos Koiti Kondo, & M.Sai Kiran. (2023). Multimodal Fusion for Robust Banana Disease Classification and Prediction: Integrating Image Data with Sensor Networks. Frontiers in Collaborative Research, 1(2), 22-31.
Christian Brynning, Schirrer A, & Jakubek S. (2023). Transfer Learning for Agile Pedestrian Dynamics Analysis: Enabling Real-Time Safety at Zebra Crossings. Synthesis: A Multidisciplinary Research Journal, 1(1), 22-31.
P. Siva, Cherukuri Sudhish, Ogirala Divyanand, & K Sai Ananya Madhuri. (2023). Routenet: Using Graph Neural Networks for SDN Network Modeling and Optimizations. International Journal of Computer Engineering in Research Trends, 10(7), 32–38. DOI:10.22362/ijcert/2023/v10/i07/v10i0705
Dundjerski, D., & Tomašević, M. (2015). Graphical processing unit‐based parallelization of the Open Shortest Path First and Border Gateway Protocol routing protocols. Concurrency and Computation: Practice and Experience, 27(1), 237-251.
https://doi.org/10.1002/cpe.3223
Manzoor, A., Hussain, M., & Mehrban, S. (2020). Performance analysis and route optimization: redistribution between EIGRP, OSPF & BGP routing protocols. Computer Standards & Interfaces, 68, 103391.
https://doi.org/10.1016/j.csi.2019.103391
Medved, J., Varga, R., Tkacik, A., & Gray, K. (2014, June). Opendaylight: Towards a model-driven sdn controller architecture. In Proceeding of IEEE international symposium on a world of wireless, mobile and multimedia networks 2014 (pp. 1-6). IEEE.
Kashvi Gupta, Sangeeta Gupta, Satyanarana, M. Rudra Kumar, & M Bhavsingh. (2023). SecureChain: A Novel Blockchain Framework for Enhancing Mobile Device Integrity through Decentralized IMEI Verification. Frontiers in Collaborative Research, 1(1), 1-11.
Rehman, R. U. (2003). Intrusion detection systems with Snort: advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID. Prentice Hall Professional.
Asep Bayu Dani Nandiyanto, Chekima Hamza, & Muhammad Aziz. (2023). A Novel Framework for Enhancing Security in Software-Defined Networks. International Journal of Computer Engineering in Research Trends, 10(11), 19–26.
DOI:10.22362/ijcert/2023/v10/i11/v10i113
Alpana Gopi, Divya P R, Litty Rajan, Surya Rajan, & Shini Renjith. (2016). Accident Tracking and Visual Sharing Using RFID and SDN. International Journal of Computer Engineering in Research Trends, 3(10), 544–549
DOI: 10.6084/m9.figshare.4232321
Vijaykrishnan Narayanan, & Kevin W. Eliceiri. (2023). Deep Wavelet Packet Decomposition with Adaptive Entropy Modeling for Selective Lossless Image Compression. Synthesis: A Multidisciplinary Research Journal, 1(1), 1-10
Muzammil Parvez M, Salam H, & Hoffmann Y. (2023). Next-Generation Speech Analysis for Emotion Recognition and PTSD Detection with Advanced Machine and Deep Learning Models. Synthesis: A Multidisciplinary Research Journal, 1(1), 11-21.
Rockstroma J, Barron J, & Addepalli Lavanya. (2023). Aquatic-Based Optimization Techniques for Sustainable Agricultural Development . Frontiers in Collaborative Research, 1(1), 12-21.
Lampkins J, Huang Z, & Radwan. (2023). Multimodal Perception for Dynamic Traffic Sign Understanding in Autonomous Driving. Frontiers in Collaborative Research, 1(1), 22-34.
Hussain Basha Pathan, Shyam Preeth, & M Bhavsingh. (2023). Revolutionizing PTSD Detection and Emotion Recognition through Novel Speech-Based Machine and Deep Learning Algorithms. Frontiers in Collaborative Research, 1(1), 35-44.
Maria González & Lars Svensson. (2024). Adaptive Cybersecurity Framework: Leveraging Self-Healing Mechanisms in Software-Defined Networking. International Journal of Computer Engineering in Research Trends, 11(3), 64–73. https://doi.org/10.22362/ijcert/2024/v11/i3/v11i308
Elena Petrova & Ahmed El-Sayed. (2024). Designing Autonomous Resilient Protocols for Cybersecurity in SDN-Based IoT Environments. International Journal of Computer Engineering in Research Trends, 11(8), 12–21. https://doi.org/10.22362/ijcert/2024/v11/i8/v11i802
DAYIOĞLU, M., & ÜNAL, R. (2024). Comparison of Different Forecasting Techniques for Microgrid Load Based on Historical Load and Meteorological Data. International Journal of Computational and Experimental Science and Engineering, 10(4);1078-1084. https://doi.org/10.22399/ijcesen.238
M, R., & K, K. P. (2024). Elevating Facial Expression Detection: Empowered by VGG-19 and Weight- Normalized Gradient Boost Algorithm. International Journal of Computational and Experimental Science and Engineering, 10(4);918-927. https://doi.org/10.22399/ijcesen.521
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Computational and Experimental Science and Engineering
This work is licensed under a Creative Commons Attribution 4.0 International License.