2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS) 2021
DOI: 10.1109/icais50930.2021.9395987
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Review on Detection of DDoS Attacks using ML in SDN Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…ML can be used in data planes to develop new and effec- tive intrusion detection systems (IDSs) and denial-of-service (DoS) attack mitigation techniques [88]. ML-based IDSs can be trained by using traditional rule-based systems to identify malicious traffic patterns that are difficult to detect [89].…”
Section: A Machine Learning-based Approaches In Sdn Networkmentioning
confidence: 99%
“…ML can be used in data planes to develop new and effec- tive intrusion detection systems (IDSs) and denial-of-service (DoS) attack mitigation techniques [88]. ML-based IDSs can be trained by using traditional rule-based systems to identify malicious traffic patterns that are difficult to detect [89].…”
Section: A Machine Learning-based Approaches In Sdn Networkmentioning
confidence: 99%
“…A real-time mitigation approach toward DDoS attacks is presented in [22], which uses the Flow mitigation technique by analyzing the network traffic and rules. A Convolution Neural Network with Long Short-Term Memory (CNN-LSTM) based approach is presented in [23] to support SDN networks. An RF algorithm-based early detection scheme is presented in [24], which uses flow features and rules to support the detection of DDoS attacks.…”
Section: Related Workmentioning
confidence: 99%
“…16 We initially select two datasets: the "DDoS attack SDN" 17 and the "SDN-DDOS-TCP-SYN". 18 Let's call Din 1 the dataset "DDoS attack SDN" and Din 2 the dataset "SDN-DDOS-TCP-SYN." We attempt to evaluate the quality of each one and choose the most appropriate.…”
Section: Data Quality Assessmentmentioning
confidence: 99%
“…Particularly, we focus on four important types of DDoS (see P$$ P $$): LAND, ICMP flood, UDP flood, and TCP syn, that have a dangerous impact on SDN 16 . We initially select two datasets: the “DDoS attack SDN” 17 and the “SDN‐DDOS‐TCP‐SYN” 18 . Let's call Din1$$ Di{n}_1 $$ the dataset “DDoS attack SDN” and Din2$$ Di{n}_2 $$ the dataset “SDN‐DDOS‐TCP‐SYN.” We attempt to evaluate the quality of each one and choose the most appropriate.…”
Section: Experimental Studymentioning
confidence: 99%