2023
DOI: 10.3390/s23136176
|View full text |Cite
|
Sign up to set email alerts
|

A DDoS Detection Method Based on Feature Engineering and Machine Learning in Software-Defined Networks

Abstract: Distributed denial-of-service (DDoS) attacks pose a significant cybersecurity threat to software-defined networks (SDNs). This paper proposes a feature-engineering- and machine-learning-based approach to detect DDoS attacks in SDNs. First, the CSE-CIC-IDS2018 dataset was cleaned and normalized, and the optimal feature subset was found using an improved binary grey wolf optimization algorithm. Next, the optimal feature subset was trained and tested in Random Forest (RF), Support Vector Machine (SVM), K-Nearest … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 49 publications
(68 reference statements)
0
6
0
Order By: Relevance
“…This approach has demonstrated reliability in detecting DDoS attacks, a fact exemplified in Figure 2. Liu et al [2] delved into the development of a DDoS detection method tailored for Software-Defined Networks (SDNs), employing machine learning algorithms. This method effectively discerns DDoS attacks in SDN systems by extracting pertinent data from network traffic and deploying machine learning models to differentiate between legitimate and malicious traffic.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…This approach has demonstrated reliability in detecting DDoS attacks, a fact exemplified in Figure 2. Liu et al [2] delved into the development of a DDoS detection method tailored for Software-Defined Networks (SDNs), employing machine learning algorithms. This method effectively discerns DDoS attacks in SDN systems by extracting pertinent data from network traffic and deploying machine learning models to differentiate between legitimate and malicious traffic.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This approach potentially improves performance by mitigating the limitations of individual models and harnessing the diversity of multiple models. Conversely, deep learning models, utilizing neural networks with multiple layers, are adept at autonomously recognizing and extracting complex patterns and features from data streams, thereby effectively identifying intricate DDoS attacks [2].…”
Section: Introductionmentioning
confidence: 99%
“…This research provides a feature-engineering-and machine-learningbased technique for detecting DDoS assaults in SDN. First, the CSE-CIC-IDS2018 dataset was cleaned and normalized, and the best feature subset was identified using an enhanced binary grey wolf optimization approach [21]. This research proposes DL-2P-DDoSADF, a deep-learning-based two-phase DoS attack detection system.…”
Section: Deployment For Ddos Attack Detectionmentioning
confidence: 99%
“…Through the use of ensemble techniques, RF increases the accuracy of individual DTs, making it more dependable for DDoS assault detection. The necessity to train many trees makes RFs more computationally demanding than a single DT [21].…”
Section: Random Forestmentioning
confidence: 99%
“…In the BOT-IOT dataset, NB achieved an accuracy of 100% for both binary and multiclass classification. Liu et al [15] also implemented RF, SVM, KNN, DT, and XGBoost, using the CSE-CIC-IDS2018 dataset, demonstrating that RF is the best classifier with an accuracy of 98.95%.…”
Section: Introductionmentioning
confidence: 99%