2019 IEEE Symposium on Computers and Communications (ISCC) 2019
DOI: 10.1109/iscc47284.2019.8969595
|View full text |Cite
|
Sign up to set email alerts
|

A Deep ConvNet-Based Countermeasure to Mitigate Link Flooding Attacks Using Software-Defined Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…In tradition, detecting LFA can be classified into two types mentioned above. There are two studies that use deep learning methods to detect LFA [ 11 , 12 ]. There are normal traffic and anomalous traffic when the attack happens, so this category of deep learning method classifies two types of traffic by artificial neural networks.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…In tradition, detecting LFA can be classified into two types mentioned above. There are two studies that use deep learning methods to detect LFA [ 11 , 12 ]. There are normal traffic and anomalous traffic when the attack happens, so this category of deep learning method classifies two types of traffic by artificial neural networks.…”
Section: Related Workmentioning
confidence: 99%
“…In [ 11 ], the authors suggest an LFA attack detection scheme for SDN called Cyberpulse that leverages LFA traffic flow statistics to train the ANN module and then classifies them as normal and abnormal flows. The authors of [ 12 ] propose an attack detection scheme for SDN called LF-Shield that also utilizes LFA traffic statistics to train the CNN module and then classifies them as normal and abnormal flows.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations