2022
DOI: 10.1016/j.jnca.2022.103444
|View full text |Cite
|
Sign up to set email alerts
|

A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 41 publications
(34 citation statements)
references
References 22 publications
0
14
0
Order By: Relevance
“…1 and Appendix C). Second, the few prior works that study emulated infrastructures similar to ours either consider static attackers in fully observed environments [28]- [31], [36], [37], [48], [51], [120] or focus on use cases that are different from the one considered in this article [120], [121].…”
Section: A Learning Equilibrium Strategies Through Self-playmentioning
confidence: 99%
See 3 more Smart Citations
“…1 and Appendix C). Second, the few prior works that study emulated infrastructures similar to ours either consider static attackers in fully observed environments [28]- [31], [36], [37], [48], [51], [120] or focus on use cases that are different from the one considered in this article [120], [121].…”
Section: A Learning Equilibrium Strategies Through Self-playmentioning
confidence: 99%
“…A large number of studies have focused on applying reinforcement learning to use cases similar to the intrusion response use case we discuss in this paper [9]- [11], [17]- [52], [64], [72]. These works use a variety of models, including MDPs [20], [23], [25], [26], [31], [34], [36], [42], [51], [52], [64], Stochastic games [10], [18], [28], [33], [45], [72], attack graphs [35], Petri nets [43], and POMDPs [9], [11], [21], [27], as well as various reinforcement learning algorithms, including Q-learning [18], [20], [23], [40], [43], [48], [64], [69], SARSA [21], PPO [10], [11], [34], [35], [37], hierarchical reinforcement learning [25], DQN [26], [36]-…”
Section: Reinforcement Learning For Automated Intrusion Responsementioning
confidence: 99%
See 2 more Smart Citations
“…In order to monitor the risks of the occurrence of such situations, it is necessary to monitor the time parameters of the traffic flow constantly. However, the analysis of the averaged values of the traffic characteristics gives us a smoothed view of the process, in which it is not possible to track the appearance of load fluctuations, which are characteristic of heterogeneous traffic "Triple Play" (voice + video + data) or "Quadruple Play" (voice + video + data + mobile subscribers) [23].…”
Section: Literature Reviewmentioning
confidence: 99%