2017
DOI: 10.1109/access.2017.2702341
|View full text |Cite
|
Sign up to set email alerts
|

A Game Theoretical Based System Using Holt-Winters and Genetic Algorithm With Fuzzy Logic for DoS/DDoS Mitigation on SDN Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 60 publications
(36 citation statements)
references
References 32 publications
0
33
0
1
Order By: Relevance
“…Signature-based [27] 0.75 10 IP distance-based [32] 0.99 100 Kolmogorov complexity based [36] -10 Extreme filtering: -determined mode 0.9 1.5 -accidental mode 0.8 7.5 Table 5 demonstrates that none of the known methods for DDOS attack detection has such a small value of the detection duration as the extreme filtering method has. Moreover, this method has fairly good attack detection accuracy.…”
Section: Attack Detection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Signature-based [27] 0.75 10 IP distance-based [32] 0.99 100 Kolmogorov complexity based [36] -10 Extreme filtering: -determined mode 0.9 1.5 -accidental mode 0.8 7.5 Table 5 demonstrates that none of the known methods for DDOS attack detection has such a small value of the detection duration as the extreme filtering method has. Moreover, this method has fairly good attack detection accuracy.…”
Section: Attack Detection Methodsmentioning
confidence: 99%
“…Currently, DDOS attacks are detected mainly by three kinds of methods: signature-based (SB), statistical analysis (SA), and machine learning (ML) [23][24][25][26]. At present, additional mechanisms are used to implement signature-based DDOS attack detection methods, for example, the fuzzy-genetic algorithms and game theory methods for performance evaluation [27], the inference mechanisms [28], and so on. This increases their effectiveness.…”
mentioning
confidence: 99%
“…De Assis et al proposed an independent defense scheme for software defined networks (SDN) [50]. Game Theoretical Holt-Winters for Digital Signature (GT-HWDS) combines an independent decision-making model built on game theory (GT) with anomaly detection and identification from a Holt-Winters for Digital Signature (HWDS) system [51,52].…”
Section: Game Theoretical Holt-winters For Digital Signature (Gt-hwds)mentioning
confidence: 99%
“…In [20], the authors proposed a system that uses a modification of Holt-Winters named Holt-Winters for Digital Signature (HWDS), which generates a Digital Signature of Network Segment using Flow Analysis (DSNSF) for seven analyzed dimensions of the IP flow. Their system compares the collected flows, which differ from the generated DSNSF, with signatures of known attacks such as DoS and DDoS.…”
Section: Related Workmentioning
confidence: 99%