2021 IEEE International Systems Conference (SysCon) 2021
DOI: 10.1109/syscon48628.2021.9447131
|View full text |Cite
|
Sign up to set email alerts
|

A Model-Driven Framework for the Prevention of DoS Attacks in Software Defined Networking (SDN)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…Moreover, the datasets with larger kurtosis tends to provide outliers, or heavy tails. The mathematical formula of kurtosis for univariate data such as Z 1 , Z 2 , … , Z M , is expressed in Equation (5).…”
Section: F I G U R E 2 Illustration Of Proposed Attack Detection Mode...mentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, the datasets with larger kurtosis tends to provide outliers, or heavy tails. The mathematical formula of kurtosis for univariate data such as Z 1 , Z 2 , … , Z M , is expressed in Equation (5).…”
Section: F I G U R E 2 Illustration Of Proposed Attack Detection Mode...mentioning
confidence: 99%
“…Recently, the SDN has concentrated more and the network management concept has offered an efficient network‐based distributed denial‐of‐service (DDoS) defense besides different way of DDoS attack 3,4 . The centralized SDN controller could influence more knowledge regarding its network, and the SDN architecture aids in detecting the DDoS attacks through various techniques like machine learning or traffic pattern analysis 5 . Moreover, the mitigation strategies are used by the SDN controller that includes redirecting legitimate traffic to a secure system or blocking the attacker's flow to the network switches via employing an updated security policy as it detects the DDoS attacks 6–8 .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…SDN carries the distinctive properties that allow the LDoS attackers to concentrate on mining these vulnerabilities [9]- [11], which constitutes a potential threat to the entire SDN [12] [13]. Currently, the corresponding detection technologies in SDN mainly face with the following problems.…”
Section: Introductionmentioning
confidence: 99%