2018
DOI: 10.26555/ijain.v4i1.138
|View full text |Cite
|
Sign up to set email alerts
|

A novel intelligent approach for detecting DoS flooding attacks in software-defined networks

Abstract: Software-Defined Networking (SDN) is an emerging networking paradigm that provides an advanced programming capability and moves the control functionality to a centralized controller. This paper proposes a two-stage novel intelligent approach that takes advantage of the SDN approach to detect Denial of Service (DoS) flooding attacks based on calculation of packet rate as the first step and followed by Support Vector Machine (SVM) classification as the second step. Flow concept is an essential idea in OpenFlow p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(21 citation statements)
references
References 20 publications
(21 reference statements)
0
20
1
Order By: Relevance
“…The results, as well as the ones reported in the literature, are summarized in Table 10. It can be seen from Table 10, that the proposed machine learning model with feature selection approaches, results in better performance in comparison with the results from [10,16,18,19,21]. It should be noted that similar studies in the literature used different datasets and different models.…”
Section: Receiver Operating Characteristic (Roc) Curvementioning
confidence: 88%
See 1 more Smart Citation
“…The results, as well as the ones reported in the literature, are summarized in Table 10. It can be seen from Table 10, that the proposed machine learning model with feature selection approaches, results in better performance in comparison with the results from [10,16,18,19,21]. It should be noted that similar studies in the literature used different datasets and different models.…”
Section: Receiver Operating Characteristic (Roc) Curvementioning
confidence: 88%
“…Latah and Toker [10] detected DDoS attacks by measuring the rate of the arriving packet at the moment of attack. When some packets, among the ones coming to the controller, passed the pre-determined threshold, an inspection unit that uses SVM was activated to be able to detect DDoS flooding attacks.…”
Section: Ddos Attacks Against the Openflow Switchmentioning
confidence: 99%
“…Software defined networking is regarded as a novel networking architecture for detecting a DoS attack [11]. The authors have proposed the intelligent approach for a DoS attack detecting in SDN.…”
Section: Related Workmentioning
confidence: 99%
“…In this context, NNs [97][98][99][100][101][102][103][104][105][106], SVM [105][106][107][108][109][110][111][112][113], DTs [114][115][116][117][118][119][120][121][122][123][124][125][126][127][128], ensemble methods [129][130][131][132][133][134][135][136][137][138][139][140] and supervised deep learning [44,[141][142][143][144] approaches were the most used...…”
Section: Supervised Learning In Sdnmentioning
confidence: 99%
“…SVMs in SDN: SVM approach was mainly used for deploying intrusion detection systems in the SDN paradigm [107][108][109][110][111][112][113][114]. Kokila et al [107] proposed a method for the detection of DDoS attacks on the SDN controller.…”
Section: Supervised Learning In Sdnmentioning
confidence: 99%