2022
DOI: 10.3390/s22072697
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT

Abstract: The development of smart network infrastructure of the Internet of Things (IoT) faces the immense threat of sophisticated Distributed Denial-of-Services (DDoS) security attacks. The existing network security solutions of enterprise networks are significantly expensive and unscalable for IoT. The integration of recently developed Software Defined Networking (SDN) reduces a significant amount of computational overhead for IoT network devices and enables additional security measurements. At the prelude stage of S… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 73 publications
(36 citation statements)
references
References 44 publications
0
18
0
Order By: Relevance
“…The third layer performs the measurement of live network traffic for the detection of DDoS attacks. In experimental analysis, the authors showed that the proposed model achieved higher accuracy than other state-of-the-art approaches [15].…”
Section: Literature Reviewmentioning
confidence: 98%
“…The third layer performs the measurement of live network traffic for the detection of DDoS attacks. In experimental analysis, the authors showed that the proposed model achieved higher accuracy than other state-of-the-art approaches [15].…”
Section: Literature Reviewmentioning
confidence: 98%
“…MUD also used the blockchain security model to transfer data with the aid of IoT devices via the Hyperledger platform. The security architecture for the dynamic and on-demand administration for virtualized identification, authority, and accountability in SDN-enabled IoT networks was additionally provided by [ 20 , 21 ]. The authors accomplished efficient IoT device bootstrap and fine-grained administration of their network access control.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Similarly, work in [ 12 ] discusses various machine learning techniques for DDoS and intrusion prevention in SDN and provides a comparison between these techniques. Similar attacks are detected with the help of machine learning techniques in [ 29 ] where authors use SVM, NB, KNN, RF, and LR.…”
Section: Background and Related Workmentioning
confidence: 99%