2021
DOI: 10.3390/technologies9010014
|View full text |Cite
|
Sign up to set email alerts
|

An Investigation into the Application of Deep Learning in the Detection and Mitigation of DDOS Attack on SDN Controllers

Abstract: Software-Defined Networking (SDN) is a new paradigm that revolutionizes the idea of a software-driven network through the separation of control and data planes. It addresses the problems of traditional network architecture. Nevertheless, this brilliant architecture is exposed to several security threats, e.g., the distributed denial of service (DDoS) attack, which is hard to contain in such software-based networks. The concept of a centralized controller in SDN makes it a single point of attack as well as a si… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
38
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 66 publications
(54 citation statements)
references
References 20 publications
0
38
0
Order By: Relevance
“…SDN DDoS detection framework can be divided into two main modes. In the first mode, the smart DDOS detection algorithm, such as the deep learning algorithm [11,12], is deployed in the controller. However, the smart algorithm training process can significantly impact the controller and make the controller be the network bottleneck.…”
Section: Introductionmentioning
confidence: 99%
“…SDN DDoS detection framework can be divided into two main modes. In the first mode, the smart DDOS detection algorithm, such as the deep learning algorithm [11,12], is deployed in the controller. However, the smart algorithm training process can significantly impact the controller and make the controller be the network bottleneck.…”
Section: Introductionmentioning
confidence: 99%
“…Gadze et al [196] analyze the DL-based models' performance for identifying and mitigating DDoS attacks in SDN. The primary focus of their investigation is to detect UDP, TCP, and ICMP flood attacks.…”
Section: Supervised DL Based Ids In Sdnmentioning
confidence: 99%
“…[170]- [172], [226], [235] DL [190], [196] RL [181] Ensemble [239] UNSW-NB15: This dataset includes nine diverse categories of attacks and a wide category of regular activities in practical life. Training set contains 175,341 records, and 82,332 records present in the test set collected from various forms, attacks, and regular records [279].…”
Section: Analysisbasedmentioning
confidence: 99%
“…The experiment conducted by Gadze et al [10], they used RNN and LSTM in the software-defined networking (SDN) controller to identify and mitigate DDoS attacks. It was gathering certain network parameters when operating in a normal and also when subjected to DDoS attack.…”
Section: Literature Reviewmentioning
confidence: 99%