2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI) 2020
DOI: 10.1109/isriti51436.2020.9315510
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Analysis of DDoS Detection Techniques Based on Machine Learning in OpenFlow Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(9 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…When a centralized control system is implemented in this manner, a security vulnerability is created that an attacker could exploit to change the topology directly connected to a controller. DDoS attacks can therefore be carried out both locally and globally [18].…”
Section: Background Studymentioning
confidence: 99%
See 2 more Smart Citations
“…When a centralized control system is implemented in this manner, a security vulnerability is created that an attacker could exploit to change the topology directly connected to a controller. DDoS attacks can therefore be carried out both locally and globally [18].…”
Section: Background Studymentioning
confidence: 99%
“…Rahman, M. A. developed a framework to track anomalies that includes several steps, such as feature selection, data preprocessing, data analysis to apply various machine learning algorithms, training the dataset to algorithms, testing the dataset, and contrasting the results with various algorithmic approaches [18]. the creation of a classifier that can tell malicious packets apart from normal ones.…”
Section: Comparative Review Based On Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…Rapid Developments in computer network technology are currently experiencing significant changes, especially with the establishment of SDN [1]. SDN is the latest architecture that is used to replace the traditional scheme on the network.…”
Section: Introductionmentioning
confidence: 99%
“…While the NB algorithm had the worst accuracy rate among other algorithms with an accuracy rate of 79% on the controller and 66% on the switch. Furthermore, research [1] proposed a reactive application-based solution that could identify, detect, and mitigate attacks comprehensively. In his research, an application had been built using machine learning algorithms including, Support Vector Machine (SVM) with the Linear and RBF kernel, K-Nearest Neighbor (KNN), Decision Tree (DTC), Random Forest (RFC), Multi-Layer Perceptron (MLP), and Gaussian Naïve Bayes (GNB).…”
Section: Introductionmentioning
confidence: 99%