2021
DOI: 10.1002/int.22442
|View full text |Cite
|
Sign up to set email alerts
|

CyberPulse++: A machine learning‐based security framework for detecting link flooding attacks in software defined networks

Abstract: A new class of link flooding attacks (LFA) can cut off internet connections of target links by employing legitimate flows to congest these without being detected. LFA is especially powerful in disrupting traffic in software‐defined networks if the control channel is targeted. Most of the existing solutions work by conducting a deep packet‐level inspection of the physical network links. Therefore these techniques incur a significant performance overhead, are reactive, and result in damage to the network before … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 43 publications
0
4
0
Order By: Relevance
“…The packet metadata describes the content length and type, enabling network service providers to optimize network behaviours accordingly. OpenFlow channel and its north and southbound interfaces are prone to attacks [61]. In this case, ICN can protect the content itself, securing the overall network.…”
Section: Software-defined Information-centric Networking For Iotmentioning
confidence: 99%
“…The packet metadata describes the content length and type, enabling network service providers to optimize network behaviours accordingly. OpenFlow channel and its north and southbound interfaces are prone to attacks [61]. In this case, ICN can protect the content itself, securing the overall network.…”
Section: Software-defined Information-centric Networking For Iotmentioning
confidence: 99%
“…At the same time, in the field of network security, the technology and means of network attackers are constantly being updated, and the traditional Network Security Defense (NSD) method also appears inadequate. Deep Reinforcement Learning (DRL), as an important technology in the field of AI, has the ability to autonomously learn and make decisions in complex environments, providing new possibilities for solving game enemy design and NSD [4][5]. By introducing DRL into the field of game enemy design and NSD, we can achieve intelligent behavior generation of game enemies and adaptive defense strategies against unknown attacks, thereby improving the gaming experience and network security level.…”
Section: Introductionmentioning
confidence: 99%
“…An indirect DDoS 23 attack which is novel due to its design for cutting off internet connection for the entire region (cities, or even countries) after instantaneous selection for set of targeted links is Crossfire DDoS attack 24,25 . It mainly consists of:Link Map Construction; Target Links Selection; Botnet Coordination; …”
Section: Introductionmentioning
confidence: 99%