2020
DOI: 10.1109/access.2020.2999668
|View full text |Cite
|
Sign up to set email alerts
|

Detecting DoS Attacks Based on Multi-Features in SDN

Abstract: Denial of Service (DoS) attack is a serious threat to Software Defined Network (SDN). Although many research efforts have been devoted to identify new features for DoS attack detection, the existing approaches are not able to detect various types of DoS attacks. In SDN, DoS attacks against data plane are mainly organized in two ways: 1) DoS attack with multiple flow entries (M-DoS) to exhaust the Ternary Content-Addressable Memory (TCAM) resource of the switch. 2) DoS attack with a single well-designed entry (… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(10 citation statements)
references
References 30 publications
0
6
0
2
Order By: Relevance
“…Datasets Metrics Year BPNN [25] World Cup 1998 Dataset Precision / Recall / F1-score / Accuracy 2020 UADAIN [26] ISCX 2012 / NSL-KDD Accuracy / Detection rate / FAR 2022 OCSA-RNN [28] KDD99 Precision / Recall / F-Measure / Accuracy 2021 LSTM-GRU-SVM [29] SCADA Accuracy / Sensitivity / Specificity / Precision / F1-score Confusion matrix 2022…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Datasets Metrics Year BPNN [25] World Cup 1998 Dataset Precision / Recall / F1-score / Accuracy 2020 UADAIN [26] ISCX 2012 / NSL-KDD Accuracy / Detection rate / FAR 2022 OCSA-RNN [28] KDD99 Precision / Recall / F-Measure / Accuracy 2021 LSTM-GRU-SVM [29] SCADA Accuracy / Sensitivity / Specificity / Precision / F1-score Confusion matrix 2022…”
Section: Methodsmentioning
confidence: 99%
“…Although ML algorithms achieve good network traffic anomaly detection results, the rapid change of network data and the large data volume have caused more attention to be given to DL techniques. Meng Yue et al [25] combined backpropagation neural networks (BPNN) in software-defined networks (SDN) for DoS detection, achieving a detection rate. Y Shi and H Shen [26] proposed an unsupervised network anomaly traffic detection method based on an artificial immune network (UADAIN), which has a better detection effect than unsupervised methods such as K-means clustering.…”
Section: Related Workmentioning
confidence: 99%
“…In Reference [22], Yue et al proposed M-DoS attack and S-DoS attack, respectively, representing the DoS attack with multiple flow entries (M-DoS) to exhaust the Ternary Content-Addressable Memory resource of the switch and DoS attack with a single well-designed entry (S-DoS) to overwhelm the target link then further impacting the controller. For these two kinds of attacks, they extracted six characteristics of the flow table, and used BP neural network to construct a classifier to distinguish the attack flow from normal flow.…”
Section: Types Of Ddos Attacks Ddos Attacks Derive Numerousmentioning
confidence: 99%
“…Este trabalho foi parcialmente financiado pelo CNPq, pela CAPES e pela CODATA-PB. segurança, portanto, enfrenta grandes ameaças de segurança [4] [5] [6].…”
Section: Introductionunclassified
“…Ataques DoS contra plano de dados, plano de controle ou aplicação SDN geralmente têm princípios e recursos diferentes, correspondentes a métodos de detecção especializados. Portanto, os ataques DoS devem ser estudados de acordo com diferentes planos, e os estudos existentes são comumente conduzidos dessa forma [6].…”
Section: Introductionunclassified