2022
DOI: 10.1016/j.jestch.2022.101176
|View full text |Cite
|
Sign up to set email alerts
|

Detecting flooding DDoS attacks in software defined networks using supervised learning techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(13 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…Recent studies demonstrated that SL techniques can effectively detect and mitigate DDoS attacks. Song et al [94] investigated the performance of various SL techniques for DDoS attack detection in software-defined networks (SDNs). The authors evaluated the following eight techniques.…”
Section: A Machine Learning-based Approaches In Sdn Networkmentioning
confidence: 99%
“…Recent studies demonstrated that SL techniques can effectively detect and mitigate DDoS attacks. Song et al [94] investigated the performance of various SL techniques for DDoS attack detection in software-defined networks (SDNs). The authors evaluated the following eight techniques.…”
Section: A Machine Learning-based Approaches In Sdn Networkmentioning
confidence: 99%
“…Authors in [11] introduced a lightweight supervised learning model to identify DDoS attacks targeting SDN controllers using only one feature of fluctuation of flow, which is the count of packet-in messages to the controller in a fixed time slice and for many consecutive times to avoid the behavior of a normal burst. They created their own dataset for the proposed system, but for testing and training their model, they used the InSDN dataset.…”
Section: Current Research Reviewmentioning
confidence: 99%
“…Authors in [10] argue that SDN networks may be more susceptible to malicious traffic than traditional environments due to the decoupling of the control plane and data plane. A security breach in conventional networks causes only minor damage to a small portion of the network, whereas an attack on the SDN controller might have catastrophic consequences for the entire network [7][8][9][10][11]. The attacks target different parts of SDN, as depicted in Figure 1.…”
Section: Introductionmentioning
confidence: 99%
“…Typically, an OpenFlow switch always sends the relevant information of any new flow it receives to the controller for instructions on how to handle it. As a result, most DDoS attacks in SDN exploit vulnerabilities in the OpenFlow protocol [11] . Firstly, since the control plane is situated between the application plane and the forwarding plane, providing a programming interface to the upper layer and controlling hardware devices to the lower layer, if the control plane is compromised, the entire SDN can be affected.…”
Section: Organizational Forms Of Ddos Attacks In Sdnmentioning
confidence: 99%