2018
DOI: 10.1155/2018/4723862
|View full text |Cite
|
Sign up to set email alerts
|

Detecting P2P Botnet in Software Defined Networks

Abstract: Software Defined Network separates the control plane from network equipment and has great advantage in network management as compared with traditional approaches. With this paradigm, the security issues persist to exist and could become even worse because of the flexibility on handling the packets. In this paper we propose an effective framework by integrating SDN and machine learning to detect and categorize P2P network traffics. This work provides experimental evidence showing that our approach can automatic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(19 citation statements)
references
References 23 publications
0
19
0
Order By: Relevance
“…The term “botnet” is derived from the words “robot” and “network”, which evokes the Bots’ autonomy to perform several tasks. Botnets are in fact key enablers of several other cyber-attacks, hence representing one of the most serious threats in the area of network security [ 7 , 8 , 9 ]. Having this scenario in mind, organizations need to endorse the preparedness of their infrastructures in order to reactive/proactive deal with security incidents related to botnets [ 10 ], on which the emerging network management paradigms raise as promising cybersecurity enablers [ 11 , 12 ].…”
Section: Introductionmentioning
confidence: 99%
“…The term “botnet” is derived from the words “robot” and “network”, which evokes the Bots’ autonomy to perform several tasks. Botnets are in fact key enablers of several other cyber-attacks, hence representing one of the most serious threats in the area of network security [ 7 , 8 , 9 ]. Having this scenario in mind, organizations need to endorse the preparedness of their infrastructures in order to reactive/proactive deal with security incidents related to botnets [ 10 ], on which the emerging network management paradigms raise as promising cybersecurity enablers [ 11 , 12 ].…”
Section: Introductionmentioning
confidence: 99%
“…As indicated in the literature [53][54][55][56][57], it is essential to strengthen evidence provided by the features described on each dataset as this positively influences SL training routines by capturing maximum variability of the inputs and expanding the capacity of inference to the resulting models. If at some point ISCX-Bot-2014 and CIDDS-001 features produce correlation effects, this downgrades the computation of the algorithm.…”
Section: Feature Extraction and Selectionmentioning
confidence: 99%
“…In this context, NNs [97][98][99][100][101][102][103][104][105][106], SVM [105][106][107][108][109][110][111][112][113], DTs [114][115][116][117][118][119][120][121][122][123][124][125][126][127][128], ensemble methods [129][130][131][132][133][134][135][136][137][138][139][140] and supervised deep learning [44,[141][142][143][144] approaches were the most used...…”
Section: Supervised Learning In Sdnmentioning
confidence: 99%