2021
DOI: 10.1109/access.2021.3109490
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Classification of DDoS Flooding Attacks on Software-Defined Networks: A Case Study for the Application of Machine Learning

Abstract: Software-defined networks (SDNs) offer robust network architectures for current and future Internet of Things (IoT) applications. At the same time, SDNs constitute an attractive target for cyber attackers due to their global network view and programmability. One of the major vulnerabilities of typical SDN architectures is their susceptibility to Distributed Denial of Service (DDoS) flooding attacks. DDoS flooding attacks can render SDN controllers unavailable to their underlying infrastructure, causing service… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 42 publications
(15 citation statements)
references
References 71 publications
0
12
0
Order By: Relevance
“…These findings reveal the significant impact of using the FS (based on GWO) on enhancing the IDS performance significantly. Besides, the performance of the proposed IDS was also compared against that of advanced counterparts mentioned in the literature including [11][12][13][14][15] to identify its efficiency. Although the IDSs attained comparable outcomes following accuracy, precision, recall, and F-measure, the proposed IDS outperformed the current IDSs in all evaluation metric as outlined in Fig.…”
Section: Results and Findingsmentioning
confidence: 99%
See 1 more Smart Citation
“…These findings reveal the significant impact of using the FS (based on GWO) on enhancing the IDS performance significantly. Besides, the performance of the proposed IDS was also compared against that of advanced counterparts mentioned in the literature including [11][12][13][14][15] to identify its efficiency. Although the IDSs attained comparable outcomes following accuracy, precision, recall, and F-measure, the proposed IDS outperformed the current IDSs in all evaluation metric as outlined in Fig.…”
Section: Results and Findingsmentioning
confidence: 99%
“…Such techniques are extensively deployed in traditional networks and ML-assisted SDNs. For example, ML-based IDS of DDoS flooding attacks on SDNs was presented in [11]. The common principle is depicted using a case study where experimental data (jitter, throughput, and response time metrics) from a representative SDN environment, which proves adequate for typical mid-sized and enterprise-wide networks, is employed to structure classification models that precisely determine and categorize DDoS flooding attacks.…”
Section: Related Workmentioning
confidence: 99%
“…At the same time, there is massive HTTP Flooding, which targets many people 58 . Sangodoyin et al 59 proposed a Software Defined Network on tree topology using Mininet emulator so that it can be used in wide area networks. This machine learning‐based method gave good accuracy in detecting HTTP Flooding attacks.…”
Section: Taxonomy Of Iot Security Attacksmentioning
confidence: 99%
“…Even though such mobile or ubiquitous HMIs will adequately support the quasi or full decentralisation of the control architectures of their associated ICs, as discussed above, they also make their ICSs prone to cyber attacks or threats due to their dedicated internet connectivity [35]. Several frameworks and/or methodologies such as the National Institute of Standards and Technology (NIST) framework [36,37] are available today to assess cyber attacks or threats such as denial of service [38] and devise the means of mitigating them in industrial applications, but cybersecurity has remained an area of ongoing research due to its very broad and dynamic nature in industrial applications [39].…”
Section: Related Workmentioning
confidence: 99%