2022
DOI: 10.11591/eei.v11i4.3835
|View full text |Cite
|
Sign up to set email alerts
|

Distributed denial of service attacks detection for software defined networks based on evolutionary decision tree model

Abstract: The software defined networks (SDN) system has modern techniques in networking, it separates the forwarding plane from the control plane and works to collect control functions in a central unit (controller), and this separation process leads to many advantages, such as cost reduction and programming ability. Concurrently, because of its centralized architecture, it is prone to a variety of attacks. Distributed denial of service (DDoS) attack has a significant impact on SDN, it is characterized by its ability t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…It can be claimed that the system's effectiveness rises in direct proportion to the accuracy of the data. The suggested approach for intrusion detection is validated using the distributed denial of service (DDoS) [24][27], CIC-DDoS2019 dataset (87 features) in order to get over these challenges as is represented in Figures 2 and 3. In this phase, all 87 features of the dataset is collected and preprocessed for checking the validation of data.…”
Section: Methods 31 Phase 1: Dataset Collection and Preprocessingmentioning
confidence: 99%
See 1 more Smart Citation
“…It can be claimed that the system's effectiveness rises in direct proportion to the accuracy of the data. The suggested approach for intrusion detection is validated using the distributed denial of service (DDoS) [24][27], CIC-DDoS2019 dataset (87 features) in order to get over these challenges as is represented in Figures 2 and 3. In this phase, all 87 features of the dataset is collected and preprocessed for checking the validation of data.…”
Section: Methods 31 Phase 1: Dataset Collection and Preprocessingmentioning
confidence: 99%
“…In this phase in order to increase the task scheduling reaction time, Algorithm 1 divides the priority instances into various priority queues. For training the model, the algorithm takes in 87 features as input (CIC-DDos2019 dataset) , and is given to the procedure data_ processing selection where priority resolver is used as the classifier and dimensionality reduction method [26], [27] is applied to reduce features from 87 to 67 maintaining the efficiency and giving the required accuracy and other evaluation metrics. Algorithm: the model is designed to perform the following actions: input data, perform feature selection based on priority resolver, train the model, and classification of label data.…”
Section: Phase 3: Priority Resolver and Training Developermentioning
confidence: 99%
“…Other pre-processing methods include category value encoding, addressing missing values, and null value elimination. Categorical variables lacking numerical values, including source-destination IP and protocol, were encoded using one-hot encoding [50].…”
Section: Comparative Review Based On Datasetsmentioning
confidence: 99%
“…As the name suggests, DT is a tree-based model characterized by its simplicity in understanding decisions and the ability to select the most preferential features [19]. In addition, it can classify data without vast calculations [20]. b.…”
Section: Learning Stagementioning
confidence: 99%