2019
DOI: 10.1007/978-981-13-7564-4_5
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging Machine Learning Approach to Setup Software-Defined Network(SDN) Controller Rules During DDoS Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 33 publications
(19 citation statements)
references
References 10 publications
0
17
0
Order By: Relevance
“…Conti et al [18] Image processing IA Immune Ink-on-paper fingerprints identification Sen et al [152] Power distribution VR GA Optimize dispatching for micro-grid energy Yeom et al [153], Kitchens et al [154] Face& Keystroke analysis IA NN Person authentication using NN Ku [155] Keystroke analysis IA NN Password authentication for multiserver architecture Gai et al [40] Adaptive access ACS GA Allocate multimedia data in diverse memory Ye et al [41] Adaptive access ACS GA QoS-aware service Hartman et al [42] Scalable storage ACS Immune Cost-effective storage systems Lin et al [46] Trust based ACS Immune A mutual trust based ACS Tzeng [50] Hierarchical key ACS Immune Time-bound cryptographic scheme Sen et al [156] DDoS attack detection PNS NN Identify incoming DDoS type traffic attack…”
Section: Discussionmentioning
confidence: 99%
“…Conti et al [18] Image processing IA Immune Ink-on-paper fingerprints identification Sen et al [152] Power distribution VR GA Optimize dispatching for micro-grid energy Yeom et al [153], Kitchens et al [154] Face& Keystroke analysis IA NN Person authentication using NN Ku [155] Keystroke analysis IA NN Password authentication for multiserver architecture Gai et al [40] Adaptive access ACS GA Allocate multimedia data in diverse memory Ye et al [41] Adaptive access ACS GA QoS-aware service Hartman et al [42] Scalable storage ACS Immune Cost-effective storage systems Lin et al [46] Trust based ACS Immune A mutual trust based ACS Tzeng [50] Hierarchical key ACS Immune Time-bound cryptographic scheme Sen et al [156] DDoS attack detection PNS NN Identify incoming DDoS type traffic attack…”
Section: Discussionmentioning
confidence: 99%
“…The encoding algorithms [17] that are based on the correlation between high cardinal categorical attributes and target or class variables provides a nice solution to this problem. The supervised ratio algorithm computes the numerical value for a certain category that is the ratio between the total number of rows that category present in the positive class and total data points.…”
Section: Methodsmentioning
confidence: 99%
“…Classification: The algorithm learns how to classify new observations from a labeled training dataset [44]. The output of the classification can be either bi-class (e.g., whether a given client is a regular user or an attacker, or whether an email is spam or non-spam) or multi-class, in which case it contains more than two classes.…”
Section: A Supervised Learningmentioning
confidence: 99%