Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 39 publications
0
5
0
Order By: Relevance
“…To identify the Man In The Middle (MITM) attack, Sebbar et al [148] propose a model using the RF algorithm that selects nodes based on the context to identify ARP resolution instances and any eavesdropping or poisoning within the network. Any connection request with TTL value greater than 200 milliseconds is considered as an attempt of an MITM attack.…”
Section: Supervised ML Based Ids In Sdnmentioning
confidence: 99%
See 3 more Smart Citations
“…To identify the Man In The Middle (MITM) attack, Sebbar et al [148] propose a model using the RF algorithm that selects nodes based on the context to identify ARP resolution instances and any eavesdropping or poisoning within the network. Any connection request with TTL value greater than 200 milliseconds is considered as an attempt of an MITM attack.…”
Section: Supervised ML Based Ids In Sdnmentioning
confidence: 99%
“…Shallow ML [121], [122], [276], [127], [133], [139], [149], [170]- [172], [250] DL [195]- [197], [202], [216] RL [184] Sessionbased Shallow ML [148] DL [187] HBM Log-based Shallow ML [84], [88], [133], [171] DBM ABM…”
Section: Packetbasedmentioning
confidence: 99%
See 2 more Smart Citations
“…The adoption of technologies such as the Internet of Things (IoT), artificial intelligence (AI), and quantum computing, has increased the threat level [2], making network security challenging and necessitating a new paradigm in its implementation. Various attacks have overwhelmed previous approaches (classified into signature-based intrusion detection systems [3,4] and anomaly-based intrusion detection systems [5,6]), increasing the need for advanced, adaptable and resilient security implementation [1,2,7,8]. For this reason, the traditional network design platform is being transformed into the evolving SDN implementation [9].…”
Section: Introductionmentioning
confidence: 99%