2020
DOI: 10.1016/j.jnca.2020.102756
|View full text |Cite
|
Sign up to set email alerts
|

Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…However, the environmental variations that exist in this technique affect the detection performance. To improve the detection performance, Çakmakçı et al (2020) designed Mahalanobis distance and Kernel-based learning models for online DDoS attack identification. At first, entropy and statistical features were extracted for a better detection process.…”
Section: Motivationmentioning
confidence: 99%
“…However, the environmental variations that exist in this technique affect the detection performance. To improve the detection performance, Çakmakçı et al (2020) designed Mahalanobis distance and Kernel-based learning models for online DDoS attack identification. At first, entropy and statistical features were extracted for a better detection process.…”
Section: Motivationmentioning
confidence: 99%
“…However, the dataset used in the proposed model is old, and the authors need to validate their approach in a large-scale real environment. Çakmakçı et al [128] proposed a novel DDoS detection method in which the proposed algorithm is improved based on a kernelbased online anomaly detection approach. The proposed work used an unsupervised machine learning algorithm and the CICIDS2017 dataset.…”
Section: A Ddos Defense Systems Based On ML Techniques In Cloud Compmentioning
confidence: 99%
“…However, while bringing essential improvements to the current network architecture, the SDN, as any centralized service, has as a critical failure spot its central controller. Malicious users may target this controller aiming to impair the whole network operation through the usage of different approaches, such as intrusions (Lopez-Martin et al, 2017) and denial of service (DoS) attacks (Daneshgadeh C ¸akmakçı et al, 2020;Wang et al, 2020;Xu et al, 2020;Zhang et al, 2020). Thus, efficient protection mechanisms are needed in SDNs to guarantee the availability of the network and the quality of the provided services (Correa Chica et al, 2020).…”
Section: Introductionmentioning
confidence: 99%