2016
DOI: 10.1016/j.comnet.2016.05.019
|View full text |Cite
|
Sign up to set email alerts
|

Suspicious traffic sampling for intrusion detection in software-defined networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 62 publications
(38 citation statements)
references
References 6 publications
(11 reference statements)
0
35
0
Order By: Relevance
“…The performance of the proposed work is analysed in terms of accuracy, sensitivity, specificity and execution time. The experimental outcome of the proposed approach is compared against anti-DDoS [5], DDoS attack protection [14], suspicious traffic sampling [15].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The performance of the proposed work is analysed in terms of accuracy, sensitivity, specificity and execution time. The experimental outcome of the proposed approach is compared against anti-DDoS [5], DDoS attack protection [14], suspicious traffic sampling [15].…”
Section: Resultsmentioning
confidence: 99%
“…This work serves better but the false positive rates are bit higher, so as to improve the accuracy rates. A traffic sampling strategy is proposed in [15], which computes the average sampling rate for each and every switch and the traffic flow is sampled based on the sampling rates. The traffic flow sampling is attained by SDN based framework.…”
Section: Review Of Literaturementioning
confidence: 99%
“…The data could be difficult to be managed efficiently by on-hand techniques, tools and devices. To mitigate this issue, traffic sampling is a potential solution for deploying IDSs in a large-sized network [14]. In addition, pre-filtration can be considered to reduce unwanted traffic and lighten the processing burden [27], [30].…”
Section: Discussion and Challengesmentioning
confidence: 99%
“…IDSs have also been applied for SDN applications. For example, Ha et al [14] developed a traffic sampling strategy to reduce the processing capability of an IDS in SDN, which samples traffic flows according to defined sampling rates. AlEroud and Alsmadi [1] proposed a detection approach to identify DoS attack in a SDN environment, using an inference mechanism and a packet aggregation technique to create attack signatures and predict attacks.…”
Section: B Related Workmentioning
confidence: 99%
“…Kawahara et al use sampled traffic to obtain flow statistics to detect traffic anomalies. Ha et al propose a strategy to determine the optimal sampling rate for the traffic to be inspected by the IDS to not exceed the capacity of the IDS. They hence formulated an optimization problem that determines packet sampling rate for each switch in the SDN network such that the IDS is not overloaded.…”
Section: Related Workmentioning
confidence: 99%