2019 IEEE International Conference on Clean Energy and Energy Efficient Electronics Circuit for Sustainable Development (INCCES 2019
DOI: 10.1109/incces47820.2019.9167698
|View full text |Cite
|
Sign up to set email alerts
|

The Detection and Mitigation of Distributed Denial-of-Service (DDOS) Attacks in Software Defined Networks using Distributed Controllers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…The results showed great ability in maintaining the consistency of the network state view and end-to-end provisioning services. Kavitha et al [11] proposed a collaborative approach for DDoS attack detection in a distributed SDN multicontroller platform. It also analyzed DDoS attacks in distributed controllers, which differ from centralized controllers in SDNs.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The results showed great ability in maintaining the consistency of the network state view and end-to-end provisioning services. Kavitha et al [11] proposed a collaborative approach for DDoS attack detection in a distributed SDN multicontroller platform. It also analyzed DDoS attacks in distributed controllers, which differ from centralized controllers in SDNs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The proposed entropy mechanism compares the entropy flow values of source and destination IP addresses that are detected by the SDN controller to predefined entropy threshold values that change adaptively based on network dynamics [8]. In this regard, some of the entropy-based DDoS attack detection solutions are located in various studies and explained in the following section [9][10][11][12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…The study detected attacks and provided an attack mitigation process through the implementation of a monitoring solution that used the POX controller with the Open vSwitch. Elsayed et al [23] proposed DDoSNet, against DDoS attacks in SDN environments. This method was based on Deep Learning (DL) technique, combining the Recurrent Neural Network (RNN) with autoencoder.…”
Section: Related Workmentioning
confidence: 99%
“…These neural networks are classi ed based upon types of data as LSTM, RNN, MLP, GRU, etc. Some of the DDoS attack solutions: LSTM [24], [25], [41], [19], RNN [23], MLP [20], and GRU.…”
Section: Introductionmentioning
confidence: 99%
“…An early detection method was proposed on a distributed SDN multi-controller [27]. The method used is entropy detection based on destination IP address and specific threshold for each controller.…”
Section: Introductionmentioning
confidence: 99%