ICC 2020 - 2020 IEEE International Conference on Communications (ICC) 2020
DOI: 10.1109/icc40277.2020.9149276
|View full text |Cite
|
Sign up to set email alerts
|

TPDD: A Two-Phase DDoS Detection System in Software-Defined Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 15 publications
0
3
0
1
Order By: Relevance
“…[59], [60], [61], [62], [63], [64], [65], [66], [67], [68], [69], [70], [71], [72], [73], [74], [75], [76], [77], [78], [79], [80], [81], [82], [83], [84], [85], [86], [87], [88], [89], [90], [91], [92], [93], [94], [95], [96], [97], [98], [99] IM 5 3.0 % [100], [101], [102], [103], [104] NOMS 15 9.0 % [105], [106], [107], [108], [109], [110],…”
Section: Publication Venuesunclassified
“…[59], [60], [61], [62], [63], [64], [65], [66], [67], [68], [69], [70], [71], [72], [73], [74], [75], [76], [77], [78], [79], [80], [81], [82], [83], [84], [85], [86], [87], [88], [89], [90], [91], [92], [93], [94], [95], [96], [97], [98], [99] IM 5 3.0 % [100], [101], [102], [103], [104] NOMS 15 9.0 % [105], [106], [107], [108], [109], [110],…”
Section: Publication Venuesunclassified
“…Other than the reviewed ML-DL-based IDS solutions in SDN, researchers all over the world also adopted numerous other technologies to detect various attacks in the context of SDNs. For instance, statistics algorithms [37], [111], [253]- [255], [134], [144], [159], [167], [170]- [172], [226], similarity-based methods [256], graph model-based methods [257]- [259], third-party software like Snort [57], [94], [95], [260]- [262], threshold-based methods [51], [108], [254], [263], [264], fuzzy evaluations [265]- [267], inference-based methods [257], [268], blockchainbased methods [269]- [271], and honeynet-based methods [71], [272]- [274].…”
Section: Random Forest (Rf)mentioning
confidence: 99%
“…According to the above description, δq(t) and δW(t) in the queue model (2) under DDoS attacks will be transformed as follows:…”
Section: Attack Model As Depicted Inmentioning
confidence: 99%
“…e motivations of DDoS attacks range from commercial competition to extortion and even political motives. ere are growing research interests on DDoS attacks, mainly including detecting DDoS attacks and mitigating DDoS attacks [1][2][3]. e biggest disadvantage of intrusion detection system (IDS), as a DDoS defense platform, is that IDS can only detect the attacks, but it does nothing to alleviate the attacks [4,5].…”
Section: Introductionmentioning
confidence: 99%