2022
DOI: 10.1109/access.2022.3190008
|View full text |Cite
|
Sign up to set email alerts
|

A Gated Recurrent Unit Deep Learning Model to Detect and Mitigate Distributed Denial of Service and Portscan Attacks

Abstract: Nowadays, it is common for applications to require servers to run constantly and aim as close as possible to zero downtime. The slightest failure might cause significant financial losses and sometimes even lives. For this reason, security and management measures against network threats are fundamental and have been researched for years. Software-defined networks (SDN) are an advancement in network management due to their centralization of the control plane, as it facilitates equipment setup and administration … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 56 publications
0
8
0
Order By: Relevance
“…GRU offers update and reset gates to control the flow of information within the unit, allowing it to keep and discard information adaptively based on sequence requirements over various periods [33]. This model has a simpler architecture and fewer parameters, making its computation faster and more efficient [34]. GRU does not annihilate essential features but maintains relevant information through its sequential gate mechanism.…”
Section: Machine Learning Algorithmsmentioning
confidence: 99%
“…GRU offers update and reset gates to control the flow of information within the unit, allowing it to keep and discard information adaptively based on sequence requirements over various periods [33]. This model has a simpler architecture and fewer parameters, making its computation faster and more efficient [34]. GRU does not annihilate essential features but maintains relevant information through its sequential gate mechanism.…”
Section: Machine Learning Algorithmsmentioning
confidence: 99%
“…An unauthorized user could carry out this process while communicating with the API. Consequently, SDN applications are seen as a direct target to disrupt the service of controllers [19].…”
Section: Vulnerable Points In the Sdn Environmentmentioning
confidence: 99%
“…Non-DL-based approaches are often used in behaviour-based and statistical anomalybased detection methods. They are effective in detecting known attack patterns but may struggle with detecting complex or evolving attack techniques [19].…”
Section: Anomaly -Based Detectionmentioning
confidence: 99%
See 2 more Smart Citations