2021
DOI: 10.1007/s11277-021-09071-1
|View full text |Cite
|
Sign up to set email alerts
|

A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(19 citation statements)
references
References 38 publications
0
18
0
1
Order By: Relevance
“…Centralize SDN controller functions through seamless connections to all the forwarding devices. Centralized SDN architecture provisions robust implementation of network optimization strategies at the application layer such as load balancing and interference mitigation [65]. However, a single centralized SDN controller faces a series of limitations, including bandwidth issues and processing overload in massive communication scenarios.…”
Section: A Centralized Sdn Controllersmentioning
confidence: 99%
See 1 more Smart Citation
“…Centralize SDN controller functions through seamless connections to all the forwarding devices. Centralized SDN architecture provisions robust implementation of network optimization strategies at the application layer such as load balancing and interference mitigation [65]. However, a single centralized SDN controller faces a series of limitations, including bandwidth issues and processing overload in massive communication scenarios.…”
Section: A Centralized Sdn Controllersmentioning
confidence: 99%
“…Ryu is widely used to implement various SDN-based interference mitigation schemes, such as ML-based interference mitigation [65] and NS in 5G [69]. In [70], the authors suggested the addition of middleware in Ryu SDN controller for the optimized transport layer management in 5G networks.…”
Section: A Centralized Sdn Controllersmentioning
confidence: 99%
“…Additional papers [ 23 , 24 , 25 , 26 , 27 , 31 , 32 , 33 , 34 ] presented other approaches to detect DDoS attacks. These include using deep learning [ 25 ], traffic authentication [ 26 ], a cascaded federated deep learning framework [ 25 ], and artificial intelligence merged methods [ 31 ].…”
Section: Related Workmentioning
confidence: 99%
“…Researchers have recently employed advanced methods such as deep learning to enable tracing the source of an attack [21]. This, in turn, will facilitate specifically targeting the source and identify the type of denial-of-service attack.…”
Section: Introductionmentioning
confidence: 99%