2022
DOI: 10.1016/j.eswa.2022.116748
|View full text |Cite
|
Sign up to set email alerts
|

A novel approach for accurate detection of the DDoS attacks in SDN-based SCADA systems based on deep recurrent neural networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
27
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(27 citation statements)
references
References 31 publications
0
27
0
Order By: Relevance
“…Datasets Metrics Year BPNN [25] World Cup 1998 Dataset Precision / Recall / F1-score / Accuracy 2020 UADAIN [26] ISCX 2012 / NSL-KDD Accuracy / Detection rate / FAR 2022 OCSA-RNN [28] KDD99 Precision / Recall / F-Measure / Accuracy 2021 LSTM-GRU-SVM [29] SCADA Accuracy / Sensitivity / Specificity / Precision / F1-score Confusion matrix 2022…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Datasets Metrics Year BPNN [25] World Cup 1998 Dataset Precision / Recall / F1-score / Accuracy 2020 UADAIN [26] ISCX 2012 / NSL-KDD Accuracy / Detection rate / FAR 2022 OCSA-RNN [28] KDD99 Precision / Recall / F-Measure / Accuracy 2021 LSTM-GRU-SVM [29] SCADA Accuracy / Sensitivity / Specificity / Precision / F1-score Confusion matrix 2022…”
Section: Methodsmentioning
confidence: 99%
“…This combination of feature selection and DL classification methods achieved good results. Hüseyin Polat et al [29] combined long short-term memory (LSTM) and gated recurrent units for DDoS feature extraction and classification. This combination of multiple DL algorithms has also been continuously investigated in recent years.…”
Section: Related Workmentioning
confidence: 99%
“…P. Hüseyin et al [17] applied an IDS to identify DDoS in SDN networks. The main contribution of this research is to merge two DL approaches in parallel for traffic classification and SVM for feature extraction.…”
Section: E Related Work and Critical Reviewmentioning
confidence: 99%
“…The security objectives in this situation are unauthorized access, data modification, access control, integrity, and availability [12][13]. Thus, an SDN architecture based on MAC is recommended to detect and prevent unauthorized access [14]. In MAC-based SDN architectures, controllers manage the flow of data packets based on the MAC addresses of devices connected to the network, making intrusion detection an important security concern [15].…”
Section: Introductionmentioning
confidence: 99%