2019 International Conference on Information and Communication Technology Convergence (ICTC) 2019
DOI: 10.1109/ictc46691.2019.8939829
|View full text |Cite
|
Sign up to set email alerts
|

A Robust TCP-SYN Flood Mitigation Scheme Using Machine Learning Based on SDN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Deepa et al 40 proposed an approach that combines different ML algorithms (KNN, SVM, and Self Organizing Maps ‐ SOM) to perform the attack traffic classification. In the same line, Tuan et al 41 proposed the use of different approaches, combining entropy with KNN to detect DDoS attacks. Similarly, the authors in Reference 42 proposed a solution that allows entropy to be combined with different ML algorithms, such as Multi‐Layer Perceptron (MLP), KNN, and SVM.…”
Section: Related Workmentioning
confidence: 99%
“…Deepa et al 40 proposed an approach that combines different ML algorithms (KNN, SVM, and Self Organizing Maps ‐ SOM) to perform the attack traffic classification. In the same line, Tuan et al 41 proposed the use of different approaches, combining entropy with KNN to detect DDoS attacks. Similarly, the authors in Reference 42 proposed a solution that allows entropy to be combined with different ML algorithms, such as Multi‐Layer Perceptron (MLP), KNN, and SVM.…”
Section: Related Workmentioning
confidence: 99%
“…At present, the research on SYN flood attack detection can be divided into three categories: statistical methods [4,5], machine learning methods [6][7][8][9], and deep learning methods.…”
Section: Related Workmentioning
confidence: 99%
“…Authors in Ref. [21] propose a SYN flood mitigation algorithm based on machine learning. e algorithm calculates the entropy of ports per each IP address and discerns anomaly traffic using K-Nearest Neighbors (KNN) method and CAIDA dataset.…”
Section: Proposals For Tcp Syn Flood Attackmentioning
confidence: 99%