2018
DOI: 10.1016/j.future.2018.07.017
|View full text |Cite
|
Sign up to set email alerts
|

An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
57
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 158 publications
(58 citation statements)
references
References 34 publications
1
57
0
Order By: Relevance
“…Machine learning techniques used for anomaly detection distinguish malicious traffic flows based on characteristics of network traffic [50] and utilize models that learn automatically from these experiences. It uses supervised learning algorithms such as support vector machine (SVM), Decision tree, etc.…”
Section: ) Machine Learning-based Schemesmentioning
confidence: 99%
“…Machine learning techniques used for anomaly detection distinguish malicious traffic flows based on characteristics of network traffic [50] and utilize models that learn automatically from these experiences. It uses supervised learning algorithms such as support vector machine (SVM), Decision tree, etc.…”
Section: ) Machine Learning-based Schemesmentioning
confidence: 99%
“…As demonstrated in Eqs. 7- (8), the Gain Ratio is a measure of the decision tree to estimate the performance. Assume that there is a training dataset D, the expected information required to accurately categorize an attack in IDS, x j ∈ D is calculated as:…”
Section: Decision Treementioning
confidence: 99%
“…Because these profiles are based on information on normal network behaviors, the anomaly-based detection schemes can recognize previously unknown attacks. As such, it has opened up an enormous research area for researchers [5,8]. In general, effectiveness is measured by detection speed, frequency of false alarms; and efficacy is estimated by response time when an attack occurs.…”
Section: Introductionmentioning
confidence: 99%
“…The controller then creates the rule and action to be sent to the switch through the Packet_out message. This workflow provides effective and flexible traffic management and control; however, the centralized control approach is a target of major security attacks [7], [8].…”
Section: Introductionmentioning
confidence: 99%