2023
DOI: 10.1007/s11227-023-05072-y
|View full text |Cite
|
Sign up to set email alerts
|

An efficient centralized DDoS attack detection approach for Software Defined Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 49 publications
0
3
0
Order By: Relevance
“…Cybercriminals can use behavioral data [48]. Consequently, businesses are required to attract more notice and be more proactive in protecting their data for several purposes [49]. The potential uses of these data include directing user experience models, providing services and products, helping businesses to make conscious decisions, and outfitting marketing methods [50].…”
Section: Various Features Of Iob For the Healthcare Sectionmentioning
confidence: 99%
“…Cybercriminals can use behavioral data [48]. Consequently, businesses are required to attract more notice and be more proactive in protecting their data for several purposes [49]. The potential uses of these data include directing user experience models, providing services and products, helping businesses to make conscious decisions, and outfitting marketing methods [50].…”
Section: Various Features Of Iob For the Healthcare Sectionmentioning
confidence: 99%
“…In Reference [35], the authors conducted a study on feature extraction techniques to identify DDoS attacks in SD‐IoT. They evaluated their approach using the Distributed Internet Traffic Generator and hping3 tools and tested it with different machine learning models such as Random Forest (RF), Light Gradient Boosting Machine (LGBM), Support Vector Machine (SVM), and K Nearest Neighbor (KNN).…”
Section: Literature Reviewmentioning
confidence: 99%
“…In Reference [35], the authors conducted a study on feature extraction techniques to identify DDoS attacks in SD-IoT. They evaluated their approach using the Distributed Internet Traffic Generator and hping3 tools and tested it with…”
Section: Introductionmentioning
confidence: 99%