2023
DOI: 10.11591/ijece.v13i3.pp3099-3110
|View full text |Cite
|
Sign up to set email alerts
|

An intelligent system to detect slow denial of service attacks in software-defined networks

Abstract: <span lang="EN-US">Slow denial of service attack (DoS) is a tricky issue in software-defined network (SDN) as it uses less bandwidth to attack a server. In this paper, a slow-rate DoS attack called Slowloris is detected and mitigated on Apache2 and Nginx servers using a methodology called an intelligent system for slow DoS detection using machine learning (ISSDM) in SDN. Data generation module of ISSDM generates dataset with response time, the number of connections, timeout, and pattern match as features… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Anomaly-based IDS, alternatively labeled misuse data-based IDS, depends on predefined norms for regular network or host behavior. It recognizes any deviations from these norms as potential intrusions [19].…”
Section: The Comprehensive Theoretical Basismentioning
confidence: 99%
See 1 more Smart Citation
“…Anomaly-based IDS, alternatively labeled misuse data-based IDS, depends on predefined norms for regular network or host behavior. It recognizes any deviations from these norms as potential intrusions [19].…”
Section: The Comprehensive Theoretical Basismentioning
confidence: 99%
“…In the realm of intrusion detection, contemporary deep learning and machine learning techniques, recognized for their effectiveness in cybersecurity [23], encompass diverse tools. Deep belief network (DBN) employs layered hidden units for intricate data representation [18], while DNN excels in complex feature learning [19]. The whale optimization algorithm (WOA), inspired by humpback whale behavior [21], and SVM adept at separating classes in high-dimensional spaces, contribute significantly to threat detection [6].…”
Section: Machine Learning Based Intrusion Detection Techniquesmentioning
confidence: 99%