2020
DOI: 10.2991/ijndc.k.200325.001
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Features Dataset for DDoS Detection by using ASVM Method on Software Defined Networking

Abstract: With the continuous development of networking environment, nowadays, there are many innovative technologies in computer network researches and industries. Most businesses use various mobile devices, cloud services and virtualization techniques in network environments [1]. Their usage is becoming the strongest evolution. The network programmability will be critical for business growth. Most of the today's network types are traditional networks. The traditional network management methods are device-bydevice and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…Ref. [85] proposed an Advanced-SVM algorithm for detecting UDP and SYN flood DDoS attacks in SDN networks. The proposed system was tested and trained using SDN-TrafficsDS and KDDCUP99 datasets, achieving overall average evaluation performance of 87%, 84%, and 93% for precision, recall, and F1-score, respectively.…”
Section: Single ML Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Ref. [85] proposed an Advanced-SVM algorithm for detecting UDP and SYN flood DDoS attacks in SDN networks. The proposed system was tested and trained using SDN-TrafficsDS and KDDCUP99 datasets, achieving overall average evaluation performance of 87%, 84%, and 93% for precision, recall, and F1-score, respectively.…”
Section: Single ML Approachesmentioning
confidence: 99%
“…In addition, some researchers run their approaches out of the SDN controller to reduce the load and overhead, mainly during DDoS attacks, such as [74,95]. In contrast, some studies did not provide details about where they deploy their approaches, such as [80,85,88]. Moreover, most approaches are designed to detect or mitigate DDoS attacks, and only a few can do both [83,92].…”
Section: Single ML Approachesmentioning
confidence: 99%
“…The article [21] examined all the features extracted from SDN traffic, minimizing bias data from the dataset. The traffic features have been assessed through a tenfold-cross validation method.…”
Section: Review Of Existing Workmentioning
confidence: 99%