2022
DOI: 10.32604/cmc.2022.021669
|View full text |Cite
|
Sign up to set email alerts
|

DDoS Detection in SDN using Machine Learning Techniques

Abstract: Software-defined network (SDN) becomes a new revolutionary paradigm in networks because it provides more control and network operation over a network infrastructure. The SDN controller is considered as the operating system of the SDN based network infrastructure, and it is responsible for executing the different network applications and maintaining the network services and functionalities. Despite all its tremendous capabilities, the SDN face many security issues due to the complexity of the SDN architecture. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 37 publications
(8 citation statements)
references
References 33 publications
0
8
0
Order By: Relevance
“… Swami, Dave & Ranga (2021) explored the random forest, MLP, logistic regression, LR, and DT for DDoS attack detection in an SDN using a network dataset. Nadeem et al (2022) implemented naïve Bayes, support vector machine, KNN, and RF to detect the DDoS attack, and tested the implemented techniques using the NSL-KDD dataset and achieved 99.97% accuracy. Yuan, Li & Li (2017) sampled 20 network data features of the dataset ISCX 12 to design a bidirectional RNN performance analysis.…”
Section: Literature Overviewmentioning
confidence: 99%
“… Swami, Dave & Ranga (2021) explored the random forest, MLP, logistic regression, LR, and DT for DDoS attack detection in an SDN using a network dataset. Nadeem et al (2022) implemented naïve Bayes, support vector machine, KNN, and RF to detect the DDoS attack, and tested the implemented techniques using the NSL-KDD dataset and achieved 99.97% accuracy. Yuan, Li & Li (2017) sampled 20 network data features of the dataset ISCX 12 to design a bidirectional RNN performance analysis.…”
Section: Literature Overviewmentioning
confidence: 99%
“…There must be a deep investigation of the controller when network size increases. Integrating IDS as a separate platform and linking it to a controller helps alleviate the stress on the controller [37]. Another solution is to implement a distributed controller or dedicate a specific controller for implementing IDS to migrate excessive traffic for checking to other controllers for processing.…”
Section: Controller Resource Consumption By Idsmentioning
confidence: 99%
“…A comparison of four typical devices shows that the logical model tree can better identify DDoS traffic from IoT devices. In 2022, Kumar et al [ 28 ] designed the recursive feature elimination method RFE. It is also combined with the random forest algorithm to train the classifier.…”
Section: Related Workmentioning
confidence: 99%