2021
DOI: 10.3390/app12010370
|View full text |Cite
|
Sign up to set email alerts
|

Detection of DDoS Attacks in Software Defined Networking Using Entropy

Abstract: Software Defined Networking (SDN) is one of the most commonly used network architectures in recent years. With the substantial increase in the number of Internet users, network security threats appear more frequently, which brings more concerns to SDN. Distributed denial of Service (DDoS) attacks are one of the most dangerous and frequent attacks in software defined networks. The traditional attack detection method using entropy has some defects such as slow attack detection and poor detection effect. In order… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(8 citation statements)
references
References 34 publications
0
8
0
Order By: Relevance
“…Meanwhile, the proposed approach's performance was compared with two existing approaches dependent on the entropy algorithm [28], the fusion entropy algorithm [32], and information theory [34]. Since the entropy technique is the basis for all entropy-based methods, those approaches share the same common limitations.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Meanwhile, the proposed approach's performance was compared with two existing approaches dependent on the entropy algorithm [28], the fusion entropy algorithm [32], and information theory [34]. Since the entropy technique is the basis for all entropy-based methods, those approaches share the same common limitations.…”
Section: Resultsmentioning
confidence: 99%
“…The rest of this section first discusses the performance of the approaches [28,32,34] in detecting low and high DDoS attack traffic rates, regardless of whether the target is a single or multiple victims, then compares the results with the proposed approach. Table 5 compares the DR and FPR for all eight attack scenarios.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The DDoS attributes attack inside an SDN environment is placidly various from that at conventional networks. According to [2], the differences between DDoS attacks in classic networks and SDNs represents as follows; in classic networks, the DDoS attackers focus on destination servers, while in SDN, the DDoS attackers aim for the controller. The principal objective is to ensure the controller resources are not available by failing an SDN single point.…”
Section: Introductionmentioning
confidence: 99%