2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT) 2021
DOI: 10.1109/csnt51715.2021.9509634
|View full text |Cite
|
Sign up to set email alerts
|

Detection of DDoS Attacks in Software Defined Network using Decision Tree

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
13
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 4 publications
1
13
0
Order By: Relevance
“…For example, CLOSED means all active links are closed; LISTEN signifies waiting for new requests; and ESTABLISHED means the connection is established. These states can be obtained through traffic analysis tools like TShark or CICFlowMeter [ 43 ]. However, the acquired elements are of type string and hard to use for training directly.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, CLOSED means all active links are closed; LISTEN signifies waiting for new requests; and ESTABLISHED means the connection is established. These states can be obtained through traffic analysis tools like TShark or CICFlowMeter [ 43 ]. However, the acquired elements are of type string and hard to use for training directly.…”
Section: Methodsmentioning
confidence: 99%
“…ese states can be obtained through traffic analysis tools like TShark or CICFlowMeter [43]. However, the acquired elements are of type string and hard to use for training directly.…”
Section: Feature Extractionmentioning
confidence: 99%
“…Kousar et al [11] proposed a decision tree-based model to detect DDoS attacks in SDN environment. The proposed model focus on attacks that is used to flood the SDN controller.…”
Section: Related Workmentioning
confidence: 99%
“…The authors reported a classification accuracy of 99.99% using the decision tree approach compared to the other ML approach used in their experiment. One of the advantages of the model reported in [11] its ability to detects attacks in a software defined environment which is much complex compares to the IoT environment. Although the work in [11] only apply the binary classification in its detection engine.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation