2019 7th International Symposium on Digital Forensics and Security (ISDFS) 2019
DOI: 10.1109/isdfs.2019.8757542
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing security of SDN focusing on control plane and data plane

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 1 publication
0
10
0
Order By: Relevance
“…Celesova et al [25] suggested a method that utilizes a Deep Neural Network (DNN) to protect the data planes and control DDoS attacks in SDN networks. However, they used the UNSW-NB15 dataset, which is not specifically designed for the SDN network environment, to train, test, and evaluate their proposed system.…”
Section: Ml-based Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…Celesova et al [25] suggested a method that utilizes a Deep Neural Network (DNN) to protect the data planes and control DDoS attacks in SDN networks. However, they used the UNSW-NB15 dataset, which is not specifically designed for the SDN network environment, to train, test, and evaluate their proposed system.…”
Section: Ml-based Approachmentioning
confidence: 99%
“…As shown in Table 2, several approaches in the literature have achieved low detection accuracies, such as those of Santos et al [12], Sudar et al [8], Celesova et al [25], Hsieh et al [26], and Deepa et al [11]. Additionally, some of these approaches have been evaluated using non-SDN datasets, including Celesova et al [25], Sudar et al [8], Boukria et al [28], and Alanazi et al [10]. Moreover, most of the existing approaches are implemented on SDN controllers, which can increase overhead during DDoS attacks.…”
Section: Boukria Et Al [28]mentioning
confidence: 99%
“…Similarly, attacks on vulnerabilities in controllers and switches can wreak havoc on the network; therefore, malicious controllers compromise the whole network. The prevention of DDoS attacks has been a primary concern for researchers and network security administrators [14][15][16][17]. DDoS attacks are highly frequent; therefore, it is necessary to develop robust solutions that are effective in detecting and mitigating DDoS attacks [18,19].…”
Section: Related Workmentioning
confidence: 99%
“…e authors of [9][10][11] used deep learning algorithms such as neural networks to solve the problem of DDoS detection in SDN. is kind of method has high accuracy, which is better than the traditional machine learning method.…”
Section: Related Workmentioning
confidence: 99%
“…0 did not occur. 1 did occur (8) if a A (t t ) � � 1 (9) σ′ � Bayesian(S A |a A (t t ) � 1) //Bayes' rule is used to calculate the prior probability of the presence of attackers ( 10) else (11) σ′ � Bayesian(S A |a A (t t ) � 0) (12) end if (13) σ � σ′ //A transcendental belief correction, that is, the next round of defender's transcendental belief end ALGORITHM 1: e optimal strategy selection algorithm for both sides in t t identification, Y j � 0 represents the classification of normal traffic and Y j � 1 represents the classification of attack traffic. SVM is selected for training, which is a small sample learning method.…”
Section: Destination Ip Addresses Growth (Dg)mentioning
confidence: 99%