2018
DOI: 10.1007/s12652-018-0754-y
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy self organizing maps-based DDoS mitigation mechanism for software defined networking in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 50 publications
(16 citation statements)
references
References 27 publications
0
16
0
Order By: Relevance
“…In addition, Osanaiye et al [66] also examine existing research on DDoS attack and defense method in cloud computing and propose a reasonable cloud DDoS alleviation framework dependent on the change-point location. Pillutla and Arjunan [122] presents a Fuzzy self organizing maps-based DDoS mitigation (FSOMDM) technique that is ideally and suitably designed in cloud computing. Meanwhile, there are many research works [11], [26], [32], [34], [42], [58], [70], [71], [83], [91]- [93], [103], [106], [108], [111], [112], [121], [122] on moderating DDoS attack utilizing SDN.…”
Section: B Mitigating Ddos Attack In Cloud Computingmentioning
confidence: 99%
“…In addition, Osanaiye et al [66] also examine existing research on DDoS attack and defense method in cloud computing and propose a reasonable cloud DDoS alleviation framework dependent on the change-point location. Pillutla and Arjunan [122] presents a Fuzzy self organizing maps-based DDoS mitigation (FSOMDM) technique that is ideally and suitably designed in cloud computing. Meanwhile, there are many research works [11], [26], [32], [34], [42], [58], [70], [71], [83], [91]- [93], [103], [106], [108], [111], [112], [121], [122] on moderating DDoS attack utilizing SDN.…”
Section: B Mitigating Ddos Attack In Cloud Computingmentioning
confidence: 99%
“…Parodied addresses must be obstructed for that in parodying the gadgets, clients of cloud conditions or customers on the web are mental fortitude to uncover its data and other touchy information. Current arrangements request Deep Packet Inspection (DPI) to identify and hinder the Packets instead of IP address to make framework harder for the programmers and DDoS assaults (18) .…”
Section: Related Workmentioning
confidence: 99%
“…The experimental results showed that the combination of DNS responses inspection and ML techniques was able to achieve higher accuracy compared to standalone ML techniques. Pillutla and Arjunan [234] introduced, FSOMDM, a fuzzy self‐organising maps‐based DDoS mitigation approach for cloud‐based SDNs. FSOMDM enhances the NN approach by replacing the neurons of the traditional Kohonen NN model by updating fuzzy rules.…”
Section: Artificial Intelligence In Sdnmentioning
confidence: 99%