2022
DOI: 10.14569/ijacsa.2022.0131141
|View full text |Cite
|
Sign up to set email alerts
|

Low-rate DDoS attack Detection using Deep Learning for SDN-enabled IoT Networks

Abstract: Software Defined Networks (SDN) can logically route traffic and utilize underutilized network resources, which has enabled the deployment of SDN-enabled Internet of Things (IoT) architecture in many industrial systems. SDN also removes bottlenecks and helps process IoT data efficiently without overloading the network. An SDN-based IoT in an evolving environment is vulnerable to various types of distributed denial of service (DDoS) attacks. Many research papers focus on highrate DDoS attacks, while few address … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 25 publications
0
12
0
Order By: Relevance
“…DDoS attacks pose a pervasive threat to network availability and performance. While traditional DDoS attacks flood a target with an overwhelming volume of traffic, lowrate DDoS attacks employ a subtler approach [21]. In a LDDoS attack, malicious traffic is injected at a lower rate, making it less conspicuous and more challenging to detect using traditional threshold-based methods [22].…”
Section: Preliminariesmentioning
confidence: 99%
See 2 more Smart Citations
“…DDoS attacks pose a pervasive threat to network availability and performance. While traditional DDoS attacks flood a target with an overwhelming volume of traffic, lowrate DDoS attacks employ a subtler approach [21]. In a LDDoS attack, malicious traffic is injected at a lower rate, making it less conspicuous and more challenging to detect using traditional threshold-based methods [22].…”
Section: Preliminariesmentioning
confidence: 99%
“…Machine Learning (ML) has emerged as a potent tool for enhancing network security, equipping us with the capability to scrutinize vast troves of network data and promptly detect anomalies in real-time. A specialized variant of ML, known as Online Machine Learning (OML), accentuates adaptability and perpetual learning from streaming data streams [28].…”
Section: Online Machine Learning (Oml)mentioning
confidence: 99%
See 1 more Smart Citation
“…In [28], the authors employed the LSTM model for monitoring Software-Defined Networking (SDN)-enabled IoT networks and detecting cyberattacks. The authors specifically concentrated on enhancing the accuracy of Low-Rate Distributed Denial of Service (LDDoS) detection.…”
Section: Related Workmentioning
confidence: 99%
“…Machine learning (ML) and deep learning (DL) techniques are subsections of artificial intelligence (AI) that are currently used for the detection of cyberattacks, such as threat detection, malware clarification, and intrusion detection. Extensive research has been conducted on the use of ML learning algorithms to enhance cyberattack issues in the CPS environment [9], [10]. The ML method can also be applied to detect and identify anomalies [11].…”
Section: Introductionmentioning
confidence: 99%