2016 IEEE Sixth International Conference on Communications and Electronics (ICCE) 2016
DOI: 10.1109/cce.2016.7562606
|View full text |Cite
|
Sign up to set email alerts
|

OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
30
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
4
2

Relationship

1
9

Authors

Journals

citations
Cited by 44 publications
(30 citation statements)
references
References 7 publications
0
30
0
Order By: Relevance
“…Traffic analysis and policy creation at the Analyzer performance status, otherwise (F(x)= -1) the sample x i is assigned to the data group representing a performance degradation of the switch. Interested readers are referred to[11],[13]-[15] for a detailed explanation of the SVM algorithm.Thereasons for choosing the tuple ( f ,∆ f ) for evaluating the forwarding performance of a SDN switch are as follows: The effort for flow searching and matching within a SDN switch is proportional to the number and matching fields of flow entries. Moreover, a SDN switch has a maximum capacity ( f cap ) for storing the flow entries.…”
mentioning
confidence: 99%
“…Traffic analysis and policy creation at the Analyzer performance status, otherwise (F(x)= -1) the sample x i is assigned to the data group representing a performance degradation of the switch. Interested readers are referred to[11],[13]-[15] for a detailed explanation of the SVM algorithm.Thereasons for choosing the tuple ( f ,∆ f ) for evaluating the forwarding performance of a SDN switch are as follows: The effort for flow searching and matching within a SDN switch is proportional to the number and matching fields of flow entries. Moreover, a SDN switch has a maximum capacity ( f cap ) for storing the flow entries.…”
mentioning
confidence: 99%
“…In [13] and [14], SVM is used to detect DDoS attacks quite efficiently. K-Nearest Neighbor and graph theory are combined to classify DDoS attacks from benign flows in SDNs by AlEroud et al in [15].…”
Section: Related Workmentioning
confidence: 99%
“…SOM-a neural network-based technique-is used as the classification method. SVM was used in [17,18] to detect DDoS attacks in SDNs quite efficiently. One-class SVM was trained with a malicious dataset for a low false alarm rate in [19].…”
Section: Related Workmentioning
confidence: 99%