2020
DOI: 10.11591/ijece.v10i2.pp1599-1611
|View full text |Cite
|
Sign up to set email alerts
|

Preemptive modelling towards classifying vulnerability of DDoS attack in SDN environment

Abstract: Software-Defined Networking (SDN) has become an essential networking concept towards escalating the networking capabilities that are highly demanded future internet system, which is immensely distributed in nature. Owing to the novel concept in the field of network, it is still shrouded with security problems. It is also found that the Distributed Denial-of-Service (DDoS) attack is one of the prominent problems in the SDN environment. After reviewing existing research solutions towards resisting DDoS attack in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…The effectiveness of ML techniques has led researchers to use them in topical areas such as IoT [52], [53], online social network [54], DoS detection, DDoS [55]- [60], and distributed reflexion denial of service (DRDoS) [61]. However, obtaining good results depends on the techniques used, and the way in which we create our models.…”
Section: Resultsmentioning
confidence: 99%
“…The effectiveness of ML techniques has led researchers to use them in topical areas such as IoT [52], [53], online social network [54], DoS detection, DDoS [55]- [60], and distributed reflexion denial of service (DRDoS) [61]. However, obtaining good results depends on the techniques used, and the way in which we create our models.…”
Section: Resultsmentioning
confidence: 99%
“…To recognize a fraudulent user behavior, more intelligence is needed since traditional security measures fall short of providing the requisite protection and privacy [57]. To identify real users from false ones, many supervised machine learning models were consequently suggested [58], [59]. Therefore, a proactive security approach is used to identify and mitigate these problems.…”
Section: Figure 2 Overview Of Grey Hole Attack [19]mentioning
confidence: 99%