2022
DOI: 10.1016/j.future.2021.11.009
|View full text |Cite
|
Sign up to set email alerts
|

Software-defined DDoS detection with information entropy analysis and optimized deep learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
22
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(23 citation statements)
references
References 30 publications
0
22
0
1
Order By: Relevance
“…The controller implemented the defense strategy to thwart the onslaught. The testing findings reveal that the suggested method's detection accuracy is 98.98 percent, indicating that it can successfully identify DDoS attack traffic in an SDN context [1]. Based on their analysis of the impact of class imbalance on SBR prediction, Zheng et al [32] found that it had a negative impact on prediction accuracy.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 95%
See 1 more Smart Citation
“…The controller implemented the defense strategy to thwart the onslaught. The testing findings reveal that the suggested method's detection accuracy is 98.98 percent, indicating that it can successfully identify DDoS attack traffic in an SDN context [1]. Based on their analysis of the impact of class imbalance on SBR prediction, Zheng et al [32] found that it had a negative impact on prediction accuracy.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 95%
“…These advancements have accelerated the development of next-generation Internet technologies, including big data, cloud computing, the Internet of Things, and programmable networks. However, with softwaredefined network architecture, the potential of a DDoS attack brought on by centralized control becomes more apparent [1]. IDS are divided into two categories.…”
Section: Introductionmentioning
confidence: 99%
“…(3) for (i 1; i ≤ m; i + +) do (4) num 0; (5) for (start_time(f j ) Δt • (i − 1); end_time(f j ) ≤ Δt • i; j + +). do (6) if…”
Section: 3unclassified
“…It is simple and requires no additional hardware support. However, its detection effect depends on thresholds, which researchers usually give directly [ 6 ]. This subjective assignment lacks an objective basis, affecting the reliability of results.…”
Section: Introductionmentioning
confidence: 99%
“…Liu et al (2022) divide the attack detection method in the SDN environment into two levels of granularity. At the coarse granularity level, the attack source is located, reducing the detection scope.…”
mentioning
confidence: 99%