2017 21st International Computer Science and Engineering Conference (ICSEC) 2017
DOI: 10.1109/icsec.2017.8443939
|View full text |Cite
|
Sign up to set email alerts
|

The Design of SDN Based Detection for Distributed Denial of Service (DDoS) Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 4 publications
0
11
0
Order By: Relevance
“…Siddharth and Sterbenz [104] extends the functionality of the SDN controller to include a resilience framework, ReSDN incorporates ML to distinguish DoS attacks. And the advanced SVM (ASVM) [105] was proposed based on SDN for DDoS attacks. It significantly reduces the testing time as well as training time compared with the traditional SVM algorithm.…”
Section: ) Network Attacks Detectionmentioning
confidence: 99%
“…Siddharth and Sterbenz [104] extends the functionality of the SDN controller to include a resilience framework, ReSDN incorporates ML to distinguish DoS attacks. And the advanced SVM (ASVM) [105] was proposed based on SDN for DDoS attacks. It significantly reduces the testing time as well as training time compared with the traditional SVM algorithm.…”
Section: ) Network Attacks Detectionmentioning
confidence: 99%
“…From Table 1, we have found that there are very few applications created for ONOS controllers for the detection and mitigation of DDoS attack. Chen et al 8 and Oo et al 9 both have used ONOS controller for their work, but the former work does not have an application for detection and mitigation. In contrast, the latter work has only a detection application created.…”
Section: Introductionmentioning
confidence: 99%
“…The methods capture the flow volume feature as well as the flow rate asymmetry feature, to adaptively change the flow monitoring granularities on all switches to quickly locate the potential victims and suspicious attackers. [8] In this paper, propose to use Advanced Support Vector Machine (ASVM) algorithm in order to detect DDoS attacks.…”
mentioning
confidence: 99%
“…Both papers in [2] and [8] talk only about DDoS detection by using POX and ONOS controllers. In [9], a firewall will block the addresses forwarded by the server.…”
mentioning
confidence: 99%