Software Defined Networking Based Detection of DDoS Attacks

Manisha Singh, Vandana Rathore, V. Patel, Kaushik Mishra, R.N Singh, R. Bhardwaj
{"title":"Software Defined Networking Based Detection of DDoS Attacks","authors":"Manisha Singh, Vandana Rathore, V. Patel, Kaushik Mishra, R.N Singh, R. Bhardwaj","doi":"10.46338/ijetae0423_11","DOIUrl":null,"url":null,"abstract":"Software-defined networking (SDN) separates network management from data-traffic routes. More businesses are adopting it because of its flexibility, adaptability, and ability to improve traffic movement. SDN, or security-by-design, might be a desirable alternative for securing networks. While there have been many advancements in SDN technology, it is still susceptible to DDoS assaults. The growing frequency and scope of DDoS attacks pose a threat to network security, despite the availability of various methods for detecting and countering such attacks. There are two main methods to spot a distributed denial of service (DDoS) attack: signature recognition and abnormality detection. When personal characteristics such as fingerprints or iris scans are used to verify identity. Anomaly-based detection, which relies on network behavior, employs machine learning methods. We present a strategy for SDNs to identify DDoS assaults in this article. In the proposed architecture, DDoS attacks are detected using the Advanced Support Vector Machine (ASVM) technique. When compared to the SVM method, ASVM has the benefit of significantly less testing and training time. To evaluate the effectiveness of the suggested system, we use the Hierarchical Task Analysis (HTA) method of measuring human error.","PeriodicalId":169403,"journal":{"name":"International Journal of Emerging Technology and Advanced Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Emerging Technology and Advanced Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.46338/ijetae0423_11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Software-defined networking (SDN) separates network management from data-traffic routes. More businesses are adopting it because of its flexibility, adaptability, and ability to improve traffic movement. SDN, or security-by-design, might be a desirable alternative for securing networks. While there have been many advancements in SDN technology, it is still susceptible to DDoS assaults. The growing frequency and scope of DDoS attacks pose a threat to network security, despite the availability of various methods for detecting and countering such attacks. There are two main methods to spot a distributed denial of service (DDoS) attack: signature recognition and abnormality detection. When personal characteristics such as fingerprints or iris scans are used to verify identity. Anomaly-based detection, which relies on network behavior, employs machine learning methods. We present a strategy for SDNs to identify DDoS assaults in this article. In the proposed architecture, DDoS attacks are detected using the Advanced Support Vector Machine (ASVM) technique. When compared to the SVM method, ASVM has the benefit of significantly less testing and training time. To evaluate the effectiveness of the suggested system, we use the Hierarchical Task Analysis (HTA) method of measuring human error.
基于软件定义组网的DDoS攻击检测
软件定义网络(SDN)将网络管理与数据流量路由分离开来。由于它的灵活性、适应性和改善交通流动的能力,越来越多的企业采用了它。SDN(即设计安全)可能是保护网络的理想替代方案。虽然SDN技术已经取得了许多进步,但它仍然容易受到DDoS攻击。尽管有各种方法可以检测和应对DDoS攻击,但DDoS攻击的频率和范围不断增加,对网络安全构成了威胁。识别分布式拒绝服务攻击主要有两种方法:签名识别和异常检测。使用指纹或虹膜扫描等个人特征来验证身份。基于异常的检测依赖于网络行为,采用机器学习方法。在本文中,我们为sdn提供了一种识别DDoS攻击的策略。在提出的架构中,使用高级支持向量机(ASVM)技术检测DDoS攻击。与SVM方法相比,ASVM具有显著减少测试和训练时间的优点。为了评估建议系统的有效性,我们使用层次任务分析(HTA)方法来测量人为错误。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信