{"title":"DDoS attack detection and defense in SDN based on machine learning","authors":"Tan-Khang Luong, Trung-Dung Tran, Giang-Thanh Le","doi":"10.1109/NICS51282.2020.9335867","DOIUrl":null,"url":null,"abstract":"Distributed Denial of Service (DDoS) attack is one of the most dangerous threats in computer networks. Hence, DDoS attack detection is one of the key defense mechanisms. In this paper, we propose a DDoS detection and defense approach in Software Defined Network (SDN) systems based on machine learning (ML) and deep neural network (DNN) models. The combination of ML and DNN classifiers with the centralized factors of SDN can efficiently mitigate the harmful effect of DDoS to the network system. Besides, we conducted two types of attack scenarios, one is from inside and one is from outside of the network system.","PeriodicalId":308944,"journal":{"name":"2020 7th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 7th NAFOSTED Conference on Information and Computer Science (NICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NICS51282.2020.9335867","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Distributed Denial of Service (DDoS) attack is one of the most dangerous threats in computer networks. Hence, DDoS attack detection is one of the key defense mechanisms. In this paper, we propose a DDoS detection and defense approach in Software Defined Network (SDN) systems based on machine learning (ML) and deep neural network (DNN) models. The combination of ML and DNN classifiers with the centralized factors of SDN can efficiently mitigate the harmful effect of DDoS to the network system. Besides, we conducted two types of attack scenarios, one is from inside and one is from outside of the network system.