A Hybrid Mechanism to Detect DDoS Attacks in Software Defined Networks

سال انتشار: 1400
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 103

فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_MJEE-15-1_001

تاریخ نمایه سازی: 24 بهمن 1401

چکیده مقاله:

DDoS (Distributed Denial-of-Service) attacks are among the cyberattacks that are increasing day by day and have caused problems for computer network servers. With the advent of SDN networks, they are not immune to these attacks, and due to the software-centric nature of these networks, this type of attack can be much more difficult for them, ignoring effective parameters such as port and Source IP in detecting attacks, providing costly solutions which are effective in increasing CPU load, and low accuracy in detecting attacks are of the problems of previously presented methods in detecting DDoS attacks. Given the importance of this issue,the purpose of this paper is to increase the accuracy of DDoS attack detection using the second order correlation coefficient technique based on ∅-entropy according to source IP and selection of optimal features.To select the best features, by examining the types of feature selection algorithms and search methods, the WrapperSubsetEval feature selection algorithm, the BestFirst search method, and the best effective features were selected. This study was performed on CTU-۱۳ and ISOT datasets and the results were compared with other methods. The accuracy of the detection in this work indicates the high efficiency of the proposed approach compared to other similar methods.

کلیدواژه ها:

∅-Entropy ، WrapperSubsetEval ، second order Correlation Coefficient ، SDN ، DDoS Attack

نویسندگان

Afsaneh Banitalebi Dehkordi

Department of Computer Science,Payame Noor University(PNU),P.OBOX,۱۹۳۹۵-۴۶۹۷ ,Tehran,Iran

MohammadReza Soltanaghaei

Department of Computer Engineering, Isfahan (Khorasgan) Branch, Islamic Azad University, Isfahan, Iran.

Farsad Zamani Boroujeni

Department of Computer Engineering, Isfahan (Khorasgan) Branch, Islamic Azad University, Isfahan, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Yadav, A., et al., SDN Control Plan Security in Cloud ...
  • Dayal, N., et al., Research Trends in Security and DDOS ...
  • Kupreev, O., E. Badovskaya, and A. Gutnikov. DDoS attacks in ...
  • Morgan, S. CyberCrime Magazine. ۲۰۲۰; Available from: https://cybersecurityventures.com ...
  • Mirvaziri, H., A new method to reduce the effects of ...
  • Kirubavathi, G. and R. Anitha, Botnet detection via mining of ...
  • Anbarsu, S., A.X. Annie Rayan, and V. Vetrian, Software-Defined Networking ...
  • Singh, K., K. Dhindsa, and D. Nehra, T-CAD: A threshold ...
  • Bouyeddou, B., et al., DDOS-attacks detection using an efficient measurement-based ...
  • Abdulqadder, I., et al., Multi-layered Intrusion Detection and Prevention in ...
  • Pradhan, A. and R. Mathew. Solution to Vulnerabilities and Threts ...
  • Velliangiri, S. and H.M. Pandey, Fuzzy-Taylor-elephant herd optimization inspired Deep ...
  • Virupakshar, K., et al., Distributed Denial of Service (DDoS) Attacks ...
  • Fuente, D., A. Romero, and P. Torres, Existence and extendibility ...
  • LIU, H., A collaborative defense framework against DDOS Attacks in ...
  • Xu, Z., et al., Software defect prediction based on kernel ...
  • Bolly, F. and I. Gentil, ∅-entropy inequalities for diffusion semigroups. ...
  • Song, Y., et al., Divergence-based cross entropy and uncertainty measures ...
  • Hoque, N., et al., Network attacks: Taxonomy, tools and systems. ...
  • Yavanoglu, O. and M. Aydos A review on cyber security ...
  • نمایش کامل مراجع