Article
Multidisciplinary Sciences
Naziya Aslam, Shashank Srivastava, M. M. Gore
Summary: Software-defined networking (SDN) provides programmability, manageability, flexibility, and efficiency compared to traditional networks. The decoupling of control and data planes in SDN enhances DDoS attack protection, but also introduces vulnerability. Machine learning (ML) and deep learning (DL) have emerged as effective solutions to detect DDoS attacks in SDN.
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING
(2023)
Article
Telecommunications
Rochak Swami, Mayank Dave, Virender Ranga
Summary: Software-defined networking (SDN) is an advanced technology that provides flexibility and cost-efficiency based on business requirements. This study focuses on the impact of spoofed and non-spoofed TCP-SYN flooding attacks on controller resources in SDN architecture, and proposes a machine learning based intrusion detection system.
WIRELESS PERSONAL COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Solomon Damena Kebede, Basant Tiwari, Vivek Tiwari, Kamlesh Chandravanshi
Summary: This article discusses the threat of Distributed Denial of Service attacks to the Internet and the use of data mining techniques to detect and prevent such attacks. Various algorithms are used for DDoS attack detection, and a prevention method is proposed to block malicious nodes participating in these attacks.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Chemistry, Multidisciplinary
Martin Chovanec, Martin Hasin, Martin Havrilla, Eva Chovancova
Summary: This paper presents the implementation of nfstream, an open source network data analysis tool and machine learning model based on TensorFlow, for detecting HTTP attacks. HTTP attacks are a common and significant security threat to networked systems. The proposed approach utilizes TensorFlow's machine learning capabilities to detect these attacks. The paper also discusses the collection and analysis of network traffic data using nfstream, which provides detailed analysis of network traffic flows. The collected data is pre-processed and transformed into vectors, which are then used to train the machine learning model using the TensorFlow library. The proposed model using nfstream and TensorFlow achieves high accuracy in detecting HTTP attacks, with minimal false positives.
APPLIED SCIENCES-BASEL
(2023)
Article
Computer Science, Information Systems
Chin-Shiuh Shieh, Thanh-Tuan Nguyen, Wan-Wei Lin, Wei Kuang Lai, Mong-Fong Horng, Denis Miu
Summary: DDoS attacks pose a significant threat to the integrity of computer networks, and it is crucial to detect and defend against these attacks as early as possible. Researchers have applied machine learning and deep learning techniques to the detection of DDoS attacks and have developed a novel detection framework that combines generative adversarial networks and symmetrically built generator and discriminator defense system. This framework shows promising defense capabilities against adversarial DDoS attacks.
Article
Business
Akshat Gaurav, Brij B. Gupta, Prabin Kumar Panigrahi
Summary: The COVID-19 pandemic has led to changes in the business landscape, increasing the risk of cyberattacks, particularly for new entrepreneurs with limited security resources to defend against DDoS attacks.
TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE
(2022)
Article
Multidisciplinary Sciences
Chin-Shiuh Shieh, Thanh-Tuan Nguyen, Wan-Wei Lin, Yong-Lin Huang, Mong-Fong Horng, Tsair-Fwu Lee, Denis Miu
Summary: DDoS attacks pose a serious threat to the security of computer networks and information systems, machine learning techniques are effective in identifying and combating such attacks, the emerging adversarial DDoS attacks call for urgent countermeasures, a novel detection framework GANDD shows promise in handling adversarial DDoS attacks as demonstrated through experiments.
Article
Chemistry, Analytical
Sajal Saha, Annita Tahsin Priyoti, Aakriti Sharma, Anwar Haque
Summary: This study investigates and evaluates various feature selection methods, as well as an ensemble feature selection technique, in order to find a universal best feature set for all types of AI models.
Article
Computer Science, Information Systems
Zahedi Azam, Md. Motaharul Islam, Mohammad Nurul Huda
Summary: Cyber-attacks present increasing challenges in accurately detecting intrusions, compromising data confidentiality, integrity, and availability. This review provides an overview of recent IDS taxonomy, intrusion detection techniques, and commonly used evaluation datasets. It discusses evasion techniques used by attackers and challenges faced in countering them to improve network security. Researchers are adopting machine learning (ML) and deep learning (DL) techniques in IDS systems, showing promise in efficient detection of intrusions across networks. The review explores the latest trends and advancements in ML and DL-based network intrusion detection systems (NIDS), including methodology, evaluation metrics, and dataset selection. It highlights research obstacles and proposes a future research model to address weaknesses in methodologies. The decision tree model is suggested for detecting result anomalies by combining findings from a comparative survey, aiming to provide insights into building an effective decision tree-based detection framework.
Article
Computer Science, Hardware & Architecture
Vinicius de Miranda Rios, Pedro R. M. Inacio, Damien Magoni, Mario M. Freire
Summary: This paper investigates a technique called RoQ attack and successfully detects this type of attack using machine learning algorithms and fuzzy logic methods, showing good classification performance in both simulated and real traffic. However, the better performance of the approach based on FL, MLP and ED comes at the cost of longer execution time.
Article
Computer Science, Information Systems
Emad Alsuwat, Suhare Solaiman, Hatim Alsuwat
Summary: Concept drift is a major security issue that can be addressed through concept drift analysis and detection of malware attacks, improving network security.
CMC-COMPUTERS MATERIALS & CONTINUA
(2023)
Article
Chemistry, Multidisciplinary
Muhammad Nadeem Ali, Muhammad Imran, Muhammad Salah ud Din, Byung-Seo Kim
Summary: The Internet of Things (IoT) has brought innovative and smart solutions that have expanded the capabilities of modern living standards. However, the extensive usage of IoT services has made network management a complex challenge. Software-defined networking (SDN) offers simplified network management and has the potential to effectively manage IoT networks.
APPLIED SCIENCES-BASEL
(2023)
Article
Computer Science, Information Systems
Ruikui Ma, Xuebin Chen, Ran Zhai
Summary: This paper proposes a framework based on feature and model selection (FAMS) for detecting distributed denial of service (DDoS) attacks. The framework achieves good performance by conducting data pre-processing, feature selection, model selection, and model optimization.
Article
Chemistry, Multidisciplinary
Kwang-Man Ko, Jong-Min Baek, Byung-Suk Seo, Wan-Bum Lee
Summary: Software-defined networking (SDN) is the standard for network management due to its scalability and flexibility. However, it also faces security problems, such as the vulnerability of the controller to cyber attacks. This paper proposes using AI-enabled machine learning models for DDoS attack detection in SDN, achieving a high accuracy rate of 99.97%. The contributions of this study include identifying the top 20 features for DDoS attacks and providing experimental methods for evaluating the performance of learning models.
APPLIED SCIENCES-BASEL
(2023)
Article
Chemistry, Multidisciplinary
Abimbola G. Akintola, Abdullateef O. Balogun, Luiz Fernando Capretz, Hammed A. Mojeed, Shuib Basri, Shakirat A. Salihu, Fatima E. Usman-Hamza, Peter O. Sadiku, Ghaniyyat B. Balogun, Zubair O. Alanamu
Summary: As mobile and internet technology advances, new mobile security risks emerge. Conventional machine learning algorithms perform poorly in detecting malicious apps due to imbalanced datasets. In this study, a meta-learning approach based on the forest penalizing attribute (FPA) classification algorithm was developed. The proposed FPA outperforms baseline classifiers and existing ML-based Android malware detection models, with an accuracy of 98.94% and an AUC value of 0.999. Further development and deployment of FPA-based meta-learners for Android malware detection and other cybersecurity threats is recommended.
APPLIED SCIENCES-BASEL
(2022)
Article
Computer Science, Hardware & Architecture
Xiaolin Gu, Wenjia Wu, Yusen Zhou, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo
Summary: This study proposes a radio frequency fingerprint identification solution based on crystal oscillator temperature adjustment, which enhances the differences between Wi-Fi device fingerprints and mitigates collision. Experimental results demonstrate the effectiveness of the system in identifying smartphones under different scenarios.
Article
Computer Science, Hardware & Architecture
Yutong Wu, Jianyue Zhu, Xiao Chen, Yu Zhang, Yao Shi, Yaqin Xie
Summary: This paper proposes a quality-of-service-based SIC order method and optimizes power allocation for maximizing the rate in the uplink NOMA system. The simulation results demonstrate the superiority of the proposed method compared to traditional orthogonal multiple access and exhaustive search.
Article
Computer Science, Hardware & Architecture
Songshi Dou, Li Qi, Zehua Guo
Summary: Emerging cloud services and applications have different QoS requirements for the network. SD-WANs play a crucial role in QoS provisioning by introducing network programmability, dynamic flow routing, and low data transmission latency. However, controller failures may degrade QoS. To address this, we propose PREDATOR, a QoS-aware network programmability recovery scheme that achieves fine-grained per-flow remapping without introducing extra delays, ensuring QoS robustness for high-priority flows.
Article
Computer Science, Hardware & Architecture
Ke Wang, Xiaojuan Ma, Heng Kang, Zheng Lyu, Baorui Feng, Wenliang Lin, Zhongliang Deng, Yun Zou
Summary: This paper proposes a method based on a parallel network simulation architecture to improve the simulation efficiency of satellite networks. By effectively partitioning the network topology and using algorithms such as resource assessment and load balancing, the simulation performance is enhanced. Experimental results demonstrate the effectiveness of this method.
Article
Computer Science, Hardware & Architecture
Sijin Yang, Lei Zhuang, Julong Lan, Jianhui Zhang, Bingkui Li
Summary: This paper proposes a reuse-based online scheduling mechanism that achieves deterministic transmission of dynamic flows through dynamic path planning and coordinated scheduling of time slots. Experimental results show that the proposed mechanism improves the scheduling success rate by 37.3% and reduces time costs by up to 66.6% compared to existing online scheduling algorithms.