{"title":"Review on distributed denial of service attack detection in software defined network","authors":"P. Karthika, A. Karmel","doi":"10.1504/ijwmc.2023.133060","DOIUrl":null,"url":null,"abstract":"This paper has shown the enhancement of networks, and the ability to withstand DDoS attacks. Thus, this survey plans to make a review on 65 papers which concern DDoS attack detection in SDN. Therefore, the systematic analyses on the proposed method are analysed from each reviewed paper. In addition, the performance metrics and their best achievements in detecting the attack in each research paper are also analysed in this work. In addition, the mitigation technique used in each paper is examined in this work. Also, the chronological assessment and various tools utilised for implementing DDoS attack detection in SDN are considered and reviewed in this work. Finally, the survey depicts numerous research gaps and challenges that are more supportive for researchers to develop novel methods for detecting DDoS attacks in SDN.","PeriodicalId":53709,"journal":{"name":"International Journal of Wireless and Mobile Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Wireless and Mobile Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijwmc.2023.133060","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0
Abstract
This paper has shown the enhancement of networks, and the ability to withstand DDoS attacks. Thus, this survey plans to make a review on 65 papers which concern DDoS attack detection in SDN. Therefore, the systematic analyses on the proposed method are analysed from each reviewed paper. In addition, the performance metrics and their best achievements in detecting the attack in each research paper are also analysed in this work. In addition, the mitigation technique used in each paper is examined in this work. Also, the chronological assessment and various tools utilised for implementing DDoS attack detection in SDN are considered and reviewed in this work. Finally, the survey depicts numerous research gaps and challenges that are more supportive for researchers to develop novel methods for detecting DDoS attacks in SDN.
期刊介绍:
The explosive growth of wide-area cellular systems and local area wireless networks which promise to make integrated networks a reality, and the development of "wearable" computers and the emergence of "pervasive" computing paradigm, are just the beginning of "The Wireless and Mobile Revolution". The realisation of wireless connectivity is bringing fundamental changes to telecommunications and computing and profoundly affects the way we compute, communicate, and interact. It provides fully distributed and ubiquitous mobile computing and communications, thus bringing an end to the tyranny of geography.