Review on distributed denial of service attack detection in software defined network

P. Karthika, A. Karmel
{"title":"Review on distributed denial of service attack detection in software defined network","authors":"P. Karthika, A. Karmel","doi":"10.1504/ijwmc.2023.133060","DOIUrl":null,"url":null,"abstract":"This paper has shown the enhancement of networks, and the ability to withstand DDoS attacks. Thus, this survey plans to make a review on 65 papers which concern DDoS attack detection in SDN. Therefore, the systematic analyses on the proposed method are analysed from each reviewed paper. In addition, the performance metrics and their best achievements in detecting the attack in each research paper are also analysed in this work. In addition, the mitigation technique used in each paper is examined in this work. Also, the chronological assessment and various tools utilised for implementing DDoS attack detection in SDN are considered and reviewed in this work. Finally, the survey depicts numerous research gaps and challenges that are more supportive for researchers to develop novel methods for detecting DDoS attacks in SDN.","PeriodicalId":53709,"journal":{"name":"International Journal of Wireless and Mobile Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Wireless and Mobile Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijwmc.2023.133060","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0

Abstract

This paper has shown the enhancement of networks, and the ability to withstand DDoS attacks. Thus, this survey plans to make a review on 65 papers which concern DDoS attack detection in SDN. Therefore, the systematic analyses on the proposed method are analysed from each reviewed paper. In addition, the performance metrics and their best achievements in detecting the attack in each research paper are also analysed in this work. In addition, the mitigation technique used in each paper is examined in this work. Also, the chronological assessment and various tools utilised for implementing DDoS attack detection in SDN are considered and reviewed in this work. Finally, the survey depicts numerous research gaps and challenges that are more supportive for researchers to develop novel methods for detecting DDoS attacks in SDN.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
软件定义网络中分布式拒绝服务攻击检测研究进展
本文展示了网络的增强,以及抵御DDoS攻击的能力。因此,本次调查计划对65篇关于SDN中DDoS攻击检测的论文进行综述。因此,本文对所提出的方法进行了系统的分析。此外,本工作还分析了每篇研究论文的性能指标及其在检测攻击方面的最佳成果。此外,本文还研究了每篇论文中使用的缓解技术。此外,本工作还考虑并审查了用于在SDN中实现DDoS攻击检测的时间顺序评估和各种工具。最后,该调查描述了许多研究差距和挑战,这些差距和挑战更支持研究人员开发检测SDN中DDoS攻击的新方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Wireless and Mobile Computing
International Journal of Wireless and Mobile Computing Computer Science-Computer Science (all)
CiteScore
0.80
自引率
0.00%
发文量
76
期刊介绍: The explosive growth of wide-area cellular systems and local area wireless networks which promise to make integrated networks a reality, and the development of "wearable" computers and the emergence of "pervasive" computing paradigm, are just the beginning of "The Wireless and Mobile Revolution". The realisation of wireless connectivity is bringing fundamental changes to telecommunications and computing and profoundly affects the way we compute, communicate, and interact. It provides fully distributed and ubiquitous mobile computing and communications, thus bringing an end to the tyranny of geography.
期刊最新文献
Robust min-norm algorithms for coherent sources DOA estimation based on Toeplitz matrix reconstruction methods The construction of the competency model and its application in talent cultivation Bifurcation analysis of a predator-prey model with volume-filling mechanism An improved resource allocation architecture using swarm intelligence for mm-Wave MIMO communication architecture Compatibility issues of wireless sensor network routing in internet of things applications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1