The DDoS attacks detection through machine learning and statistical methods in SDN

A Banitalebi Dehkordi, MR Soltanaghaei… - The Journal of …, 2021‏ - Springer
The distributed denial-of-service (DDoS) attack is a security challenge for the software-
defined network (SDN). The different limitations of the existing DDoS detection methods …

Automated flow-based rule generation for network intrusion detection systems

N Fallahi, A Sami, M Tajbakhsh - 2016 24th Iranian Conference …, 2016‏ - ieeexplore.ieee.org
Snort is a popular open-source Intrusion Detection System (IDS). Since rules are updated
offline and network environment changes dynamically, Snort has a low detection rate …

SDN enabled DDoS attack detection and mitigation for 5G networks

B Aryal, R Abbas, I Collings - Journal of Communication, 2021‏ - researchers.mq.edu.au
This paper proposes a hybrid technique for distributed denial-of-service (DDoS) attack
detection that combines statistical analysis and machine learning, with software defined …

A Hybrid Mechanism to Detect DDoS Attacks in Software Defined Networks

B Dehkordi, MR Soltanaghaei… - Majlesi Journal of …, 2021‏ - mjee.isfahan.iau.ir
DDoS (Distributed Denial-of-Service) attacks are among the cyberattacks that are increasing
day by day and have caused problems for computer network servers. With the advent of …

A New DDoS Detection Method in Software Defined Network

MR Soltanaghaei - 2020‏ - researchsquare.com
Abstract Software Defined Networking (SDN) is a new network architecture in which network
control is separated from direct traffic and is programmed directly. Any change in network …

Neuromorphic computing applications for network intrusion detection systems

RC Garcia, RE Pino - Machine Intelligence and Bio-inspired …, 2014‏ - spiedigitallibrary.org
What is presented here is a sequence of evolving concepts for network intrusion detection.
These concepts start with neuromorphic structures for XOR-based signature matching and …

[PDF][PDF] Flow-Based Rules Generation for Intrusion Detection System using Machine Learning Approach

Y Saleem, U Anwar, MK Bashir, S Naseer… - … Research Journal of …, 2020‏ - academia.edu
Rapid increase in internet users also brought new ways of privacy and security exploitation.
Intrusion is one of such attacks in which an authorized user can access system resources …