Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (28)
  • Open Access

    ARTICLE

    RMCARTAM For DDoS Attack Mitigation in SDN Using Machine Learning

    M. Revathi, V. V. Ramalingam*, B. Amutha

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3023-3036, 2023, DOI:10.32604/csse.2023.033600

    Abstract The impact of a Distributed Denial of Service (DDoS) attack on Software Defined Networks (SDN) is briefly analyzed. Many approaches to detecting DDoS attacks exist, varying on the feature being considered and the method used. Still, the methods have a deficiency in the performance of detecting DDoS attacks and mitigating them. To improve the performance of SDN, an efficient Real-time Multi-Constrained Adaptive Replication and Traffic Approximation Model (RMCARTAM) is sketched in this article. The RMCARTAM considers different parameters or constraints in running different controllers responsible for handling incoming packets. The model is designed with multiple controllers to handle network traffic… More >

  • Open Access

    ARTICLE

    Securing Consumer Internet of Things for Botnet Attacks: Deep Learning Approach

    Tariq Ahamed Ahanger1,*, Abdulaziz Aldaej1, Mohammed Atiquzzaman2, Imdad Ullah1, Mohammed Yousuf Uddin1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3199-3217, 2022, DOI:10.32604/cmc.2022.027212

    Abstract DDoS attacks in the Internet of Things (IoT) technology have increased significantly due to its spread adoption in different industrial domains. The purpose of the current research is to propose a novel technique for detecting botnet attacks in user-oriented IoT environments. Conspicuously, an attack identification technique inspired by Recurrent Neural networks and Bidirectional Long Short Term Memory (BLRNN) is presented using a unique Deep Learning (DL) technique. For text identification and translation of attack data segments into tokenized form, word embedding is employed. The performance analysis of the presented technique is performed in comparison to the state-of-the-art DL techniques. Specifically,… More >

  • Open Access

    ARTICLE

    Detection of DDoS Attack in IoT Networks Using Sample Selected RNN-ELM

    S. Hariprasad1,*, T. Deepa1, N. Bharathiraja2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1425-1440, 2022, DOI:10.32604/iasc.2022.022856

    Abstract The Internet of Things (IoT) is a global information and communication technology which aims to connect any type of device to the internet at any time and in any location. Nowadays billions of IoT devices are connected to the world, this leads to easily cause vulnerability to IoT devices. The increasing of users in different IoT-related applications leads to more data attacks is happening in the IoT networks after the fog layer. To detect and reduce the attacks the deep learning model is used. In this article, a hybrid sample selected recurrent neural network-extreme learning machine (hybrid SSRNN-ELM) algorithm that… More >

  • Open Access

    ARTICLE

    Dynamic Threshold-Based Approach to Detect Low-Rate DDoS Attacks on Software-Defined Networking Controller

    Mohammad Adnan Aladaileh, Mohammed Anbar*, Iznan H. Hasbullah, Abdullah Ahmed Bahashwan, Shadi Al-Sarawn

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1403-1416, 2022, DOI:10.32604/cmc.2022.029369

    Abstract The emergence of a new network architecture, known as Software Defined Networking (SDN), in the last two decades has overcome some drawbacks of traditional networks in terms of performance, scalability, reliability, security, and network management. However, the SDN is vulnerable to security threats that target its controller, such as low-rate Distributed Denial of Service (DDoS) attacks, The low-rate DDoS attack is one of the most prevalent attacks that poses a severe threat to SDN network security because the controller is a vital architecture component. Therefore, there is an urgent need to propose a detection approach for this type of attack… More >

  • Open Access

    ARTICLE

    Comprehensive DDoS Attack Classification Using Machine Learning Algorithms

    Olga Ussatova1,2, Aidana Zhumabekova1,*, Yenlik Begimbayeva2,3, Eric T. Matson4, Nikita Ussatov5

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 577-594, 2022, DOI:10.32604/cmc.2022.026552

    Abstract The fast development of Internet technologies ignited the growth of techniques for information security that protect data, networks, systems, and applications from various threats. There are many types of threats. The dedicated denial of service attack (DDoS) is one of the most serious and widespread attacks on Internet resources. This attack is intended to paralyze the victim's system and cause the service to fail. This work is devoted to the classification of DDoS attacks in the special network environment called Software-Defined Networking (SDN) using machine learning algorithms. The analyzed dataset included instances of two classes: benign and malicious. As the… More >

  • Open Access

    ARTICLE

    Machine Learning with Dimensionality Reduction for DDoS Attack Detection

    Shaveta Gupta1, Dinesh Grover2, Ahmad Ali AlZubi3,*, Nimit Sachdeva4, Mirza Waqar Baig5, Jimmy Singla6

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2665-2682, 2022, DOI:10.32604/cmc.2022.025048

    Abstract With the advancement of internet, there is also a rise in cybercrimes and digital attacks. DDoS (Distributed Denial of Service) attack is the most dominant weapon to breach the vulnerabilities of internet and pose a significant threat in the digital environment. These cyber-attacks are generated deliberately and consciously by the hacker to overwhelm the target with heavy traffic that genuine users are unable to use the target resources. As a result, targeted services are inaccessible by the legitimate user. To prevent these attacks, researchers are making use of advanced Machine Learning classifiers which can accurately detect the DDoS attacks. However,… More >

  • Open Access

    ARTICLE

    Cooperative Detection Method for DDoS Attacks Based on Blockchain

    Jieren Cheng1,2, Xinzhi Yao1,2,*, Hui Li3, Hao Lu4, Naixue Xiong5, Ping Luo1,2, Le Liu1,2, Hao Guo1,2, Wen Feng1,2

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 103-117, 2022, DOI:10.32604/csse.2022.025668

    Abstract Distributed Denial of Service (DDoS) attacks is always one of the major problems for service providers. Using blockchain to detect DDoS attacks is one of the current popular methods. However, the problems of high time overhead and cost exist in the most of the blockchain methods for detecting DDoS attacks. This paper proposes a blockchain-based collaborative detection method for DDoS attacks. First, the trained DDoS attack detection model is encrypted by the Intel Software Guard Extensions (SGX), which provides high security for uploading the DDoS attack detection model to the blockchain. Secondly, the service provider uploads the encrypted model to… More >

  • Open Access

    ARTICLE

    Ensemble Deep Learning Models for Mitigating DDoS Attack in Software-Defined Network

    Fatmah Alanazi*, Kamal Jambi, Fathy Eassa, Maher Khemakhem, Abdullah Basuhail, Khalid Alsubhi

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 923-938, 2022, DOI:10.32604/iasc.2022.024668

    Abstract Software-defined network (SDN) is an enabling technology that meets the demand of dynamic, adaptable, and manageable networking architecture for the future. In contrast to the traditional networks that are based on a distributed control plane, the control plane of SDN is based on a centralized architecture. As a result, SDNs are susceptible to critical cyber attacks that exploit the single point of failure. A distributed denial of service (DDoS) attack is one of the most crucial and risky attacks, targeting the SDN controller and disrupting its services. Several researchers have proposed signature-based DDoS mitigation and detection techniques that rely on… More >

  • Open Access

    ARTICLE

    Unprecedented Smart Algorithm for Uninterrupted SDN Services During DDoS Attack

    Muhammad Reazul Haque1, Saw Chin Tan1, Zulfadzli Yusoff2,*, Kashif Nisar3,7, Rizaludin Kaspin4, Iram Haider3, Sana Nisar3, J. P. C. Rodrigues5,6, Bhawani Shankar Chowdhry7, Muhammad Aslam Uqaili7, Satya Prasad Majumder8, Danda B. Rawat9, Richard Etengu1, Rajkumar Buyya10

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 875-894, 2022, DOI:10.32604/cmc.2022.018505

    Abstract In the design and planning of next-generation Internet of Things (IoT), telecommunication, and satellite communication systems, controller placement is crucial in software-defined networking (SDN). The programmability of the SDN controller is sophisticated for the centralized control system of the entire network. Nevertheless, it creates a significant loophole for the manifestation of a distributed denial of service (DDoS) attack straightforwardly. Furthermore, recently a Distributed Reflected Denial of Service (DRDoS) attack, an unusual DDoS attack, has been detected. However, minimal deliberation has given to this forthcoming single point of SDN infrastructure failure problem. Moreover, recently the high frequencies of DDoS attacks have… More >

  • Open Access

    ARTICLE

    Computational Intelligent Techniques To Detect DDOS Attacks : A Survey

    Isha Sood*, Varsha Sharma

    Journal of Cyber Security, Vol.3, No.2, pp. 89-106, 2021, DOI:10.32604/jcs.2021.018623

    Abstract The Internet is often targeted by the Distributed Denial of Service (DDOS) Attacks that deliberately utilize resources and bandwidth to prohibit access to potential users. The attack possibility is that the packets are filled massively. A DOS attack is launched by a single source, while a DDOS attack is originated from numerous resources. DDoS attacks are not capable of stealing website user’s information. The prime motive of the DDoS attacks is to devastate the website resources. Distributed Denial of Service (DDoS) attacks are disruptive to internet access on the Network. The attitude of the customer to get fast and reliable… More >

Displaying 11-20 on page 2 of 28. Per Page