Boukraa et al., 2023 - Google Patents
Intelligent intrusion detection in software-defined networking: A Comparative Study of SVM and Ann ModelsBoukraa et al., 2023
View PDF- Document ID
- 638216752375839120
- Author
- Boukraa L
- Essahraui S
- El Makkaoui K
- Ouahbi I
- Esbai R
- Publication year
- Publication venue
- Procedia Computer Science
External Links
Snippet
Software-defined networking (SDN) has emerged as a promising approach for managing network infrastructure through a centralized controller. However, the dynamic nature of SDN makes it susceptible to security threats, including DoS and DDoS attacks. Intrusion detection …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ahuja et al. | Automated DDOS attack detection in software defined networking | |
Alkasassbeh et al. | Detecting distributed denial of service attacks using data mining techniques | |
Nuaimi et al. | Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review | |
Kotenko et al. | Systematic literature review of security event correlation methods | |
Rawat et al. | Rooted learning model at fog computing analysis for crime incident surveillance | |
Ortet Lopes et al. | Towards effective detection of recent DDoS attacks: A deep learning approach | |
Repalle et al. | Intrusion detection system using ai and machine learning algorithm | |
Bodström et al. | State of the art literature review on network anomaly detection with deep learning | |
Alhayali et al. | Optimized machine learning algorithm for intrusion detection | |
Hussain | Network Intrusion Detection for Distributed Denial-of-Service (DDoS) Attacks using Machine Learning Classification Techniques | |
Sethi et al. | Robust adaptive cloud intrusion detection system using advanced deep reinforcement learning | |
Berdibayev et al. | A concept of the architecture and creation for siem system in critical infrastructure | |
Lopes et al. | Network intrusion detection based on the temporal convolutional model | |
Boukraa et al. | Intelligent intrusion detection in software-defined networking: A Comparative Study of SVM and Ann Models | |
Torre et al. | Deep learning techniques to detect cybersecurity attacks: a systematic mapping study | |
Sharma et al. | Analysis of ddos attacks in software defined networking using machine learning | |
Lent et al. | An Unsupervised Generative Adversarial Network System to Detect DDoS Attacks in SDN | |
Li et al. | Few-shot multi-domain knowledge rearming for context-aware defence against advanced persistent threats | |
Liao et al. | A multi-step attack identification and correlation method based on multi-information fusion | |
Holubenko et al. | An intelligent mechanism for monitoring and detecting intrusions in IoT devices | |
Samuel | Cyber situation awareness perception model for computer network | |
Jemili et al. | Active intrusion detection and prediction based on temporal big data analytics | |
Almohagri et al. | Machine learning approach for distributed daniel of service attack detection in SDNs | |
Ramaki et al. | Captain: community-based advanced persistent threat analysis in it networks | |
Girish et al. | DadGAN: DDOS Anomaly Detection using Generative Adversarial Network |