Please use this identifier to cite or link to this item:
http://hdl.handle.net/2080/4234
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kujur, Priyanka | - |
dc.contributor.author | Patel, Sanjeev | - |
dc.date.accessioned | 2024-01-04T10:35:15Z | - |
dc.date.available | 2024-01-04T10:35:15Z | - |
dc.date.issued | 2023-12 | - |
dc.identifier.citation | IEEE 15th International Conference on Computational Intelligence and Communication Networks (CICN), Bangkok, Thailand, 22-23 December 2023 | en_US |
dc.identifier.uri | http://hdl.handle.net/2080/4234 | - |
dc.description | Copyright belongs to proceeding publisher | en_US |
dc.description.abstract | The network has become increasingly complicated and diversified in recent years due to the rapid growth of internet technology and its coverage. Software-defined networking (SDN) is a recent approach to network architecture. DDoS attacks have a measurable effect on SDN because of their centralized nature. This results in an early discovery, and prevention of DDoS attacks is essential. DDoS is a network risk that tries to flood targeted networks with unwanted data. This paper focuses on various ML approaches for classifying DDoS attacks by providing decision-making. That results in making the computing system more intelligent. We have used the most popular ML techniques to identify the attacks. To prevent and mitigate attacks, the evaluation process includes training and adoption of a suitable model for the specific network. | en_US |
dc.subject | DDoS Attacks, | en_US |
dc.subject | SDN | en_US |
dc.subject | Supervised machine learning approach | en_US |
dc.subject | Precision | en_US |
dc.subject | Recall | en_US |
dc.title | Comparison of Various ML Approaches for Detection of DDoS Attacks in SDN | en_US |
dc.type | Article | en_US |
Appears in Collections: | Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2023_CICN_PKujur_Comparison.pdf | 229.62 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.