IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN

DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN
View Sample PDF
Author(s): Rochak Swami (National Institute of Technology, Kurukshetra, India), Mayank Dave (National Institute of Technology, Kurukshetra, India)and Virender Ranga (National Institute of Technology, Kurukshetra, India)
Copyright: 2020
Pages: 22
Source title: Security and Privacy Issues in Sensor Networks and IoT
Source Author(s)/Editor(s): Priyanka Ahlawat (National Institute of Technology, Kurukshetra, India)and Mayank Dave (National Institute of Technology, Kurukshetra, India)
DOI: 10.4018/978-1-7998-0373-7.ch008

Purchase

View DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN on the publisher's website for pricing and purchasing information.

Abstract

Distributed denial of service (DDoS) attack is one of the most disastrous attacks that compromises the resources and services of the server. DDoS attack makes the services unavailable for its legitimate users by flooding the network with illegitimate traffic. Most commonly, it targets the bandwidth and resources of the server. This chapter discusses various types of DDoS attacks with their behavior. It describes the state-of-the-art of DDoS attacks. An emerging technology named “Software-defined networking” (SDN) has been developed for new generation networks. It has become a trending way of networking. Due to the centralized networking technology, SDN suffers from DDoS attacks. SDN controller manages the functionality of the complete network. Therefore, it is the most vulnerable target of the attackers to be attacked. This work illustrates how DDoS attacks affect the whole working of SDN. The objective of this chapter is also to provide a better understanding of DDoS attacks and how machine learning approaches may be used for detecting DDoS attacks.

Related Content

Pankaj Bhambri, Alex Khang. © 2024. 17 pages.
Ushaa Eswaran, Vivek Eswaran, Keerthna Murali, Vishal Eswaran. © 2024. 27 pages.
Punam Rattan, Geeta Sharma, Pavitar Prakash Singh. © 2024. 24 pages.
J. Avanija, C. Rajyalakshmi, K. Reddy Madhavi, B. Narendra Kumar Rao. © 2024. 14 pages.
Sajida Mustafa, Rehan Mehmood Sabir, Abid Sarwar, Muhammad Safdar, Mohammed Saleh Al Ansari, Saddam Hussain. © 2024. 26 pages.
Muhammad Fawaz Saleem, Ali Raza, Rehan Mehmood Sabir, Muhammad Safdar, Muhammad Faheem, Mohammed Saleh Al Ansari, Saddam Hussain. © 2024. 29 pages.
Kashif Ali, Zuhaib Nishtar, Rehan Mehmood Sabir, Muhammad Safdar. © 2024. 20 pages.
Body Bottom