Detection of TCP, UDP and ICMP DDOS attacks in SDN Using Machine Learning approach

R Anusuya, MR Prabhu, C Prathima… - Journal of Survey in …, 2023 - sifisheriessciences.com
… Dataset that will be used for both training and testing the algorithms is SDN DDOS. Prior to
the analysis, essential pre-processing steps have been carried out on the dataset. Necessary …

An investigation into the application of deep learning in the detection and mitigation of DDOS attack on SDN controllers

JD Gadze, AA Bamfo-Asante, JO Agyemang… - Technologies, 2021 - mdpi.com
… Using the hping3 tool, we simulated a normal TCP, UDP, and ICMP traffic between two
endpoints in the network. Afterwards, we simulated a DoS for TCP, UDP, and ICMP flood attacks. …

Research trends in security and DDoS in SDN

N Dayal, P Maity, S Srivastava… - Security and …, 2016 - Wiley Online Library
… Similar to UDP flood, ICMP flood attacks are also marked with a huge number of ICMP
TCP_SYN flood or TCP state exhaustion attack exploits the feature of TCP protocol to affect the …

A comprehensive and effective mechanism for DDoS detection in SDN

M Conti, A Gangwal, MS Gaur - 2017 IEEE 13th International …, 2017 - ieeexplore.ieee.org
… Based on the targeted protocol level, DDoS attacks can be broadly classified into two
categories [10, 11]: 1) Transport/network-level attacks: Such attacks use ICMP, TCP, UDP, and …

HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN

AA Bahashwan, M Anbar, S Manickam, G Issa… - Plos one, 2024 - journals.plos.org
… Consequently, this section examines DL-based approaches for detecting SDN DDoS
attacks… considers the prevailing realistic SDN DDoS attack (TCP, UDP, and ICMP) with traffic …

DDoS attack detection and mitigation using SDN: methods, practices, and solutions

NZ Bawany, JA Shamsi, K Salah - Arabian Journal for Science and …, 2017 - Springer
… attack, but it uses illegitimate UDP traffic instead of ICMP traffic to achieve the same goal …
TCP receive queues would be filled up, denying new TCP connections to legitimate clients UDP

[PDF][PDF] A Review of Anomaly Detection Techniques and Distributed Denial of Service (DDoS) on Software Defined Network (SDN).

MHH Khairi, SHS Ariffin, NM Latiff… - … & Applied Science …, 2018 - pdfs.semanticscholar.org
UDP flood attack, ICMP flood attack and TCP flood attack … : In a UDP flood attack, a large
volume of UDP packets are sent to … these ports. Since no waiting application is usually found, an …

Strategies for detecting and mitigating DDoS attacks in SDN: A survey

MM Joëlle, YH Park - Journal of Intelligent & Fuzzy Systems, 2018 - content.iospress.com
ICMP flood is similar to the UDP flood attack, it’sa type of attacks in which an attacker takes
down a victim’s computer by overwhelming it with ICMP … , TCP flooding and ICMP flooding …

Detection and Mitigation of ICMP-based DDoS in Software Defined Networks

MM Shehabat, MM Shurman - 2024 15th International …, 2024 - ieeexplore.ieee.org
TCP, UDP, and ICMP with 420,000 instances. We specifically focused on the ICMP data …
These results confirm that our technique effectively detects and mitigates SDN DDoS threats, …

DDoS attacks detection and mitigation in SDN using machine learning

O Rahman, MAG Quraishi… - 2019 IEEE world congress …, 2019 - ieeexplore.ieee.org
… DDoS attacks can flood the victim network in several ways: TCP, UDP, ICMP flood attack, …
• DDoS Traffic script – It floods the web servers with ICMP and TCP packets at a rate of 78 …