ZTE Communications ›› 2020, Vol. 18 ›› Issue (4): 18-25.DOI: 10.12142/ZTECOM.202004004
• Special Topic • Previous Articles Next Articles
JIA Min1(), SHU Yuejie1, GUO Qing1, GAO Zihe2, XIE Suofei2
Received:
2020-09-29
Online:
2020-12-25
Published:
2021-01-13
About author:
JIA Min (Supported by:
JIA Min, SHU Yuejie, GUO Qing, GAO Zihe, XIE Suofei. DDoS Attack Detection Method for Space-Based Network Based on SDN Architecture[J]. ZTE Communications, 2020, 18(4): 18-25.
Add to citation manager EndNote|Ris|BibTeX
URL: http://zte.magtechjournal.com/EN/10.12142/ZTECOM.202004004
Figure 4 Training results obtained by using the binary classification cross-entropy loss function instead of root mean square error (RMSE) as the fitness function (still in the state of simple genetic algorithm).
Model | Training Set Accuracy/% | Test Set Accuracy/% | Single Test Time/ms |
---|---|---|---|
SVM | 99.85 | 99.86 | 0.116 |
Random forest | 99.90 | 99.82 | 118.966 |
Table 1 Training results
Model | Training Set Accuracy/% | Test Set Accuracy/% | Single Test Time/ms |
---|---|---|---|
SVM | 99.85 | 99.86 | 0.116 |
Random forest | 99.90 | 99.82 | 118.966 |
Figure 10 Successful detection of the Distributed Denial of Service (DDoS) attack detection method for space-based network based on software defined network (SDN) architecture.
1 |
GIOTIS K, ARGYROPOULOS C, ANDROULIDAKIS G, et al. Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments [J]. Computer networks, 2014, 62: 122–136. DOI: 10.1016/j.bjp.2013.10.014
DOI |
2 |
BRAGA R, MOTA E, PASSITO A. Lightweight DDoS flooding attack detection using NOX/OpenFlow [C]//35th Annual IEEE Conference on Local Computer Networks. Denver, USA: IEEE, 2010: 408–415. DOI: 10.1109/LCN.2010.5735752
DOI |
3 |
DEEPA V, SUDAR K M, DEEPALAKSHMI P. Detection of DDoS attack on SDN control plane using hybrid machine learning techniques [C]//International Conference on Smart Systems and Inventive Technology (ICSSIT). Tirunelveli, India: IEEE, 2018: 299–303. DOI: 10.1109/ICSSIT.2018.8748836
DOI |
4 |
XU Y H, SUN H T, XIANG F, et al. Efficient DDoS detection based on K⁃FKNN in software defined networks [J]. IEEE access, 2019, 7(160536–160545). DOI: 10.1109/ACCESS.2019.2950945
DOI |
5 | MCKEOWN N. Software⁃defined networking [Z]. Infocom Keynote Talk, Rio de Janeiro, Brazil, 2009 |
6 |
ZHENG S J. Research on SDN⁃based IoT security architecture model [C]//IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC). Chongqing, China: IEEE, 2019: 575–579. DOI: 10.1109/ITAIC.2019.8785456
DOI |
7 |
SHIN S, XU L, HONG S, et al. Enhancing network security through software defined networking (SDN) [C]//25th International Conference on Computer Communication and Networks (ICCCN). Waikoloa, USA: IEEE, 2016: 1–9. DOI: 10.1109/ICCCN.2016.7568520
DOI |
8 |
YANG L, ZHAO H. DDoS attack identification and detection using SDN based on machine learning method [C]//15th International Symposium on Pervasive Systems, Algorithms and Networks (I⁃SPAN). Yichang, China: IEEE, 2018: 174–178. DOI: 10.1109/I-SPAN.2018.00036
DOI |
9 |
TATANG D, QUINKERT F, FRANK J, et al. SDN⁃guard: protecting SDN controllers against SDN rootkits [C]//2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV⁃SDN). Berlin, Germany: IEEE, 2017: 297–302. DOI: 10.1109/NFV-SDN.2017.8169856
DOI |
10 | VAITHEESWARAN S S, VENTRAPRAGADA V R. Wind power pattern prediction in time series measuremnt data for wind energy prediction modelling using LSTM⁃GA networks [C]//10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). Kanpur, India: IEEE, 2019: 1–5 |
[1] | LI Daiyi, TU Yaofeng, ZHOU Xiangsheng, ZHANG Yangming, MA Zongmin. End-to-End Chinese Entity Recognition Based on BERT-BiLSTM-ATT-CRF [J]. ZTE Communications, 2022, 20(S1): 27-35. |
[2] | WU Hequan. Ten Reflections on 5G [J]. ZTE Communications, 2020, 18(1): 1-4. |
[3] | CHEN Yan, WEN Xitao, LENG Xue, YANG Bo, Li Erran Li, ZHENG Peng, HU Chengchen. Optimization Framework for Minimizing Rule Update Latency in SDN Switches [J]. ZTE Communications, 2018, 16(4): 15-29. |
[4] | BAI Jiasong, ZHANG Menghao, BI Jun. Survey of Attacks and Countermeasures for SDN [J]. ZTE Communications, 2018, 16(4): 3-8. |
[5] | ZHANG Yunyong, XU Lei, TAO Ye. SDN Based Security Services [J]. ZTE Communications, 2018, 16(4): 9-14. |
[6] | XU Xiaoqiong, YU Hongfang, YANG Kun. DDoS Attack in Software Defined Networks: A Survey [J]. ZTE Communications, 2017, 15(3): 13-19. |
[7] | LIAO Lingxia, Victor C. M. Leung, LAI Chin-Feng. Evolutionary Algorithms in Software Defined Networks: Techniques, Applications, and Issues [J]. ZTE Communications, 2017, 15(3): 20-36. |
[8] | CAO Cong, FAN Xinyu, LIU Qingwen, HE Zuyuan. Practical Pattern Recognition System for Distributed Optical Fiber Intrusion Monitoring Based on Ф-COTDR [J]. ZTE Communications, 2017, 15(3): 52-55. |
[9] | WANG Yangyang, BI Jun. Survey of Mechanisms for Inter-Domain SDN [J]. ZTE Communications, 2017, 15(3): 8-12. |
[10] | DONG Baihong, WU Weigang, YANG Zhiwei, LI Junjie. Software Defined Networking Based On-Demand Routing Protocol in Vehicle Ad-Hoc Networks [J]. ZTE Communications, 2017, 15(2): 11-18. |
[11] | Zhi Liu, Xiang Wang, and Jun Li. From CIA to PDR:A Top-Down Survey of SDN Security for Cloud DCN [J]. ZTE Communications, 2016, 14(1): 54-60. |
[12] | Bofei Wang, Diankai Zhang, Chi Zhang, Jiani Hu, and Weihong Deng. Facial Landmark Localization by Gibbs Sampling [J]. ZTE Communications, 2014, 12(4): 23-29. |
[13] | M. Boucadair and C. Jacquenet. Service Parameter Exposure and Dynamic Service Negotiation in SDN Environments [J]. ZTE Communications, 2014, 12(2): 8-17. |
[14] | Xiongyan Tang, Pei Zhang, and Chang Cao. SDN-Based Broadband Network for Cloud Services [J]. ZTE Communications, 2014, 12(2): 18-22. |
[15] | Jiandong Li, Peng Liu, and Hongyan Li. Software-Defined Cellular Mobile Network Solutions [J]. ZTE Communications, 2014, 12(2): 28-33. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||