{"id":"https://openalex.org/W3185992347","doi":"https://doi.org/10.1109/netsoft51509.2021.9492558","title":"DDoS Attack Detection and Mitigation in SDN using Machine Learning","display_name":"DDoS Attack Detection and Mitigation in SDN using Machine Learning","publication_year":2021,"publication_date":"2021-06-28","ids":{"openalex":"https://openalex.org/W3185992347","doi":"https://doi.org/10.1109/netsoft51509.2021.9492558","mag":"3185992347"},"language":"en","primary_location":{"id":"doi:10.1109/netsoft51509.2021.9492558","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft51509.2021.9492558","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 7th International Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051471748","display_name":"Fatima Khashab","orcid":null},"institutions":[{"id":"https://openalex.org/I160368002","display_name":"Lebanese University","ror":"https://ror.org/05x6qnc69","country_code":"LB","type":"education","lineage":["https://openalex.org/I160368002"]},{"id":"https://openalex.org/I184679254","display_name":"Saint Joseph University","ror":"https://ror.org/044fxjq88","country_code":"LB","type":"education","lineage":["https://openalex.org/I184679254"]}],"countries":["LB"],"is_corresponding":true,"raw_author_name":"Fatima Khashab","raw_affiliation_strings":["University of Saint Joseph,Beirut,Lebanon","Lebanese University, Beirut, Lebanon; University of Saint Joseph, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"University of Saint Joseph,Beirut,Lebanon","institution_ids":["https://openalex.org/I184679254"]},{"raw_affiliation_string":"Lebanese University, Beirut, Lebanon; University of Saint Joseph, Beirut, Lebanon","institution_ids":["https://openalex.org/I184679254","https://openalex.org/I160368002"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058471570","display_name":"Joanna Moubarak","orcid":"https://orcid.org/0000-0001-5605-6095"},"institutions":[{"id":"https://openalex.org/I184679254","display_name":"Saint Joseph University","ror":"https://ror.org/044fxjq88","country_code":"LB","type":"education","lineage":["https://openalex.org/I184679254"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Joanna Moubarak","raw_affiliation_strings":["University of Saint Joseph,Beirut,Lebanon","University of Saint-Joseph, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"University of Saint Joseph,Beirut,Lebanon","institution_ids":["https://openalex.org/I184679254"]},{"raw_affiliation_string":"University of Saint-Joseph, Beirut, Lebanon","institution_ids":["https://openalex.org/I184679254"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082239159","display_name":"Antoine Feghali","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Antoine Feghali","raw_affiliation_strings":["Potech Labs,Beirut,Lebanon"],"affiliations":[{"raw_affiliation_string":"Potech Labs,Beirut,Lebanon","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024522221","display_name":"Carole Bassil","orcid":"https://orcid.org/0000-0002-7628-5191"},"institutions":[{"id":"https://openalex.org/I160368002","display_name":"Lebanese University","ror":"https://ror.org/05x6qnc69","country_code":"LB","type":"education","lineage":["https://openalex.org/I160368002"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Carole Bassil","raw_affiliation_strings":["Lebanese University,Beirut,Lebanon","Lebanese University , Beirut , Lebanon"],"affiliations":[{"raw_affiliation_string":"Lebanese University,Beirut,Lebanon","institution_ids":["https://openalex.org/I160368002"]},{"raw_affiliation_string":"Lebanese University , Beirut , Lebanon","institution_ids":["https://openalex.org/I160368002"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5051471748"],"corresponding_institution_ids":["https://openalex.org/I160368002","https://openalex.org/I184679254"],"apc_list":null,"apc_paid":null,"fwci":4.7373,"has_fulltext":false,"cited_by_count":41,"citation_normalized_percentile":{"value":0.95072416,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"395","last_page":"401"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8877054452896118},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8216279745101929},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6473890542984009},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6250184178352356},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.5936858654022217},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5880519151687622},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5525856614112854},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.5473731160163879},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.544514000415802},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5275530219078064},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.515112578868866},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5104066729545593},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4875302016735077},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4700193405151367},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.4547201991081238},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2547506093978882},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11592993140220642}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8877054452896118},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8216279745101929},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6473890542984009},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6250184178352356},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.5936858654022217},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5880519151687622},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5525856614112854},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.5473731160163879},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.544514000415802},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5275530219078064},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.515112578868866},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5104066729545593},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4875302016735077},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4700193405151367},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.4547201991081238},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2547506093978882},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11592993140220642},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/netsoft51509.2021.9492558","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft51509.2021.9492558","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 7th International Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W179179905","https://openalex.org/W1723129825","https://openalex.org/W1905251226","https://openalex.org/W1990680872","https://openalex.org/W2096504223","https://openalex.org/W2147118406","https://openalex.org/W2401501243","https://openalex.org/W2469255646","https://openalex.org/W2576571375","https://openalex.org/W2599033937","https://openalex.org/W2605782971","https://openalex.org/W2768853466","https://openalex.org/W2799843691","https://openalex.org/W2906883204","https://openalex.org/W2908445743","https://openalex.org/W2915905517","https://openalex.org/W2919121218","https://openalex.org/W2924689635","https://openalex.org/W2970145645","https://openalex.org/W2989394565","https://openalex.org/W3002257945","https://openalex.org/W3013296355","https://openalex.org/W4247679036","https://openalex.org/W4285719527","https://openalex.org/W6607259140","https://openalex.org/W6713357761","https://openalex.org/W6735013774","https://openalex.org/W6769791461","https://openalex.org/W6803478115"],"related_works":["https://openalex.org/W4230824443","https://openalex.org/W2292210693","https://openalex.org/W2767068794","https://openalex.org/W4229489764","https://openalex.org/W3114854705","https://openalex.org/W2735897973","https://openalex.org/W4213341501","https://openalex.org/W1543555101","https://openalex.org/W3195575042","https://openalex.org/W2898113880"],"abstract_inverted_index":{"Software":[0],"Defined":[1],"Networking":[2],"(SDN)":[3],"is":[4,174,186],"a":[5,57,195],"networking":[6],"paradigm":[7],"that":[8,172,183],"has":[9],"been":[10],"very":[11],"popular":[12],"due":[13],"to":[14,22,28,38,60,110,128,188],"its":[15,26],"advantages":[16],"over":[17],"traditional":[18],"networks":[19,35,68],"with":[20,194],"regard":[21],"scalability,":[23],"flexibility,":[24],"and":[25,42,62,123,132,165,192],"ability":[27],"solve":[29],"many":[30],"security":[31,40],"issues.":[32],"Nevertheless,":[33],"SDN":[34,67],"are":[36,100],"exposed":[37],"new":[39],"threats":[41],"attacks,":[43],"especially":[44],"Distributed":[45],"Denial":[46],"of":[47,108,126,198],"Service":[48],"(DDoS)":[49],"attacks.":[50],"For":[51],"this":[52],"aim,":[53],"we":[54],"have":[55],"proposed":[56],"model":[58,91,185],"able":[59,187],"detect":[61,189],"mitigate":[63],"attacks":[64,190],"automatically":[65],"in":[66,78,118,138],"using":[69],"Machine":[70,160],"Learning":[71],"(ML).":[72],"Different":[73],"than":[74],"other":[75],"approaches":[76],"found":[77],"literature":[79],"which":[80],"use":[81],"the":[82,93,101,106,111,115,119,124,129,135,139,175],"native":[83,94],"flow":[84,98,103,117,137],"features":[85,99],"only":[86],"for":[87],"attack":[88],"detection,":[89],"our":[90,184],"extends":[92],"features.":[95],"The":[96,169],"extended":[97],"average":[102],"packet":[104],"size,":[105],"number":[107,125],"flows":[109,127],"same":[112,130],"host":[113,131],"as":[114,134],"current":[116,136],"last":[120,140],"5":[121,141],"seconds,":[122],"port":[133],"seconds.":[142],"Six":[143],"ML":[144,178],"algorithms":[145],"were":[146],"evaluated,":[147],"namely":[148],"Logistic":[149],"Regression":[150],"(LR),":[151],"Naive":[152],"Bayes":[153],"(NB),":[154],"K-Nearest":[155],"Neighbor":[156],"(KNN),":[157],"Support":[158],"Vector":[159],"(SVM),":[161],"Decision":[162],"Tree":[163],"(DT),":[164],"Random":[166],"Forest":[167],"(RF).":[168],"experiments":[170],"showed":[171,182],"RF":[173],"best":[176],"performing":[177],"algorithm.":[179],"Also,":[180],"results":[181],"accurately":[191],"quickly,":[193],"low":[196],"probability":[197],"dropping":[199],"normal":[200],"traffic.":[201]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":20},{"year":2022,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
