Please use this identifier to cite or link to this item: http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30060
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAbdullahi, A. W.-
dc.contributor.authorIsmaila, Idris-
dc.contributor.authorOlaniyi, O. M.-
dc.contributor.authorOjeniyi, Joseph Adebayo-
dc.contributor.authorAdebayo, O. S.-
dc.contributor.authorUduimoh, A. A.-
dc.date.accessioned2025-07-31T06:06:55Z-
dc.date.available2025-07-31T06:06:55Z-
dc.date.issued2023-
dc.identifier.urihttp://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30060-
dc.description.abstractThe most widely used southbound API of the software-defined network is the Open Flow protocol. Each flow in Open Flow has a set of packet-forwarding rules, which are referred to as flow entries. The switch processes packets in the SDN operation that meet the flow entries. The Packet that doesn't match any entries is transmitted as a Packet_in message to the Controller. Therefore, sending a lot of Packet in messages in a short amount of time could bring down the controller, and as a result, the entire network consequently resulting in to distributed denial of Service Attacks ( DDOS). This study uses the rate of Packet_in as a single feature, monitor, extract and utilize it to identify DDOS attacks in SDN using Random Fores classifier. The result shows 99.8% Accuracy which is slightly better than the work of [24] with 99.7%.en_US
dc.language.isoenen_US
dc.publisherInternational Journal of Engineering Applied Sciences and Technologyen_US
dc.relation.ispartofseries8(1), 261 – 267;-
dc.subjectOpenflow, Packet_in, SDN, DDOS, Random Foresten_US
dc.titleDDoS attack detection against SDN controller using a single traffic featureen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
Maint Article 261-267, Tesma0801,IJEAST (1).pdf457.04 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.