Please use this identifier to cite or link to this item:
http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30061
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Abdullahi, Aishatu Wabi | - |
dc.contributor.author | Ismaila, Idris | - |
dc.contributor.author | Olaniyi, O. M. | - |
dc.contributor.author | Ojeniyi, Joseph Adebayo | - |
dc.date.accessioned | 2025-07-31T06:19:49Z | - |
dc.date.available | 2025-07-31T06:19:49Z | - |
dc.date.issued | 2024 | - |
dc.identifier.uri | http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30061 | - |
dc.description.abstract | The aim of a Software Defined Network is to provide flexibility and programmability towards ensuring network manageability and centralized control to deal with the growing users of future network. However, the advantages that SDN presents comes with security concerns arising from some vulnerabilities in its Architecture. Security concerns such as DDOS attack in SDN is growing in strength and sophistication trying to exploit the program mability and centralized control features of SDN Architecture. Although SDN is vulnerable to attack, SDN itself could be used to defeat attacks. This Article reviews DDOS Attack Detection and mitigation approaches and is further clustered into four as follows: Statistical based technique, techniques based on Machine Learning, Neural network and other detection approaches or Techniques. The capability and weakness of the detection techniques were pointed out. The metrics for the performance Evaluation of some of the various techniques as well as Data set repository were presented. Finally, some general research challenges and Gaps to guide future research in this area were discussed. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier - Computers & Security | en_US |
dc.relation.ispartofseries | 139 (2024), 103652; | - |
dc.subject | SDN DDOS attacks Detection Mitigation Review DDOS traffic features | en_US |
dc.title | DDOS attack detection in SDN: Method of attacks, detection techniques, challenges and research gaps | en_US |
dc.type | Article | en_US |
Appears in Collections: | Cyber Security Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
1-s2.0-S0167404823005618-main.pdf | 3.85 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.