
Int J Performability Eng ›› 2025, Vol. 21 ›› Issue (4): 219-225.doi: 10.23940/ijpe.25.04.p5.219225
Previous Articles Next Articles
Sumit Badotra*
Submitted on
;
Revised on
;
Accepted on
Contact:
*E-mail address: Sumit Badotra. Machine Learning Enabled Model Against DDoS Detection using Software Defined Networking [J]. Int J Performability Eng, 2025, 21(4): 219-225.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
| [1] Singh C., andJain A.K., 2024. A comprehensive survey on DDoS attacks detection & mitigation in SDN-IoT network.E-Prime-Advances in Electrical Engineering, Electronics and Energy, 100543. [2] Hnamte V., Najar A.A., Nhung-Nguyen H., Hussain J., andSugali M.N., 2024. DDoS attack detection and mitigation using deep neural network in SDN environment. [3] Chahal J.K., Bhandari A., andBehal S., 2024. DDoS attacks & defense mechanisms in SDN-enabled cloud: taxonomy, review and research challenges. [4] Karnani S., Agrawal N., andKumar R., 2024. A comprehensive survey on low-rate and high-rate DDoS defense approaches in SDN: taxonomy, research challenges, and opportunities. [5] Alashhab A.A., Zahid M.S., Isyaku B., Elnour A.A., Nagmeldin W., Abdelmaboud A., Abdullah T.A.A., andMaiwada U.D., 2024. Enhancing DDoS attack detection and mitigation in SDN using an ensemble online machine learning model. [6] Kaur A., Krishna C.R., andPatil N.V., 2024. K‐DDoS‐SDN: a distributed DDoS attacks detection approach for protecting SDN environment. [7] Songa A.V., andKarri G.R., 2024. An integrated SDN framework for early detection of DDoS attacks in cloud computing. [8] Wang K., Fu Y., Duan X., andLiu T., 2024. Detection and mitigation of DDoS attacks based on multi-dimensional characteristics in SDN. [9] Badotra S., andPanda S.N., 2020. Experimental comparison and evaluation of various OpenFlow software defined networking controllers. [10] Wabi A.A., Idris I., Olaniyi O.M., andOjeniyi J.A., 2024. DDOS attack detection in SDN: method of attacks, detection techniques, challenges and research gaps. [11] Badotra S., Sundas A., Ganguli I., Verma A., andSingh G., 2023. Intelligent network load balancing system with geographic routing and SDN multi-controller architecture. In2023 Second International Conference on Smart Technologies for Smart Nation (SmartTechCon), pp. 83-86. [12] Aslam N., Srivastava S., andGore M.M., 2024. Ddos sourcetracer: an intelligent application for ddos attack mitigation in sdn. [13] Singh A., Kaur H., andKaur N., 2024. A novel DDoS detection and mitigation technique using hybrid machine learning model and redirect illegitimate traffic in SDN network. |
| [1] | Ashu Mehta, Navdeep Kaur, and Amandeep Kaur. A Review of Software Fault Prediction Techniques in Class Imbalance Scenarios [J]. Int J Performability Eng, 2025, 21(3): 123-130. |
| [2] | Vikas, Charu Wahi, Bharat Bhushan Sagar, and Manisha Manjul. Trust Management in WSN using ML for Detection of DDoS Attacks [J]. Int J Performability Eng, 2025, 21(3): 157-167. |
| [3] | Arpna Saxena and Sangeeta Mittal. CluSHAPify: Synergizing Clustering and SHAP Value Interpretations for Improved Reconnaissance Attack Detection in IIoT Networks [J]. Int J Performability Eng, 2025, 21(1): 36-47. |
| [4] | Seema Kalonia and Amrita Upadhyay. Comparative Analysis of Machine Learning Model and PSO Optimized CNN-RNN for Software Fault Prediction [J]. Int J Performability Eng, 2025, 21(1): 48-55. |
| [5] | Vikas Kumar, Charu Wahi, Bharat Bhushan Sagar, and Manisha Manjul. Ensemble Learning Based Intrusion Detection for Wireless Sensor Network Environment [J]. Int J Performability Eng, 2024, 20(9): 541-551. |
| [6] | Kalyani H. Deshmukh, Gajendra R. Bamnote, and Pratik K Agrawal. A Novel Approach for Drought Monitoring and Evaluation using Time Series Analysis and Deep Learning [J]. Int J Performability Eng, 2024, 20(8): 498-509. |
| [7] | Saurabh Saxena, and Chetna Gupta. Optimizing Bug Resolution: A Data-Driven Developer Recommendation System [J]. Int J Performability Eng, 2024, 20(8): 510-519. |
| [8] | Lakshya Vaswani, Sai Sri Harsha, Subham Jaiswal, and Aju D. Unravelling Complexity: Investigating the Effectiveness of SHAP Algorithm for Improving Explainability in Network Intrusion System Across Machine and Deep Learning Models [J]. Int J Performability Eng, 2024, 20(7): 421-431. |
| [9] | Meenakshi Chawla and Meenakshi Pareek. A Hybrid Deep Learning Perspective for Software Effort Estimation [J]. Int J Performability Eng, 2024, 20(7): 442-450. |
| [10] | Ajeet Kumar Sharma and Rakesh Kumar. IoT Malware Detection and Dynamic Analysis of MQTT Simulated Network [J]. Int J Performability Eng, 2024, 20(7): 451-459. |
| [11] | Abhishek Gupta and Jaspreet Singh. Data-Driven Security Framework for VANET using Firefly and ANN [J]. Int J Performability Eng, 2024, 20(6): 344-354. |
| [12] | Vikas Verma, Arun Malik, and Isha Batra. Analyzing and Classifying Malware Types on Windows Platform using an Ensemble Machine Learning Approach [J]. Int J Performability Eng, 2024, 20(5): 312-318. |
| [13] | Harshita Batra and Leema Nelson. ESD: E-mail Spam Detection using Cybersecurity-Driven Header Analysis and Machine Learning based Content Analysis [J]. Int J Performability Eng, 2024, 20(4): 205-213. |
| [14] | Manu Jyoti Gupta and Parveen Sehgal. Optimizing Credit Card Fraud Detection: Classifier Performance and Feature Selection Empowered by Grasshopper Algorithm [J]. Int J Performability Eng, 2024, 20(3): 177-185. |
| [15] | Aparna Shrivastava and P Raghu Vamsi. Improving Anomaly Classification using Combined Data Transformation and Machine Learning Methods [J]. Int J Performability Eng, 2024, 20(2): 68-80. |
|