A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking

被引:26
作者
Bahashwan, Abdullah Ahmed [1 ]
Anbar, Mohammed [1 ]
Manickam, Selvakumar [1 ]
Al-Amiedy, Taief Alaa [1 ]
Aladaileh, Mohammad Adnan [1 ,2 ]
Hasbullah, Iznan H. H. [1 ]
机构
[1] Univ Sains Malaysia, Natl Adv Ctr IPv6 NAv6, Gelugor 11800, Penang, Malaysia
[2] Amer Univ Madaba AUM, Sch Informat Technol, Cybersecur Dept, Amman 11821, Jordan
关键词
systematic literature review (SLR); software-defined networking (SDN); machine learning (ML); deep learning (DL); distributed denial of service (DDoS); intrusion detection system (IDS); SDN-BASED ARCHITECTURE; FLOODING ATTACKS; FUZZY-LOGIC; DEFENSE; MITIGATION; TAXONOMY; CONTROLLER; ALGORITHM; MECHANISM; FRAMEWORK;
D O I
10.3390/s23094441
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, including flexibility and manageability. Despite those advantages, SDN is vulnerable to distributed denial of service (DDoS), which constitutes a significant threat due to its impact on the SDN network. Despite many security approaches to detect DDoS attacks, it remains an open research challenge. Therefore, this study presents a systematic literature review (SLR) to systematically investigate and critically analyze the existing DDoS attack approaches based on machine learning (ML), deep learning (DL), or hybrid approaches published between 2014 and 2022. We followed a predefined SLR protocol in two stages on eight online databases to comprehensively cover relevant studies. The two stages involve automatic and manual searching, resulting in 70 studies being identified as definitive primary studies. The trend indicates that the number of studies on SDN DDoS attacks has increased dramatically in the last few years. The analysis showed that the existing detection approaches primarily utilize ensemble, hybrid, and single ML-DL. Private synthetic datasets, followed by unrealistic datasets, are the most frequently used to evaluate those approaches. In addition, the review argues that the limited literature studies demand additional focus on resolving the remaining challenges and open issues stated in this SLR.
引用
收藏
页数:48
相关论文
共 132 条
[1]  
Abdalla M.A. Y., 2006, PROC IEEE INT S CIRC, P1
[2]   Evaluation of Machine Learning Techniques for Security in SDN [J].
Ahmad, Ahnaf ;
Harjula, Erkki ;
Ylianttila, Mika ;
Ahmad, Ijaz .
2020 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2020,
[3]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[4]  
Ahmed R., 2021, TECHRXIV, V21, P1
[5]   Automated DDOS attack detection in software defined networking [J].
Ahuja, Nisha ;
Singal, Gaurav ;
Mukhopadhyay, Debajyoti ;
Kumar, Neeraj .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 187 (187)
[6]   DLSDN: Deep Learning for DDOS attack detection in Software Defined Networking [J].
Ahuja, Nisha ;
Singal, Gaurav ;
Mukhopadhyay, Debajyoti .
2021 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2021), 2021, :683-688
[7]  
Ahuja Nisha, 2020, Mendeley Data, V1, DOI 10.17632/JXPFJC64KR.1
[8]   A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things [J].
Al-Amiedy, Taief Alaa ;
Anbar, Mohammed ;
Belaton, Bahari ;
Bahashwan, Abdullah Ahmed ;
Hasbullah, Iznan Husainy ;
Aladaileh, Mohammad Adnan ;
AL Mukhaini, Ghada .
INTERNET OF THINGS, 2023, 22
[9]   A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things [J].
Al-Amiedy, Taief Alaa ;
Anbar, Mohammed ;
Belaton, Bahari ;
Kabla, Arkan Hammoodi Hasan ;
Hasbullah, Iznan H. ;
Alashhab, Ziyad R. .
SENSORS, 2022, 22 (09)
[10]   Mechanism to prevent the abuse of IPv6 fragmentation in OpenFlow networks [J].
Al-Ani, Ayman ;
Anbar, Mohammed ;
Laghari, Shams A. ;
Al-Ani, Ahmed K. .
PLOS ONE, 2020, 15 (05)