TY - JOUR AV - none TI - Attack detection analysis in software-defined networks using various machine learning method ID - scholars18592 KW - Analysis of variance (ANOVA); Deep learning; Denial-of-service attack; Entropy; Feature Selection; Learning algorithms; Learning systems; Nearest neighbor search; Neural networks; Next generation networks; Support vector machines; Transmission control protocol KW - Attack detection; Deep learning; Distributed denial of service; Entropy algorithms; Features selection; Joint entropy; Machine-learning; Renyi joint entropy algorithm; Software denied networking; Software-defined networks KW - Controllers N1 - cited By 8 N2 - The Software-Defined Network (SDN) provides a more flexible and effectively managed network design for next-generation networking. Network managers can easily manage and regulate the entire network using its programmable central controller architecture. This central controller serves as the focal point for numerous attack vectors due to its centralized structure. However, Distributed Denial of Service (DDoS) attacks against the SDN is the most prominent. The goal of this project is to use a machine learning method to categorize SDN traffic as either attack or normal traffic. Next, the Feature Selection method, such as the Filter-based Fisher score method, Wrapper-based method, and analysis of variables (ANOVA) f-test, is used for finely-granulated detection. Then, a rule-based detection method using the Renyi joint entropy algorithm is employed to detect DDoS attacks on SDN controllers. We manage a public "DDoS attack SDN Dataset" with 23 attributes overall. The dataset includes normal and attack traffic for the Internet Control Message Protocol (ICMP), User Datagram Protocol (UDP), and Transmission Control Protocol (TCP). Except for attributes that specify the target and source machines, the dataset, which contains more than 100,000 recordings, has statistical features such as byte count, duration sec, packet rate, and packet per flow. In the classification process, many classifiers such as Artificial Neural Network (ANN), XGBoost (XGB), Support Vector Machine (SVM), and k-Nearest Neighbor (k-NN) were used. The test results demonstrated the efficacy and efficiency of the suggested strategy using the analysis of variables (ANOVA), which performed better than competing methods across a range of evaluation parameters. © 2023 PB - Elsevier Ltd SN - 00457906 Y1 - 2023/// VL - 108 JF - Computers and Electrical Engineering A1 - Wang, Y. A1 - Wang, X. A1 - Ariffin, M.M. A1 - Abolfathi, M. A1 - Alqhatani, A. A1 - Almutairi, L. UR - https://www.scopus.com/inward/record.uri?eid=2-s2.0-85150879371&doi=10.1016%2fj.compeleceng.2023.108655&partnerID=40&md5=ac60ebc1e5e38a57890a740f5bacd086 ER -