|
Reference | Main idea | Type | Strength | Future work | Results |
|
Myint et al. [33] | Enhancing the functionalities of the existing SVM algorithm by purposing ASVM (advance vector machine) to detect DDOS assault | Detection | Minimize the disturbance of users’ activities | In the future, an online detection DDoS attacks system on SDN networks and other SDN layer attack planes should be considered | Experimental outcomes show that the proposed detection technique has a 97 percent accuracy rate with the shortest training and testing times |
|
Prakash and Priyadarshini [34] | A smart intrusion detection model can distinguish between malicious and normal arriving packets | Detection | The proposed method can successfully determine whether the incoming packet is malicious | After identifying the infected packets, extra actions would take to notify the target users and devices more quickly in the future | Experimental results show that KNN performed best out of the three algorithms trained on 75% of the data |
|
Y. C. Wang and Y. C. Wang [35] | Purposing lightweight, effective ELD mechanism to fight against protocol-type DDoS attacks | Detection and prevention | Purposed method decreases the costs of the controller and quickly identifies and prevents DDOS attacks | This study is an initial step in this field of research. More research in the future can improve the accuracy of this technique | Findings prove that ELD enhances the true positive rate, dramatically reduces false alarms, and substantially decreases the cost of the controller |
|
Nam et al. [36] | Utilizing self-organizing map to categorize the present network status as regular or malicious | Detection | As compared to traditional detection algorithms, the proposed techniques performed better | The attempted methods used to automate the selection of an attribute can be explored in the future | Outcomes show that proposed algorithms can shorten processing time while maintaining a high level of accuracy |
|
Hu et al. [37] | Purposing FADM is an effective and lightweight framework for the detection and mitigation of DDoS attacks in an SDN context | Detection and mitigation | As compared to other existing detection techniques, running costs of FADM is quite low | In the future, application-layer DDoS attacks and botnets can be detected using the characteristics of SDN and machine learning technologies | Results reveal that several DDoS attacks can be efficiently identified and mitigated, and networks can recover quickly by using FADM |
|
Giri et al. [38] | Blockchain and software-defined network is used to support a shared DDoS mitigation architecture across various network domains | Mitigation | The proposed technique helps to reduce the complexities of shielding a hybridized enterprise against the impacts of DDoS attacks | The proposed architecture would be evaluated with and without blockchain applications to determine the system’s effectiveness in the future | Experimental results reveal that SDN’s capacity made a network decentralized, while blockchain’s distributed nature gave a viable approach to collaborative DDoS mitigation |
|