Research Article

Machine Learning Enabled Techniques for Protecting Wireless Sensor Networks by Estimating Attack Prevalence and Device Deployment Strategy for 5G Networks

Table 1

Methodology comparison.

ReferencesDDoS attack mechanismType of tool and SDN controller usedExperimental limitations

[33]Intrusion is detected based on statistical analysisOpenFlow switch table entries attackOMNeT++Simultaneous detection cannot be performed when there is an alteration in the headers
[34]DDoS detection on the basis of entropyTCP SYN, UDPMininet and POXOnly limited to the detection mechanism.
[35]Prediction based on network bandwidthDoS attacksReal testbeds, floodlightLimited to only DoS attacks.
[36]PATMOSDDoS attacksMininet and POXThe problem in using clustering.
[37]Traffic flow migrationDoS attacksMininet and RyuConsistency issue may occur in case of multiple controllers’ environment
[38]Network traffic rule-based DDoS mitigationTCP-SYN traffic flooding attackMininet, ODLMay increase the consumption of bandwidth and thus increasing the overhead as well.
[39]Avant-guardTCP-SYN traffic floodingMininet, POXFor the protocols which are not based on TCP SYN, traffic.