Research Article

[Retracted] Lightweight Statistical Approach towards TCP SYN Flood DDoS Attack Detection and Mitigation in SDN Environment

Table 3

Comparative study of various DDoS detection strategies.

Ref. no.ApproachMethodBenefitsLimitations

[40]Anomaly-based detectionEntropy, source IP index, and packet rateLow computational time, low false-positive/negative rate, and high detection throughputLow accuracy and low adaptability
[41]Machine learningDNNHigh accuracyHigh computational time
[42]StatisticalUsed FGPANine types of DDoS attacks can be detected based on incoming trafficHigh detection time, computational complexity, and low flexibility
[43]Rate limitingFlowSecLow computational time and high detection throughputLow accuracy and high false-positive rate
[44]StatisticalSwitch statisticsLow computational time, High accuracy, and flexibilityHigh false- positive/negative rate and complexity
[45]Machine learningLSTM + CNNHigh detection accuracy and minimal false-positive rateMemory consumption and computational complexity are high
[46]HybridLong short-term memory + fuzzy logicHigh accuracy, flexibility, and minimum damageComputational complexity