Research Article

Cross-Plane DDoS Attack Defense Architecture Based on Flow Table Features in SDN

Table 2

Comparison of detection methods.

Approach (%) (%) (%)Detection time

Generalized entropy [25]96.26.26.30.91
Random forest [28]97.71.13.33.22
CNN-LSTM [31]97.15.95.81.89
Naïve Bayesian [54]96.17.57.21.11
Our approach98.90.51.40.51