Research Article
Cross-Plane DDoS Attack Defense Architecture Based on Flow Table Features in SDN
Table 2
Comparison of detection methods.
| Approach | (%) | (%) | (%) | Detection time |
| Generalized entropy [25] | 96.2 | 6.2 | 6.3 | 0.91 | Random forest [28] | 97.7 | 1.1 | 3.3 | 3.22 | CNN-LSTM [31] | 97.1 | 5.9 | 5.8 | 1.89 | Naïve Bayesian [54] | 96.1 | 7.5 | 7.2 | 1.11 | Our approach | 98.9 | 0.5 | 1.4 | 0.51 |
|
|