| Issue |
Int. J. Simul. Multidisci. Des. Optim.
Volume 16, 2025
|
|
|---|---|---|
| Article Number | 29 | |
| Number of page(s) | 19 | |
| DOI | https://doi.org/10.1051/smdo/2025031 | |
| Published online | 24 December 2025 | |
Research Article
SVM driven approach for detecting DoS attacks in SDN environment
1
Faculty of Computer Science and Information Technology, Universiti Malaysia Sarawak, Malaysia
2
Department of Computer Science, COMSATS University Islamabad, Pakistan
* e-mail: najam_nisa@comsats.edu.pk
Received:
22
September
2025
Accepted:
10
October
2025
Software-Defined Networking (SDN) reveals a significant progression in networking technology, offering improved management and operational oversight of network infrastructures. Even though the control plane offers benefits, it is still susceptible to Denial of Service (DoS) attacks, and this poses a significant threat to system security. By taking advantage of the network's centralized architecture, these attacks pose serious dangers and can overload controllers, leading to severe packet loss and significant downtime in the network. To address this challenge, we propose a novel approach that efficiently detects DoS attacks by implementing a packet inspection process using a queuing mechanism, followed by machine learning classification using SVM and KNN algorithms. These algorithms were rigorously evaluated using the CICDoS 2017 dataset and integrated into an SDN threat-detection framework. The results of extensive testing in SDN environment demonstrated higher efficiency measures, such as enhanced network performance by reducing latency and resource consumption, maintaining a false-positive rate under 5%, and achieving a detection accuracy of 99%. These results demonstrate how well our proposed approach works to successfully detect DoS attacks in SDN systems. Moreover, the novel approach, the thorough end-to-end solution exhibited, and the importance of the experimental outcomes all work together to establish a solid basis for future studies in this area.
Key words: Software defined networking / Denial-of-Service (DoS) attacks / Distributed Denial-of-Service (DDoS) attacks / Mininet / CICDoS 2017 dataset / OpenFlow / RYU controller / Machine Learning (ML) / Support Vector Machine (SVM) / K-Nearest Neighbour (KNN) / First-In-First-Out (FIFO)
© N. Nisa et al., Published by EDP Sciences, 2025
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.
