An Adversarial DBN-LSTM Method for Detecting and Defending against DDoS Attacks in SDN Environments

As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and network risk assessment, Cyber Range is exceptionally vulnerable to distributed denial of service (DDoS) attacks from three...

Full description

Bibliographic Details
Main Authors: Lei Chen, Zhihao Wang, Ru Huo, Tao Huang
Format: Article
Language:English
Published: MDPI AG 2023-04-01
Series:Algorithms
Subjects:
Online Access:https://www.mdpi.com/1999-4893/16/4/197