Open AccessOpen Access


DoS Attack Detection Based on Deep Factorization Machine in SDN

Jing Wang1, Xiangyu Lei1, Qisheng Jiang1, Osama Alfarraj2, Amr Tolba2, Gwang-jun Kim3,*

1 School of Computer & Communication Engineering, Changsha University of Science & Technology, Changsha, 410114, China
2 Computer Science Department, Community College, King Saud University, Riyadh, 11437, Saudi Arabia
3 Department of Computer Engineering, Chonnam National University, Gwangju, 61186, Korea

* Corresponding Author: Gwang-jun Kim. Email:

Computer Systems Science and Engineering 2023, 45(2), 1727-1742.


Software-Defined Network (SDN) decouples the control plane of network devices from the data plane. While alleviating the problems presented in traditional network architectures, it also brings potential security risks, particularly network Denial-of-Service (DoS) attacks. While many research efforts have been devoted to identifying new features for DoS attack detection, detection methods are less accurate in detecting DoS attacks against client hosts due to the high stealth of such attacks. To solve this problem, a new method of DoS attack detection based on Deep Factorization Machine (DeepFM) is proposed in SDN. Firstly, we select the Growth Rate of Max Matched Packets (GRMMP) in SDN as detection feature. Then, the DeepFM algorithm is used to extract features from flow rules and classify them into dense and discrete features to detect DoS attacks. After training, the model can be used to infer whether SDN is under DoS attacks, and a DeepFM-based detection method for DoS attacks against client host is implemented. Simulation results show that our method can effectively detect DoS attacks in SDN. Compared with the K-Nearest Neighbor (K-NN), Artificial Neural Network (ANN) models, Support Vector Machine (SVM) and Random Forest models, our proposed method outperforms in accuracy, precision and F1 values.


Cite This Article

J. Wang, X. Lei, Q. Jiang, O. Alfarraj, A. Tolba et al., "Dos attack detection based on deep factorization machine in sdn," Computer Systems Science and Engineering, vol. 45, no.2, pp. 1727–1742, 2023.

This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 440


  • 170


  • 1


Share Link

WeChat scan