Optical burst switching networks are vulnerable to various threats including Burst Header Packet Flooding attack, Circulating Burst Header attack, Address Spoofing, and Replay attack. Therefore, detecting such threats play a key role in taking appropriate security measures. One of the major challenges in identifying the risks of Burst Header Packet flooding attacks is the lack or insufficiency of reliable historical data. In this paper, firstly, Burst Header Packet flooding attacks are classified into four categories, Misbehaving-Block, Behaving-No Block, Misbehaving-No Block and Misbehaving-Wait, using Naive Bayes and K-Nearest Neighbor algorithms. Using performance metrics obtained both after testing on the same set and after applying 10-fold cross validation, the performance of Naive Bayes and K-Nearest Neighbor algorithms is compared based on commonly used performance metrics. As the results show, compared to Naive Bayes, K-Nearest Neighbor algorithm is more suitable for predicting Burst Header Packet Flooding attacks.
Burst header packet flooding Classification algorithms Optical burst switching Performance evaluation Security threats
Primary Language | English |
---|---|
Subjects | Artificial Intelligence, Computer Software |
Journal Section | Araştırma Articlessi |
Authors | |
Publication Date | October 30, 2021 |
Published in Issue | Year 2021 Volume: 9 Issue: 4 |
All articles published by BAJECE are licensed under the Creative Commons Attribution 4.0 International License. This permits anyone to copy, redistribute, remix, transmit and adapt the work provided the original work and source is appropriately cited.