Machine Learning-Based Real-Time Detection and Mitigation of DoS Attacks in SDN-Based 5G Network
Abstract
1. Introduction
- (1)
- We introduced a closed-loop mitigation methodology that manages sFlow telemetry and OpenFlow rules through a dynamic non-permanent blocking logic. This design specifically resolves the balance between mitigation latency and control plane resource consumption, offering a scientifically validated alternative to computationally expensive deep learning approaches for resource-constrained edge environments.
- (2)
- We experimentally determined the specific sFlow-OpenFlow operational point (0.20% sampling with C5.0). As validated by our feature importance analysis, the attack signatures are physically deterministic (tcp.seq, ip.proto), proving that lightweight methodologies are more efficient than computationally expensive deep learning for this specific threat landscape.
- (3)
- We provide node-level quantitative validation, demonstrating a 78% reduction in processing load (from 445 Mbps to 95 Mbps), which proves the architectural stability required to prevent control plane saturation in distributed MEC deployments.
2. Related Works
2.1. Multi-Access Edge Computing for Video Streaming Service
2.2. 5G Network Classification
2.3. Research GAP and Motivation
3. Methodology
3.1. System Overview
| Algorithm 1: DoS Mitigation | |
| Input: Sampled datagram D (via sFlow with α = 0.20%) | |
| Output: Adaptive flow rules Rflow and updated system status S | |
| 1 | Phase I: Data Reduction |
| |
| |
| 2 | Phase II: Low-Latency Anomaly Inference |
| |
| |
| |
| |
| |
| 3 | Phase III: Dynamic Mitigation and Adaptive Blocking |
| |
| |
| 4 | Phase IV: Flow Table Resource Reclamation |
| |
| |
3.2. Intelligent Detection Process
3.2.1. C5.0
3.2.2. Bagging-CART
- For a given weak classifier and training set, we use the weak classifier to train K times.
- Each training set consists of N samples, which are randomly picked from the initial set.
- After completing each training, we get the predictive function, which is a prediction function sequence of K (p1, p2, …, pK).
- Finally, using that predictive function sequence and the principle of majority voting, we get the final prediction p*.
3.2.3. Random Forest
| Algorithm 2: Random Forest |
| Let D = {(x1, y1), …, (xn, yn)} denote the training data with xi = (xi,1, …, xi,p)T, where xi indicates the p predictors and yi represents the response. |
For j = 1 to J:1.
and 0 otherwise. |
3.3. Design Decision and Parameter Justification
- The sampling rate was set to 0.20% (1:500 ratio). The goal was to find a balance between obtaining enough data detail for detection and maintaining low computational load (overhead). This selection supports the 10 Mb/s link speed used in the experiment. We analyzed the effect of different sampling rates as follows:
- Rate 0.10% (1:1000): This rate lowers the processing load but increases the risk of missing short attack patterns or bursts, as noted in the SDN security overview by Wang and Li [13].
- Rate 0.20% (1:500): This is the selected rate. It provides stable network visibility while preventing CPU saturation on the controller.
- Rate 0.50% (1:200): This rate provides more data detail but increases the risk of overloading the control plane during high-volume floods.
- 2.
- The focus on ICMP, TCP Xmas, and UDP flood attacks is justified by their prevalence as primary volumetric threats in MEC environments. The repetitive patterns of these attacks distinguish them from legitimate video streaming traffic. By targeting these specific protocols, the framework ensures high detection accuracy while maintaining low-latency responsiveness.
- 3.
- The integration of sFlow monitoring and OpenFlow execution is operationalized through a customized logic as detailed in Algorithm 1. Unlike static security configurations, this algorithm introduces a dynamic, timer-based mitigation sequence (TimerHandling) specifically designed to resolve the balance between rapid threat suppression and service availability for legitimate users during IP spoofing events. This operational logic ensures that the system remains resource-efficient while providing reliable protection at the MEC edge. The interaction between these components, as supported by the multi-layer principles in FMDADM [38] and SDN-Defend [39], ensures a responsive defense system suitable for localized 5G infrastructures.
- 4.
- The system is designed for Micro-MEC or SOHO-level edge environments. This scope justifies the use of a localized testbed, as the proposed mitigation logic is intended to operate at the network’s periphery. As noted in recent SDN security reviews [39], decentralizing security at the edge is a vital strategy for protecting 5G infrastructures from large-scale service disruptions.
4. Simulation
5. Result
5.1. Classification Performance
5.2. Comparative Analysis
5.3. System Responsiveness Analysis
6. Discussion & Future Work
6.1. Scalability and Real-Time Feasibility
6.2. Security Analysis Against IP Spoofing and Adversarial Attacks
6.3. Generalization Capability and Applicability to IoT Environments
6.4. Future Work
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
| 5G | Fifth Generation (Mobile Network) |
| 4G | Fourth Generation (Mobile Network) |
| AS | Autonomous System |
| ARP | Address Resolution Protocol |
| B-CART | Bagging Classification and Regression Tree |
| CART | Classification and Regression Tree |
| C-RAN | Cloud Radio Access Network |
| C-SVM | C-Support Vector Machine |
| CPU | Central Processing Unit |
| DDoS | Distributed Denial of Service |
| DNN | Deep Neural Network |
| DoS | Denial of Service |
| ETSI | European Telecommunications Standards Institute |
| GBM | Generalized Boosted Regression Modeling |
| HTTP | Hypertext Transfer Protocol |
| ICMP | Internet Control Message Protocol |
| IDS | Intrusion Detection System |
| IoT | Internet of Things |
| IP | Internet Protocol |
| KNN | K-Nearest Neighbor |
| KSVM | Kernel Support Vector Machine |
| LDA | Linear Discriminant Analysis |
| LL-MEC | Low Latency Multi-access Edge Computing |
| LPDDR2 | Low Power Double Data Rate 2 |
| MEC | Multi-access Edge Computing |
| MLR | Multinomial Logistic Regression |
| ML | Machine Learning |
| NB | Naïve Bayes |
| NFV | Network Function Virtualization |
| NTP | Network Time Protocol |
| ONOS | Open Network Operating System |
| OVS | Open vSwitch |
| QoE | Quality of Experience |
| QoS | Quality of Service |
| RAN | Radio Access Network |
| RF | Random Forest |
| SDN | Software Defined Network |
| SDRAM | Synchronous Dynamic Random-Access Memory |
| sFlow | Sampled Flow |
| SYN | Synchronize (TCP flag) |
| TCP | Transmission Control Protocol |
| UDP | User Datagram Protocol |
References
- Chemodanov, D.; Esposito, F.; Calyam, P.; Sukhov, A. A Constrained Shortest Path Scheme for Virtual Network Service Management. IEEE Trans. Netw. Serv. Manag. 2018, 16, 127–142. [Google Scholar] [CrossRef]
- Santos, G.L.; Rosati, P.; Lynn, T.; Kelner, J.; Sadok, D.; Endo, P.T. Predicting Short-Term Mobile Internet Traffic from Internet Activity Using Recurrent Neural Networks. Netw. Manag. 2021, 32, e2191. [Google Scholar] [CrossRef]
- Teodorescu, C.; Durnoi, A.; Vargas, V. The Rise of the Mobile Internet: Tracing the Evolution of Portable Devices. Proc. Int. Conf. Bus. Excell. 2023, 17, 1645–1654. [Google Scholar] [CrossRef]
- Wang, L.; Che, L.; Lam, K.-Y.; Liu, W.; Li, F. Mobile Traffic Prediction with Attention-Based Hybrid Deep Learning. Phys. Commun. 2024, 66, 102420. [Google Scholar] [CrossRef]
- Zuo, Y.; Wu, Y.; Min, G.; Cui, L. Learning-Based Network Path Planning for Traffic Engineering. Future Gener. Comput. Syst. 2019, 92, 59–67. [Google Scholar] [CrossRef]
- Cisco Systems, Inc. Cisco Visual Networking Index: Forecast and Trends, 2017–2022. 2018. Available online: https://web.archive.org (accessed on 1 January 2026).
- Hong, S.; Zeng, Y. A health assessment framework of lithium-ion batteries for cyber defense. Appl. Soft Comput. 2021, 101, 107067. [Google Scholar] [CrossRef]
- Tran, T.X.; Hajisami, A.; Pandey, P.; Pompili, D. Collaborative Mobile Edge Computing in 5G Networks: New Paradigms, Scenarios, and Challenges. IEEE Commun. Mag. 2017, 55, 54–61. [Google Scholar] [CrossRef]
- Dahmen-Lhuissier, S. Multi-Access Edge Computing. Available online: https://www.etsi.org/technologies/multi-access-edge-computing (accessed on 1 January 2026).
- Huang, X.; Yu, R.; Kang, J.; He, Y.; Zhang, Y. Exploring Mobile Edge Computing for 5G-Enabled Software Defined Vehicular Networks. IEEE Wirel. Commun. 2017, 24, 55–63. [Google Scholar] [CrossRef]
- Dang, J.; Zheng, H.; Xu, X.; Wang, L.; Hu, Q.; Guo, Y. Adaptive Sparse Memory Networks for Efficient and Robust Video Object Segmentation. IEEE Trans. Neural Netw. Learn. Syst. 2025, 36, 3820–3833. [Google Scholar] [CrossRef]
- Delavari, K.; Shetabi, M.; Sadrossadat, S.A. Using Deep Reinforcement Learning Technique for Distributed Denial of Service Attack Detection in Software Defined Networks. In Proceedings of the First International Conference on Machine Learning and Knowledge Discovery (MLKD 2024), Tehran, Iran, 18–19 December 2024. [Google Scholar]
- Wang, H.; Li, Y. Overview of DDoS Attack Detection in Software-Defined Networks. IEEE Access 2024, 12, 337539–337560. [Google Scholar] [CrossRef]
- Fan, M.; Lan, J.; Zhou, Y.; Pan, M.; Li, J.; Zhang, D. DDoS Attack Detection in SDN-Assisted Federated Learning Environment Based on Contrastive Learning. IEEE Access 2025, 13, 108798–108814. [Google Scholar] [CrossRef]
- Mateus, J.; Zodi, G.-A.L.; Bagula, A. Federated Learning-Based Solution for DDoS Detection in SDN. In Proceedings of the 2024 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 19–22 February 2024. [Google Scholar]
- Cuesta, E.P.E.; Quintero, J.C.M.; Palma, J.D.A. DDoS Attacks Detection in SDN Through Network Traffic Feature Selection and Machine Learning Models. Telecom 2025, 6, 69. [Google Scholar] [CrossRef]
- Ma, L.V.; Nguyen, V.Q.; Park, J.; Kim, J. NFV-Based Mobile Edge Computing for Lowering Latency of 4K Video Streaming. In Proceedings of the 10th International Conference on Ubiquitous and Future Networks (ICUFN), Prague, Czech Republic, 3–6 July 2018; pp. 1–4. [Google Scholar] [CrossRef]
- Mehrabi, A.; Siekkinen, M.; Ylä-Jääski, A. QoE-Traffic Optimization through Collaborative Edge Caching in Adaptive Mobile Video Streaming. IEEE Access 2018, 6, 52261–52276. [Google Scholar] [CrossRef]
- Nightingale, J.; Salva-Garcia, P.; Calero, J.M.A.; Wang, Q. 5G-QoE: QoE Modelling for Ultra-HD Video Streaming in 5G Networks. IEEE Trans. Broadcast. 2018, 64, 621–634. [Google Scholar] [CrossRef]
- Yang, S.-R.; Tseng, Y.-J.; Huang, C.-C.; Lin, W.-C. Multi-Access Edge Computing Enhanced Video Streaming: Proof-of-Concept Implementation and Prediction/QoE Models. IEEE Trans. Veh. Technol. 2019, 68, 1888–1902. [Google Scholar] [CrossRef]
- Park, J.-S.; Yoon, S.-H.; Kim, M.-S. Performance Improvement of the Payload Signature-Based Traffic Classification System Using Application Traffic Locality. J. Korea Inst. Inf. Commun. Eng. 2013, 38B, 519–525. [Google Scholar]
- Yan, J.; Yuan, J. A Survey of Traffic Classification in Software Defined Networks. In Proceedings of the IEEE International Conference on Hot Information-Centric Networking (HotICN), Shenzhen, China, 15–17 August 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Le, L.-V.; Lin, B.-S.P.; Tung, L.-P.; Sinh, D. SDN/NFV, Machine Learning, and Big Data Driven Network Slicing for 5G. In Proceedings of the IEEE 5G World Forum (5GWF), Santa Clara, CA, USA, 9–11 July 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Pak, W. Fast Packet Classification for V2X Services in 5G Networks. J. Commun. Netw. 2017, 19, 218–226. [Google Scholar] [CrossRef]
- Hameed, S.; Khan, H.A. SDN-Based Collaborative Scheme for Mitigation of DoS Attacks. Future Internet 2018, 10, 23. [Google Scholar] [CrossRef]
- Li, C.; Wu, Y.; Yuan, X.; Sun, Z.; Wang, W.; Li, X.; Gong, L. Detection and Defense of DoS Attack Based on Deep Learning in OpenFlow-Based SDN. Int. J. Commun. Syst. 2018, 31, e3497. [Google Scholar] [CrossRef]
- Li, J.; Zhao, Z.; Li, R. Machine Learning-Based IDS for Software-Defined 5G Network. IET Netw. 2018, 7, 53–60. [Google Scholar] [CrossRef]
- Doshi, R.; Apthorpe, N.; Feamster, N. Machine Learning DoS Detection for Consumer Internet of Things Devices. In Proceedings of the IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 24 May 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Wang, K.; Fu, Y.; Duan, X.; Liu, T. Detection and mitigation of DDoS attacks based on multi-dimensional characteristics in SDN. Sci. Rep. 2024, 14, 16421. [Google Scholar] [CrossRef]
- Huang, A.; Nikaein, N. Demo: LL-MEC—A SDN-Based MEC Platform. In Proceedings of the ACM MobiCom, Snowbird, UT, USA, 16–20 October 2017; pp. 1–2. [Google Scholar] [CrossRef]
- sFlow. OpenFlow and sFlow. Available online: https://sflow.org (accessed on 1 January 2026).
- Reetz, E.S.; Knappmeyer, M.; Kiani, S.L.; Baker, N.; Tonjes, R. A Method for Classification of Network Traffic Based on C5.0 Machine Learning Algorithm. In Proceedings of the International Conference on Computing, Networking and Communica-tions (ICNC), Maui, HI, USA, 30 January–2 February 2012; pp. 1–5. [Google Scholar] [CrossRef]
- Jansson, J. Decision Tree Classification of Products Using C5.0 and Prediction of Workload Using Time Series Analysis. Master’s Thesis, KTH Royal Institute of Technology, Stockholm, Sweden, 2016. [Google Scholar]
- Yang, R.; Zuo, A. Identifying the Credit Level of a Company with Bagging-CART Integrated Algorithm. In Proceedings of the International Symposium on Computational Intelligence and Design, Hangzhou, China, 13–14 December 2014; pp. 1–4. [Google Scholar] [CrossRef]
- Ma, J.; Qiao, Y.; Hu, G.; Huang, Y.; Sangaiah, A.K.; Zhang, C.; Wang, Y.; Zhang, R. De-Anonymizing Social Networks with Random Forest Classifier. IEEE Access 2018, 6, 10139–10150. [Google Scholar] [CrossRef]
- Cutler, A.; Cutler, D.R.; Stevens, J.R. Random Forests. In Ensemble Machine Learning; Springer: Boston, MA, USA, 2012; pp. 157–175. [Google Scholar] [CrossRef]
- Ujjan, R.M.A.; Pervez, Z.; Dahal, K.; Bashir, A.; Mumtaz, R.; González, J. Towards sFlow and Adaptive Polling Sampling for Deep Learning Based DDoS Detection in SDN. Future Gener. Comput. Syst. 2020, 111, 763–779. [Google Scholar] [CrossRef]
- Khedr, A.S.; Gouda, A.E.; Mohamed, E.R. FMDADM: A Multi-Layer DDoS Attack Detection and Mitigation Framework Using Machine Learning for Stateful SDN-Based IoT Networks. IEEE Access 2023, 11, 5554–5570. [Google Scholar] [CrossRef]
- Wang, J.; Wang, L. SDN-Defend: A Lightweight Online Attack Detection and Mitigation System for DoS Attacks in SDN. Sensors 2022, 22, 8287. [Google Scholar] [CrossRef] [PubMed]
- sFlow. Sampling Rates. Available online: https://blog.sflow.com/2009/06/sampling-rates.html (accessed on 1 January 2026).
- Phaal, P.; Panchen, S.; McKee, N. InMon Corporation’s sFlow: A Method for Monitoring Traffic in Switched and Routed Networks; Internet Engineering Task Force: Fremont, CA, USA, 2001. [Google Scholar]
- eSecurity Planet. Types of DDoS Attacks. Available online: https://www.esecurityplanet.com/network-security/types-of-ddos-attacks.html (accessed on 1 January 2026).
- Allaire, J.J.; Chollet, F. Keras: R Interface to “Keras”. 2018. Available online: https://CRAN.R-project.org/package=keras (accessed on 1 January 2026).
- Venables, W.N.; Ripley, B.D. Modern Applied Statistics with S, 4th ed.; Springer: New York, NY, USA, 2002. [Google Scholar]
- Greenwell, B.; Boehmke, B.; Cunningham, J.; Developers, G.B.M. gbm: Generalized Boosted Regression Models. 2019. Available online: https://CRAN.R-project.org/package=gbm (accessed on 1 January 2026).
- Meyer, D.; Dimitriadou, E.; Hornik, K.; Weingessel, A.; Leisch, F. e1071: Misc Functions of the Department of Statistics. 2019. Available online: https://CRAN.R-project.org/package=e1071 (accessed on 1 January 2026).
- Karatzoglou, A.; Smola, A.; Hornik, K.; Zeileis, A. kernlab—An S4 Package for Kernel Methods in R. J. Stat. Softw. 2004, 11, 1–20. [Google Scholar] [CrossRef]
- Peters, A.; Hothorn, T. ipred: Improved Predictors. 2018. Available online: https://CRAN.R-project.org/package=ipred (accessed on 1 January 2026).
- Liaw, A.; Wiener, M. Classification and Regression by randomForest. R News 2002, 2, 18–22. [Google Scholar]
- Yan, Q.; Gong, Q.; Yu, F.R. Effective Software-Defined Networking Controller Scheduling Method to Mitigate DoS Attacks. Electron. Lett. 2017, 53, 469–471. [Google Scholar] [CrossRef]
- Septian, K.A.; Istikmal; Ginting, I. Analysis of ONOS Clustering Performance on Software Defined Network. In Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS), Bandung, Indonesia, 23–24 November 2021; pp. 1–6. [Google Scholar]
- Tello, A.M.D.; Abolhasan, M. SDN Controllers Scalability and Performance Study. In Proceedings of the International Con-ference on Signal Processing and Communication Systems (ICSPCS), Gold Coast, Australia, 16–18 December 2019; pp. 1–7. [Google Scholar] [CrossRef]
- Afek, Y.; Bremler-Barr, A.; Shafir, L. Network Anti-Spoofing with SDN Data Plane. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Atlanta, GA, USA, 1–4 May 2017; pp. 1–9. [Google Scholar] [CrossRef]
- Aiken, J.; Scott-Hayward, S. Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs. In Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Dal-las, TX, USA, 12–14 November 2019; pp. 1–7. [Google Scholar]
- Antonakakis, M.; April, T.; Bailey, M.; Bernhard, M.; Bursztein, E.; Cochran, J.; Durumeric, Z.; Halderman, J.A.; Invernizzi, L.; Kallitsis, M. Understanding the Mirai Botnet. In Proceedings of the USENIX Security Symposium, Vancouver, BC, Canada, 16–18 August 2017; pp. 1093–1110. [Google Scholar]
- Brauckhoff, D.; Tellenbach, B.; Wagner, A.; May, M.; Lakhina, A. Impact of Packet Sampling on Anomaly Detection Metrics. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC), Rio de Janeiro, Brazil, 25–27 October 2006; pp. 159–164. [Google Scholar] [CrossRef]
- Kuhn, M.; Quinlan, R. C50: C5.0 Decision Trees and Rule-Based Models. 2018. Available online: https://CRAN.R-project.org/package=C50 (accessed on 1 January 2026).









| Aspect | Methodology | Limitations | |
|---|---|---|---|
| Research | |||
| [25] |
| Limited scalability and assumes full SDN deployment. | |
| [28] |
| Small dataset and lacks real-world validation. | |
| [26] |
| Focuses on flow statistics; tested only in SDN setups. | |
| [27] |
| Rely on outdated datasets and have scalability issues. | |
| [16] |
| Focuses on detection accuracy metrics and feature ranking. Does not provide an automatic mitigation mechanism | |
| [29] |
| Rely on deep learning (CNN) models with high computational complexity. | |
| Our method |
| Scalability may be a concern due to resource consumption. | |
| Symbol | Description |
|---|---|
| D | Sampled traffic datagrams collected via the sFlow agent. |
| α | sFlow telemetry sampling rate (set to 0.20%). |
| x | Physical traffic feature vector {IPI, L}. |
| IPI | Inter-Packet Interval (a key feature for packet flooding detection). |
| L | Frame length or packet size. |
| F(.) | Classification model based on Decision Tree |
| S | System security status {Normal, Under_Attack, Recovered}. |
| Tlimit | Duration of non-permanent blocking (blocking timer). |
| IPsrc | Source IP address identified as the origin of the attack. |
| IPdst | Destination IP address. |
| Portsrc | Source port number. |
| Portdst | Destination port number. |
| Proto | Network protocol type (TCP, UDP, or ICMP). |
| Rflow | Flow rules are sent to the switch via OpenFlow. |
| Classification | Raw Dataset | Selected Dataset |
|---|---|---|
| Normal | 139,286 | 4000 |
| icmp_echo_attack | 411,447 | 4000 |
| tcp_xmas_attack | 605,626 | 4000 |
| udp_attack | 392,285 | 4000 |
| total | 1,548,644 | 16,000 |
| Model | R Package | Hyper-Parameters |
|---|---|---|
| Deep Neural Network (DNN) | Keras 2.2.0 [43] |
|
| Single-hidden-layer Neural Network | nnet [44] |
|
| Multinomial Logistic Regression (MLR) | nnet [44] | Default |
| Generalized Boosted Regression Modeling (GBM) | gbm [45] | Default |
| Linear Discriminant Analysis (LDA) | MASS [44] | Default |
| Support Vector Machine (C-SVM) | e1071 [46] | type = “C-classification” |
| Naïve Bayes (NB) | e1071 [46] | Default |
| Kernel Support Vector Machine (KSVM) | kernlab [47] |
|
| C 5.0 | C50 [3] | Default |
| Bagging CART (B-CART) | ipred [48] | Default |
| Random Forest (RF) | randomForest [49] | Default |
| Method | Fold 1 | Fold 2 | Fold 3 | Fold 4 | Fold 5 | Fold 6 | Fold 7 | Fold 8 | Fold 9 | Fold 10 | Average |
|---|---|---|---|---|---|---|---|---|---|---|---|
| DNN | 0.995 | 1 | 1 | 0.992 | 0.992 | 0.98 | 0.992 | 1 | 0.995 | 0.992 | 0.994 |
| nnet | 0.998 | 1 | 1 | 1 | 0.995 | 1 | 1 | 1 | 1 | 1 | 0.999 |
| MLR | 0.998 | 1 | 1 | 1 | 0.995 | 0.998 | 0.998 | 1 | 1 | 0.998 | 0.998 |
| GBM | 0.998 | 0.995 | 0.998 | 0.995 | 0.995 | 0.988 | 0.99 | 0.995 | 0.99 | 0.998 | 0.994 |
| LDA | 0.978 | 0.998 | 0.998 | 0.99 | 0.988 | 0.975 | 0.992 | 0.982 | 0.988 | 0.988 | 0.988 |
| C-SVM | 0.998 | 1 | 0.998 | 0.995 | 0.995 | 0.98 | 1 | 0.995 | 1 | 0.995 | 0.996 |
| NB | 0.852 | 0.865 | 0.862 | 0.888 | 0.868 | 0.858 | 0.855 | 0.838 | 0.852 | 0.87 | 0.861 |
| KSVM | 0.86 | 0.818 | 0.81 | 0.81 | 0.818 | 0.852 | 0.87 | 0.832 | 0.835 | 0.822 | 0.834 |
| KNN | 0.998 | 1 | 1 | 1 | 0.995 | 0.998 | 1 | 1 | 1 | 0.995 | 0.998 |
| C50 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 |
| B-CART | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 |
| RF | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 |
| Actual Class/Predicted Class | Normal | ICMP Attack | TCP Attack | UDP Attack |
|---|---|---|---|---|
| Normal | 4000 | 0 | 0 | 0 |
| ICMP attack | 0 | 4000 | 0 | 0 |
| TCP attack | 0 | 0 | 4000 | |
| UDP attack | 0 | 0 | 0 | 4000 |
| Method | Training Time (s) | Testing Time (s) | Total Time (s) |
|---|---|---|---|
| DNN | 30.63 | 0.134 | 30.764 |
| nnet | 0.632 | 0 | 0.632 |
| MLR | 0.345 | 0 | 0.345 |
| GBM | 0.74 | 0.002 | 0.742 |
| LDA | 0.033 | 0 | 0.033 |
| C-SVM | 0.143 | 0.003 | 0.146 |
| NB | 0.009 | 0.12 | 0.129 |
| KSVM | 0.598 | 0.032 | 0.63 |
| KNN | 0 | 0.033 | 0.033 |
| C50 | 0.303 | 0.034 | 0.337 |
| B-CART | 0.356 | 0.013 | 0.369 |
| RF | 1.338 | 0.005 | 1.343 |
| Baseline | Model | Dataset | Accuracy (%) | F1-Score (%) | Time (s) |
|---|---|---|---|---|---|
| [26] | 3LSTM | Custom-generated dataset | 99.79 | 99 | N/A |
| [25] | C-to-C Protocol | SDN-based Scenario | 98.20 | N/A | 0.045 |
| [27] | RF & AdaBoost | CICIDS2017 (Public) | 92.62 | 92.25 | 0.450 |
| [28] | ML Classification | IoT Traffic (Public) | 99.00 | N/A | N/A |
| [16] | XGBoost | CICFlowMeter/Generated (Mininet) | 99.48 | 99.4 | N/A |
| [29] | MDDCC | Private/Generated (Mininet) | 99.00 | 99.00 | N/A |
| Ours | C5.0, B-CART, RF | Generated dataset (5G-MEC sFlow) | 100.00 | 100.00 | 0.012 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Fatiyah, A.C.; Abbas, A.; Setiasabda, P.E.; Hsieh, W.-B.; Leu, J.-S.; Chen, S.-J. Machine Learning-Based Real-Time Detection and Mitigation of DoS Attacks in SDN-Based 5G Network. Electronics 2026, 15, 1005. https://doi.org/10.3390/electronics15051005
Fatiyah AC, Abbas A, Setiasabda PE, Hsieh W-B, Leu J-S, Chen S-J. Machine Learning-Based Real-Time Detection and Mitigation of DoS Attacks in SDN-Based 5G Network. Electronics. 2026; 15(5):1005. https://doi.org/10.3390/electronics15051005
Chicago/Turabian StyleFatiyah, Adila Chusnul, Adhyatma Abbas, Paul Elijah Setiasabda, Wen-Bin Hsieh, Jenq-Shiou Leu, and Shiang-Jiun Chen. 2026. "Machine Learning-Based Real-Time Detection and Mitigation of DoS Attacks in SDN-Based 5G Network" Electronics 15, no. 5: 1005. https://doi.org/10.3390/electronics15051005
APA StyleFatiyah, A. C., Abbas, A., Setiasabda, P. E., Hsieh, W.-B., Leu, J.-S., & Chen, S.-J. (2026). Machine Learning-Based Real-Time Detection and Mitigation of DoS Attacks in SDN-Based 5G Network. Electronics, 15(5), 1005. https://doi.org/10.3390/electronics15051005

