%PDF-1.5 % 1 0 obj << /S /GoTo /D (section.1) >> endobj 4 0 obj (1 Introduction) endobj 5 0 obj << /S /GoTo /D (section.2) >> endobj 8 0 obj (2 Related Work) endobj 9 0 obj << /S /GoTo /D (subsection.2.1) >> endobj 12 0 obj (2.1 Intrusion detection using DL) endobj 13 0 obj << /S /GoTo /D (subsection.2.2) >> endobj 16 0 obj (2.2 DDoS detection in SDN environment) endobj 17 0 obj << /S /GoTo /D (section.3) >> endobj 20 0 obj (3 Background Overview) endobj 21 0 obj << /S /GoTo /D (subsection.3.1) >> endobj 24 0 obj (3.1 Software-Defined Networking \(SDN\)) endobj 25 0 obj << /S /GoTo /D (subsection.3.2) >> endobj 28 0 obj (3.2 Stacked Autoencoder \(SAE\)) endobj 29 0 obj << /S /GoTo /D (section.4) >> endobj 32 0 obj (4 Implementation of DDoS Detection System) endobj 33 0 obj << /S /GoTo /D (subsection.4.1) >> endobj 36 0 obj (4.1 Traffic Collector and Flow Installer \(TCFI\)) endobj 37 0 obj << /S /GoTo /D (subsection.4.2) >> endobj 40 0 obj (4.2 Feature Extractor \(FE\) and Traffic Classifier \(TC\)) endobj 41 0 obj << /S /GoTo /D (section.5) >> endobj 44 0 obj (5 Experimental Set-up, Results, and Discussion) endobj 45 0 obj << /S /GoTo /D (subsection.5.1) >> endobj 48 0 obj (5.1 Experimental Set-up) endobj 49 0 obj << /S /GoTo /D (subsection.5.2) >> endobj 52 0 obj (5.2 Results) endobj 53 0 obj << /S /GoTo /D (subsection.5.3) >> endobj 56 0 obj (5.3 Discussion) endobj 57 0 obj << /S /GoTo /D (section.6) >> endobj 60 0 obj (6 Conclusion) endobj 61 0 obj << /S /GoTo /D [62 0 R /Fit] >> endobj 75 0 obj << /Length 4198 /Filter /FlateDecode >> stream xڥ[Y6~VQU# :qv3Iv&٤
ύpFOP8o짩%Ckح7*mgJs'^ՄRؿ7oUB0^ūTsЍbZݾaniM~?Y[-Q/54x1/a7"'VSWPj>N9mjdvi{N՛Wzf:
y7W7{;8XfC7<8m~pRrKN=q9:It3'7%VR7$+ap
@f !WT1U7*qU$\+*