2023
DOI: 10.32604/iasc.2023.026769
|View full text |Cite
|
Sign up to set email alerts
|

An Intrusion Detection System for SDN Using Machine Learning

Abstract: Software Defined Networking (SDN) has emerged as a promising and exciting option for the future growth of the internet. SDN has increased the flexibility and transparency of the managed, centralized, and controlled network. On the other hand, these advantages create a more vulnerable environment with substantial risks, culminating in network difficulties, system paralysis, online banking frauds, and robberies. These issues have a significant detrimental impact on organizations, enterprises, and even economies.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 54 publications
(18 citation statements)
references
References 20 publications
0
18
0
Order By: Relevance
“…Security of communication can be provided by using various methods including access control [53], optimization-based secure routing techniques [54], agent-based methods [55], temporal analysis [56], intrusion detection techniques developed for feature selection and classifcation, key management techniques, encryption and decryption methods, trust management techniques, frewalls, and application considerations [57][58][59][60][61][62][63][64][65]. Various authors have proposed a variety of mechanisms for providing security in IoT environments through IDS.…”
Section: Literature Surveymentioning
confidence: 99%
“…Security of communication can be provided by using various methods including access control [53], optimization-based secure routing techniques [54], agent-based methods [55], temporal analysis [56], intrusion detection techniques developed for feature selection and classifcation, key management techniques, encryption and decryption methods, trust management techniques, frewalls, and application considerations [57][58][59][60][61][62][63][64][65]. Various authors have proposed a variety of mechanisms for providing security in IoT environments through IDS.…”
Section: Literature Surveymentioning
confidence: 99%
“…D. Musleh et al [18] innovatively applied feature extraction techniques using VGG-16 and DenseNet on intrusion datasets and, through the employment of ML models such as Random Forest, K-Nearest Neighbors, and Support Vector Machine (SVM), achieved an accuracy of 92.40%. Other notable IDSs, including those developed by G. Logeswari et al [19], J. O. Mebawondu et al [20], and A. Abdelkhalek et al [21], have reported accuracies of 82.20%, 76.96%, and 83.50%, respectively. Moreover, the Secured Automatic Two-level Intrusion Detection System (SATIDS) introduced by A. R. Elsayed et al [22] showcases a remarkable accuracy of 96.56%.…”
Section: Literature Reviewmentioning
confidence: 98%
“…The model maps the data records in the database into predefined categories for forecasting. Such as in [87] and [88], where it is shown that RF is a good classification algorithm for IDS. And in [89], it is argued that SVM outperforms other classification algorithms in comparison to SVM.…”
Section: Feature Extraction and Classifiersmentioning
confidence: 99%