2020
DOI: 10.3390/electronics9091533
|View full text |Cite
|
Sign up to set email alerts
|

DeepIDS: Deep Learning Approach for Intrusion Detection in Software Defined Networking

Abstract: Software Defined Networking (SDN) is developing as a new solution for the development and innovation of the Internet. SDN is expected to be the ideal future for the Internet, since it can provide a controllable, dynamic, and cost-effective network. The emergence of SDN provides a unique opportunity to achieve network security in a more efficient and flexible manner. However, SDN also has original structural vulnerabilities, which are the centralized controller, the control-data interface and the control-applic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 68 publications
(27 citation statements)
references
References 28 publications
0
27
0
Order By: Relevance
“…They tested the performance of the proposed model on the NSL-KDD data set with two different deep learning algorithms as anomaly detector. The authors stated that the performance of the model was acceptable according to the results obtained in experimental studies [20].…”
Section: Related Workmentioning
confidence: 96%
“…They tested the performance of the proposed model on the NSL-KDD data set with two different deep learning algorithms as anomaly detector. The authors stated that the performance of the model was acceptable according to the results obtained in experimental studies [20].…”
Section: Related Workmentioning
confidence: 96%
“…Botnet traffic is retransmitted to isolate a bot-infected device in the SDN, and connectivity with the source IP defined by the ML classifier is clogged and secluded. DeepIDS, a flow based Deep Learning based IDS in SDN model is proposed by Tang et al [188]. Using DNN and GRU-RNN they have implemented the DeepIDS in a POX controller.…”
Section: Supervised DL Based Ids In Sdnmentioning
confidence: 99%
“…Hence, more research and indepth study are needed to detect novel attack types in SDN using ML-DL-based IDS. Another point is that, most of the ML-DLbased solutions focused on the intrusion detection approach only, few have discussed about the mitigation approach along with the detection approach, such as [129], [144], [147], [188], [205], [249], but there is a clear lack of studies which discussed about the prevention mechanism along with the detection and mitigation. We think that preventing the attack and keeping the SDN-based system functional while under attack is more critical than detecting or mitigating the attack.…”
Section: Lack Of Diverse Attack Detection and Additional Focus Towards Detection Rather Than Mitigation And Prevention Approachmentioning
confidence: 99%
“…The DL model was tested with the NSL-KDD dataset, using a fully connected DNN and a gated RNN. The study stated that the DeepIDS model could provide success against flow-based attacks [17].…”
Section: Related Workmentioning
confidence: 99%