2019
DOI: 10.3390/sym12010007
|View full text |Cite
|
Sign up to set email alerts
|

Effects of Machine Learning Approach in Flow-Based Anomaly Detection on Software-Defined Networking

Abstract: Recent advancements in software-defined networking (SDN) make it possible to overcome the management challenges of traditional networks by logically centralizing the control plane and decoupling it from the forwarding plane. Through a symmetric and centralized controller, SDN can prevent security breaches, but it can also bring in new threats and vulnerabilities. The central controller can be a single point of failure. Hence, flow-based anomaly detection system in OpenFlow Controller can secure SDN to a great … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(26 citation statements)
references
References 37 publications
0
26
0
Order By: Relevance
“…Even though binary and multi-class classification were done in this study, the studies compared according to multi-class accuracies, since not all studies were contained both classifications. [34] MCD-KDE 91.71 Ieracitano et al [35] AE50 87 Garg et al [36] SVM 87.56 Dong et al [37] MCA-LSTM 82.15 Dey et al [38] GRU-LSTM 87.91 Li et al [39] GINI-GBDT-PSO 86.10 Wu et al [40] CNN 79.48 Le et al [41] LSTM 92 Gogoi et al [42] TUIDS 96.55 Tang et al [43] DNN 91.7 Yin et al [44] RNN 83.28 Tang et al [45] RNN 89 Proposed Technique V-IDS 97.52…”
Section: Binary Training Resultsmentioning
confidence: 99%
“…Even though binary and multi-class classification were done in this study, the studies compared according to multi-class accuracies, since not all studies were contained both classifications. [34] MCD-KDE 91.71 Ieracitano et al [35] AE50 87 Garg et al [36] SVM 87.56 Dong et al [37] MCA-LSTM 82.15 Dey et al [38] GRU-LSTM 87.91 Li et al [39] GINI-GBDT-PSO 86.10 Wu et al [40] CNN 79.48 Le et al [41] LSTM 92 Gogoi et al [42] TUIDS 96.55 Tang et al [43] DNN 91.7 Yin et al [44] RNN 83.28 Tang et al [45] RNN 89 Proposed Technique V-IDS 97.52…”
Section: Binary Training Resultsmentioning
confidence: 99%
“…Second, DL‐based attack detection was made based on gated recurrent unit‐LSTM. When the results obtained in both cases were compared, it was emphasised that DL is a better option for intrusion recognition [18].…”
Section: Related Workmentioning
confidence: 99%
“…Machine learning methods first select features, and then use classifiers to detect intrusions, such as random forest (RF) [4], decision tree (DT) [5], and support vector machine (SVM) [6]. Deep learning methods can automatically extract features and classify to realize intrusion detection, such as autoencoders [7], long short term memory (LSTM) [8], and deep neural networks (DNN) [9]. The ensemble learning method uses various ensemble and hybrid technologies for intrusion detection, including bagging [10], boosting [11], stacking [12], and combined classifier methods [13].…”
Section: Introductionmentioning
confidence: 99%