2022
DOI: 10.36227/techrxiv.17153213
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Intrusion Detection System in Software-Defined Networks Using Machine Learning and Deep Learning Techniques –A Comprehensive Survey

Abstract: <div>At present, the Internet is facing numerous attacks of different kinds that put its data at risk. The safety of information within the network is, therefore, a significant concern. In order to prevent the loss of incredibly valuable information, the Intrusion Detection System (IDS) was developed to recognize the outbreak of a stream of attacks and notify the network system administrator providing network security. IDS is an extrapolative model used to detect network traffic as routine or attack. Sof… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 185 publications
(266 reference statements)
0
2
0
Order By: Relevance
“…Since the traditional IDSs exhaust the OpenFlow channel by demanding extensive requests, we invented the IDS channel to transmit the IDS_inf o_request message, instead of the OpenFlow channel, in order to reduce overload in the OpenFlow channel, when installing such systems. [2]. Additionally, the OpenFlow channel transfers other data between the controller and switches, such as synchronise, hello messages, installing/amending flow entries, and P acket_in/ P acket_out messages [23].…”
Section: A Features' Extractormentioning
confidence: 99%
See 1 more Smart Citation
“…Since the traditional IDSs exhaust the OpenFlow channel by demanding extensive requests, we invented the IDS channel to transmit the IDS_inf o_request message, instead of the OpenFlow channel, in order to reduce overload in the OpenFlow channel, when installing such systems. [2]. Additionally, the OpenFlow channel transfers other data between the controller and switches, such as synchronise, hello messages, installing/amending flow entries, and P acket_in/ P acket_out messages [23].…”
Section: A Features' Extractormentioning
confidence: 99%
“…The SDN is a new technology and itself has serious security challenges that enable attackers to target various vulnerable points. Traditional IDSs are inappropriate for the SDN context [2]. Furthermore, state-of-art IDSs do not satisfy the businesses requirements.…”
Section: Introductionmentioning
confidence: 99%