2021 IEEE 20th International Symposium on Network Computing and Applications (NCA) 2021
DOI: 10.1109/nca53618.2021.9685157
|View full text |Cite
|
Sign up to set email alerts
|

The Devil is in the Details: Confident & Explainable Anomaly Detector for Software-Defined Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…This is possible due to the presence of a logically centralized SDN controller that regulates and supervises the entire network of switches. The main responsibility of the SDN controller is to inject flow tables within the network switches, therefore, helping to administer network operations, control alterations, and facilitate upgradations [1]. Additionally, this integrated architecture makes other operations like data mining and anomaly detection for improved network operations and security possible [2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This is possible due to the presence of a logically centralized SDN controller that regulates and supervises the entire network of switches. The main responsibility of the SDN controller is to inject flow tables within the network switches, therefore, helping to administer network operations, control alterations, and facilitate upgradations [1]. Additionally, this integrated architecture makes other operations like data mining and anomaly detection for improved network operations and security possible [2].…”
Section: Introductionmentioning
confidence: 99%
“…Network intrusions can adversely affect all layers of the SDN architecture and can deteriorate the network's availability, authority, confidentiality, and integrity. These attacks are arduous to detect as they display similar traffic patterns to that of normal network functionality [1]. These threats have led to a rise in the generation of network intrusion detection systems (NIDS).…”
Section: Introductionmentioning
confidence: 99%
“…Szczepanski et al [34] use a feed forward artificial neural network to classify the network traffic and use surrogate decision trees to find the most likely explanations for a classified sample. Das et al [35] propose a confident and explainable anomaly detector based on random forest, multilayer perceptron, and support vector machine classifiers. The authors then interpret the predictions using the LIME method.…”
Section: Introductionmentioning
confidence: 99%
“…However, this has also increased the potential for network intrusions, which are a continuous threat to network infrastructures as they attempt to compromise the major principles of computing systems: availability, authority, confidentiality, and integrity [1]. These threats are difficult to detect unaided, as they display indistinguishable network traffic patterns as normal functionality [2]. Approaches like firewalls cannot detect these intrusions as they do not possess the ability to inspect and conduct deep packet inspection.…”
Section: Introductionmentioning
confidence: 99%