2019
DOI: 10.4018/978-1-5225-7353-1.ch005
|View full text |Cite
|
Sign up to set email alerts
|

The Usage Analysis of Machine Learning Methods for Intrusion Detection in Software-Defined Networks

Abstract: This chapter focuses on the process of the machine learning with considering the architecture of software-defined networks (SDNs) and their security mechanisms. In general, machine learning has been studied widely in traditional network problems, but recently there have been a limited number of studies in the literature that connect SDN security and machine learning approaches. The main reason of this situation is that the structure of SDN has emerged newly and become different from the traditional networks. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…SDN presents advantages of hardware independence, simplification of network control and applications with software, flexibility, dynamic network configuration, and system scalability [Akbaş et al 2016], [Özbek et al 2020]. One of the most popular SDN architectures in the world is B4 wide area network of Google [Yiltas-Kaplan 2019].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…SDN presents advantages of hardware independence, simplification of network control and applications with software, flexibility, dynamic network configuration, and system scalability [Akbaş et al 2016], [Özbek et al 2020]. One of the most popular SDN architectures in the world is B4 wide area network of Google [Yiltas-Kaplan 2019].…”
Section: Introductionmentioning
confidence: 99%
“…There are several software examples, such as Floodlight, working as the controller on the control plane. The top layer of SDN, namely the application layer, incorporates all the SDN applications and has connections to the controller via the northbound interface to provide various network requirements [Akçay and Yiltas-Kaplan 2019], [Open Networking Foundation 2014], [Yiltas-Kaplan 2019].…”
Section: Introductionmentioning
confidence: 99%