Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 69, 2024 - Issue 6

REFERENCES

  • Abubakar, A., & Pranggono, B. (2017, September). Machine learning based intrusion detection system for software defined networks. In 2017 Seventh International Conference on Emerging Security Technologies (EST) (pp. 138–143). IEEE.
  • Ahmad, S., & Mir, A. H. (2021). Scalability, consistency, reliability and security in SDN controllers: A survey of diverse SDN controllers. Journal of Network and Systems Management, 29(1), 1–59. https://doi.org/10.1007/s10922-020-09575-4
  • Bannour, F., Souihi, S., & Mellouk, A. (2017). Distributed SDN control: Survey, taxonomy, and challenges. IEEE Communications Surveys & Tutorials, 20(1), 333–354. https://doi.org/10.1109/COMST.2017.2782482
  • Boukraa, L., Essahraui, S., El Makkaoui, K., Ouahbi, I., & Esbai, R. (2023). Intelligent intrusion detection in software-defined networking: A comparative study of SVM and ANN models. Procedia Computer Science, 224, 26–33. https://doi.org/10.1016/j.procs.2023.09.007
  • Boukraa, L., Mahrach, S., El Makkaoui, K., & Esbai, R. (2022, March). SDN southbound protocols: A comparative study. International Conference on Networking, Intelligent Systems and Security (pp. 407–418). Springer International Publishing, Cham.
  • Cervantes, J., Garcia-Lamont, F., Rodr´ıguez-Mazahua, L., & Lopez, A. (2020). A comprehensive survey on support vector machine classification: Applications, challenges and trends. Neurocomputing, 408, 189–215. https://doi.org/10.1016/j.neucom.2019.10.118
  • Chen, W. H., Hsu, S. H., & Shen, H. P. (2005). Application of SVM and ANN for intrusion detection. Computers & Operations Research, 32(10), 2617–2634. https://doi.org/10.1016/j.cor.2004.03.019
  • Chica, J. C. C., Imbachi, J. C., & Vega, J. F. B. (2020). Security in SDN: A comprehensive survey. Journal of Network and Computer Applications, 159, 102595. https://doi.org/10.1016/j.jnca.2020.102595
  • Conti, M., Gangwal, A., & Gaur, M. S. (2017, October). A comprehensive and effective mechanism for DDoS detection in SDN. In 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (pp. 1–8). IEEE.
  • Iqbal, M., Iqbal, F., Mohsin, F., Rizwan, M., & Ahmad, F. (2019). Security issues in software defined networking (SDN): Risks, challenges and potential solutions. International Journal of Advanced Computer Science and Applications, 10(10), 298–303. https://doi.org/10.14569/IJACSA.2019.0101042
  • Jimenez, M. B., Fernandez, D., Rivadeneira, J. E., Bellido, L., & Cardenas, A. (2021). A survey of the main security issues and solutions for the SDN architecture. IEEE Access, 9, 122016–122038. https://doi.org/10.1109/ACCESS.2021.3109564
  • Khairi, M. H. H., Ariffin, S. H. S., Latiff, N. M. A. A., Yusof, K. M., Hassan, M. K., Al-Dhief, F. T., Hamdan, M., Khan, S., & Hamzah, M. (2021). Detection and classification of conflict flows in SDN using machine learning algorithms. IEEE Access, 9, 76024–76037. https://doi.org/10.1109/ACCESS.2021.3081629
  • Mahrach, S., Mjihil, O., & Haqiq, A. (2018). Scalable and dynamic network intrusion detection and prevention system. Innovations in Bio-Inspired Computing and Applications: Proceedings of the 8th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2017) held in Marrakech (pp. 318–328). Springer International Publishing, Morocco. December 11–13, 2017.
  • Maleh, Y., Qasmaoui, Y., El Gholami, K., Sadqi, Y., & Mounir, S. (2023). A comprehensive survey on SDN security: Threats, mitigations, and future directions. Journal of Reliable Intelligent Environments, 9(2), 201–239. https://doi.org/10.1007/s40860-022-00171-8
  • Malekian, A., & Chitsaz, N. (2021). Concepts, procedures, and applications of artificial neural network models in streamflow forecasting. In P. Sharma & D. Machiwal (Eds.), Advances in streamflow forecasting (pp. 115–147). Elsevier.
  • McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., & Turner, J. (2008). OpenFlow: Enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review, 38(2), 69–74. https://doi.org/10.1145/1355734.1355746
  • Moustafa, N., & Slay, J. (2015, November). UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 Military Communications and Information Systems Conference (MilCIS) (pp. 1–6). IEEE.
  • Perez-Diaz, J. A., Valdovinos, I. A., Choo, K. K. R., & Zhu, D. (2020). A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning. IEEE Access, 8, 155859–155872. https://doi.org/10.1109/ACCESS.2020.3019330
  • Polat, H., Polat, O., & Cetin, A. (2020). Detecting DDoS attacks in software-defined networks through feature selection methods and machine learning models. Sustainability, 12(3), 1035. https://doi.org/10.3390/su12031035
  • Sahoo, K. S., Tripathy, B. K., Naik, K., Ramasubbareddy, S., Balusamy, B., Khari, M., & Burgos, D. (2020). An evolutionary SVM model for DDOS attack detection in software defined networks. IEEE Access, 8, 132502–132513. https://doi.org/10.1109/ACCESS.2020.3009733
  • Santos, R., Souza, D., Santo, W., Ribeiro, A., & Moreno, E. (2020). Machine learning algorithms to detect DDoS attacks in SDN. Concurrency and Computation: Practice and Experience, 32(16), e5402. https://doi.org/10.1002/cpe.5402
  • Sultana, N., Chilamkurti, N., Peng, W., & Alhadad, R. (2019). Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Networking and Applications, 12(2), 493–501. https://doi.org/10.1007/s12083-017-0630-0
  • Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009, July). A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications (pp. 1–6). IEEE.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.