2020
DOI: 10.1007/s10586-020-03184-1
|View full text |Cite
|
Sign up to set email alerts
|

A survey and classification of the security anomaly detection mechanisms in software defined networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 45 publications
(17 citation statements)
references
References 79 publications
0
17
0
Order By: Relevance
“…During the operation of the virtual machine, the user can initiate a trusted authentication request at any time and can also require the certifier to regularly feed back the reliability measurement results. erefore, different request cycles will lead to different frequencies of credibility measurement [19]. In order to test the performance impact of the virtual machine under different trusted measurement frequencies, we run different benchmark test sets in the virtual machine and initiate periodic trusted authentication requests through users at different frequencies.…”
Section: Results Analysismentioning
confidence: 99%
“…During the operation of the virtual machine, the user can initiate a trusted authentication request at any time and can also require the certifier to regularly feed back the reliability measurement results. erefore, different request cycles will lead to different frequencies of credibility measurement [19]. In order to test the performance impact of the virtual machine under different trusted measurement frequencies, we run different benchmark test sets in the virtual machine and initiate periodic trusted authentication requests through users at different frequencies.…”
Section: Results Analysismentioning
confidence: 99%
“…The primary objective of IDS systems is to monitor traffic patterns for sudden and unexpected changes in traffic or other network traffic conditions [13].…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, it is essential to develop a modern IDS that handles security issues in an SDN framework and is suitable for large-scale networks. IDS is categorised into two types: signature-based and anomaly-based [3]. Signature-based IDSs identifies as misuse detection or knowledge-based detection.…”
Section: Introductionmentioning
confidence: 99%