2022
DOI: 10.32604/cmc.2022.025262
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Intrusion Detection Framework in Software-Defined Networking for Cybersecurity Applications

Abstract: Network management and multimedia data mining techniques have a great interest in analyzing and improving the network traffic process. In recent times, the most complex task in Software Defined Network (SDN) is security, which is based on a centralized, programmable controller. Therefore, monitoring network traffic is significant for identifying and revealing intrusion abnormalities in the SDN environment. Consequently, this paper provides an extensive analysis and investigation of the NSL-KDD dataset using fi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 46 publications
0
1
0
Order By: Relevance
“…This step aims to eliminate zero-values or null attributes and represent the features in an appropriate format before feeding them into the machine learning (ML) classifiers being investigated. Specifically, we utilized eight distinct ML models, namely Logistic Regression (LR), Linear Discriminant Analysis (LDA), Naive Bayes (NB), k-nearest neighbor (KNN), Decision Tree (CART), Ada Boost (AB), Random Forest (RF), and Support Vector Machine (SVM) [858], [859].…”
Section: B Case Study II Category-based Analysismentioning
confidence: 99%
“…This step aims to eliminate zero-values or null attributes and represent the features in an appropriate format before feeding them into the machine learning (ML) classifiers being investigated. Specifically, we utilized eight distinct ML models, namely Logistic Regression (LR), Linear Discriminant Analysis (LDA), Naive Bayes (NB), k-nearest neighbor (KNN), Decision Tree (CART), Ada Boost (AB), Random Forest (RF), and Support Vector Machine (SVM) [858], [859].…”
Section: B Case Study II Category-based Analysismentioning
confidence: 99%
“…Recently, the security of the IoT has become perilous; therefore, different studies are related to this area [7][8][9][10][11][12][13][14][15][16][17][18][19]. Several works have been proposed for detecting intrusion using intelligent approaches like classification and detection [20][21][22][23][24][25][26][27][28][29][30].…”
Section: Related Workmentioning
confidence: 99%
“…This approach uses eight different ML models to train and test the extracted features from the APK files. These ML classifiers are Support Vector Machine (SVM), Random Forest (RF), Ada Boost (AB), Decision Tree (CART), K-Nearest Neighbor (KNN), Naive Bayes (NB), Linear Discriminant Analysis (LDA), and Logistic Regression (LR) [42][43][44]. Finally, the detection efficacy of the used ML classifiers is evaluated using different assessment tools such as precision, recall, F1-score, ROC curve, confusion matrix, and accuracy [45,46].…”
Section: The Proposed Static-based Rd Approachmentioning
confidence: 99%