2020 IEEE Globecom Workshops (GC WKSHPS 2020
DOI: 10.1109/gcwkshps50303.2020.9367477
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Machine Learning Techniques for Security in SDN

Abstract: Software Defined Networking (SDN) has emerged as the most viable programmable network architecture to solve many challenges in legacy networks. SDN separates the network control plane from the data forwarding plane and logically centralizes the network control plane. The logically centralized control improves network management through global visibility of the network state. However, centralized control opens doors to security challenges. The SDN control platforms became the most attractive venues for Denial o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(29 citation statements)
references
References 18 publications
0
24
0
Order By: Relevance
“…For instance, the degree of freedom of the Machine Learning model was not considered in [3] to evaluate the number of adjustable parameters or weights and [51] suggested to fine-tune "hyper-parameters" in the framework doing the learning, but it is still not an optimal evaluation approach. In [52,53], various assessment methods have been suggested to test and assess Machine Learning models without mentioning the confusion matrix. Recently, Maseer et al [54] have used the CICIDS 2017 dataset to evaluate the Machine Learning model but the time complexity and confusion matrix were not considered.…”
Section: Ip Addressmentioning
confidence: 99%
See 2 more Smart Citations
“…For instance, the degree of freedom of the Machine Learning model was not considered in [3] to evaluate the number of adjustable parameters or weights and [51] suggested to fine-tune "hyper-parameters" in the framework doing the learning, but it is still not an optimal evaluation approach. In [52,53], various assessment methods have been suggested to test and assess Machine Learning models without mentioning the confusion matrix. Recently, Maseer et al [54] have used the CICIDS 2017 dataset to evaluate the Machine Learning model but the time complexity and confusion matrix were not considered.…”
Section: Ip Addressmentioning
confidence: 99%
“…Recently, Maseer et al [54] have used the CICIDS 2017 dataset to evaluate the Machine Learning model but the time complexity and confusion matrix were not considered. The discussion of the validation drawbacks presented in [3,[51][52][53][54]] is summarised in Table 3. Reference Drawbacks [3] The time complexity was not considered.…”
Section: Ip Addressmentioning
confidence: 99%
See 1 more Smart Citation
“…Ahnaf Ahmad et al [34] evaluated the application of several ML algorithms for Intrusion Detection Systems (IDS) in Software Defined Networks (SDN). SDN separates the network control and the data forwarding planes.…”
Section: B Improving Network Security and Privacymentioning
confidence: 99%
“…With changing data, some algorithms need other parameters or are not able to be executed efficiently [17], [18]. Traffic might be changed To use data preprocessing techniques such as OHE, Min-Max Scaling, and others Data quality related problems DP [47] To use a sliding window algorithm solving the problem of data imbalance [45] To train models on artificial labeled dataset and then use trained models on real world unlabeled data [34] To create a dataset with the traffic flow generator [36] To use random oversampling technique to create more data and solve the problem of the data imbalance A growing number of features that need processing HW, SW [30], [66], [67] To improve the hardware Overfitting DP [30] To remove irrelevant features or noise Potential neglection of critical features N [28] To employ the Diversity Coding-Network Coding (DC-NC) in the network that improves latency but not at the expense of reliability A for a unified interface and data formats A [35] Harmonization of interfaces Limited storage capacity A, HW [63] To move the unwanted inputs to backup storage/improve hardware The emergence of new types of input data A, DP [7], [17], [18], [35], [41], [66] Potential in using Unsupervised-and Reinforcement Learning Limited scalability of ML models DP, A, SW [35] To develop new algorithms better suited for complex systems Appearance of anomalies in the network operation DP [45], [47] Finding abnormal traffic patterns using machine learning algorithms [34], [50] Detecting attacks using data analysis algorithms A -Architecture N -Networking DP -Data Processing HW -Hardware specific SW -Software specific considering the development of heterogeneous networks, and ML algorithms might be able to handle new inputs.…”
Section: Current Challenges and Future Perspectivementioning
confidence: 99%