2022
DOI: 10.3390/s22207896
|View full text |Cite
|
Sign up to set email alerts
|

Network Threat Detection Using Machine/Deep Learning in SDN-Based Platforms: A Comprehensive Analysis of State-of-the-Art Solutions, Discussion, Challenges, and Future Research Direction

Abstract: A revolution in network technology has been ushered in by software defined networking (SDN), which makes it possible to control the network from a central location and provides an overview of the network’s security. Despite this, SDN has a single point of failure that increases the risk of potential threats. Network intrusion detection systems (NIDS) prevent intrusions into a network and preserve the network’s integrity, availability, and confidentiality. Much work has been done on NIDS but there are still imp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 145 publications
(148 reference statements)
0
13
0
Order By: Relevance
“…ML techniques have been increasingly applied to improve the accuracy and reduce false positives of anomaly‐based NIDS (Ahmed et al, 2022; Tufan et al, 2021). Researchers have leveraged various datasets and models to develop effective NIDS.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…ML techniques have been increasingly applied to improve the accuracy and reduce false positives of anomaly‐based NIDS (Ahmed et al, 2022; Tufan et al, 2021). Researchers have leveraged various datasets and models to develop effective NIDS.…”
Section: Related Workmentioning
confidence: 99%
“…Signature‐based methods rely on predefined attack signatures but may struggle to detect new threats or polymorphic attacks that adapt to evade detection. In contrast, anomaly‐based NIDSs excel at identifying unusual or unexpected behaviour, making them particularly effective against zero‐day attacks and unknown threats (Ahmed et al, 2022; Khraisat et al, 2019; Ozkan‐Okay et al, 2021). By analyzing traffic patterns and identifying anomalies, anomaly‐based NIDSs can detect previously unknown attacks that would otherwise go undetected by signature‐based systems.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…ML methods are used in intrusion detection systems, but dataset pre-processing and anomaly traffic detection are time-consuming and complex [ 58 ]. However, using DL methods [ 59 ], features may be mapped to a higher degree with more distinct feature spaces. A CNN is a deep learning approach that uses a convolution layer to automatically extract useful features from the authentic data feature plane through convolution layer.…”
Section: Literature Reviewmentioning
confidence: 99%