2022
DOI: 10.1109/access.2022.3184722
|View full text |Cite
|
Sign up to set email alerts
|

Overhead Reduction Technique for Software-Defined Network Based Intrusion Detection Systems

Abstract: In Software-Defined Networks, the Intrusion Detection System is receiving growing attention, due to the expansion of the internet and cloud storage. This system is vital for institutions that use cloud services and have many users. Although the Intrusion Detection System offers several security features, its performance is lagging behind in large enterprise's networks. Existing approaches are based on centralised processing and use many features to implement a protection system. Therefore, system overload and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…To address the challenge of detecting intrusion in SDNs, Janabi et al [31] propose a technique to enhance the performance of IDSs within SDNs, particularly catering to the demands of large enterprise networks. Their method minimizes the overhead during IDS operations through a two-stage process: optimized feature selection and extraction.…”
Section: Discussion and Open Issuesmentioning
confidence: 99%
“…To address the challenge of detecting intrusion in SDNs, Janabi et al [31] propose a technique to enhance the performance of IDSs within SDNs, particularly catering to the demands of large enterprise networks. Their method minimizes the overhead during IDS operations through a two-stage process: optimized feature selection and extraction.…”
Section: Discussion and Open Issuesmentioning
confidence: 99%
“…When it comes to fending off stepping stone attacks, connection chain difficulties are seen as being among the most important components. The author [35] presented a model that determines the stepping stone attack by estimating the length of the connecting chain as a starting point for the calculation.…”
Section: Literature Surveymentioning
confidence: 99%
“…IDS based on cloud networks employ anomaly-based techniques to protect the cloud-based applications [1]. In network security, there are two common detection techniques for NIDS, anomaly-based detection, and signature-based detection [2]. An anomaly-based IDS analyzes the network traffic and correlates it to a created baseline for unknown or known attacks, where a signature-based IDS is allowed to be employed while the attack patterns are established and predetermined [3,4].…”
Section: Introductionmentioning
confidence: 99%