2020
DOI: 10.1002/dac.4524
|View full text |Cite
|
Sign up to set email alerts
|

Security anomaly detection in software‐defined networking based on a prediction technique

Abstract: SummaryNowadays, software‐defined networking (SDN) is regarded as the best solution for the centralized handling and monitoring of large networks. However, it should be noted that SDN architecture suffers from the same security issues, which are the case with common networks. As a case in point, one of the shortcomings of SDNs is related to its high vulnerability to distributed denial of service (DDoS) attacks and other similar ones. Indeed, anomaly detection systems have been considered to deal with these att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 61 publications
0
7
0
Order By: Relevance
“…Huan et al [149] argued that the fusion of clustering undersampling and AdaBoost algorithm improved the effect of network traffic anomaly detection. Jafarian et al [139] used a novel combined approach for anomaly detection. The method used NetFlow protocol for acquiring information and generating datasets, information gain ratio for selecting the relevant attributes, and stacking ensemble for detecting anomaly in SDN networks.…”
Section: Mapping Selected Studies By Ensemble Methodsmentioning
confidence: 99%
“…Huan et al [149] argued that the fusion of clustering undersampling and AdaBoost algorithm improved the effect of network traffic anomaly detection. Jafarian et al [139] used a novel combined approach for anomaly detection. The method used NetFlow protocol for acquiring information and generating datasets, information gain ratio for selecting the relevant attributes, and stacking ensemble for detecting anomaly in SDN networks.…”
Section: Mapping Selected Studies By Ensemble Methodsmentioning
confidence: 99%
“…Although the computational complexity of the proposed method is more, it is balanced in proportion to the increase in accuracy and execution time. The network is expanding both in size and complexity (Jafarian, Masdari et al 2020). Table 6 shows the comparison of model complexity and execution time in 100 rounds and three rounds for each model.…”
Section: Pclb Deep Model Evaluationmentioning
confidence: 99%
“…Yet, these new paradigms are at the same time solution and problem from the security perspective. Like this, adopting SDN and NFVs introduce new vulnerabilities and security requirements, being the availability one of the most relevant [114,116,120,126].…”
Section: Sdnmentioning
confidence: 99%
“…A number of works tackle these new security issues related to the SDN, some of them aiming to enhance the detection techniques or following a security monitoring approach [116,120,121,123,124,[126][127][128]132]. In addition, Santos da Silva et al manifest the need of human intervention during the monitoring cycle [120].…”
Section: Sdnmentioning
confidence: 99%