2018
DOI: 10.1007/s12083-017-0630-0
|View full text |Cite
|
Sign up to set email alerts
|

Survey on SDN based network intrusion detection system using machine learning approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
198
0
3

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 375 publications
(201 citation statements)
references
References 35 publications
0
198
0
3
Order By: Relevance
“…Compared with signature based detection, anomaly detection using ML is more scalable, and more flexible. [27] All machine learning approaches follow the same general steps of identifying/building learning data sets, feature extraction and classification.Selecting the right dataset is crucial because ML models can only identify anomalies based on what it has known (trained with).The more organic, diverse and properly prepared dataset we have, the more accurate our models will be. Pre-processing steps usually involves mapping symbolic values to numeric values, data scaling, etc.…”
Section: Anomaly Detection Using Machine Learningmentioning
confidence: 99%
See 2 more Smart Citations
“…Compared with signature based detection, anomaly detection using ML is more scalable, and more flexible. [27] All machine learning approaches follow the same general steps of identifying/building learning data sets, feature extraction and classification.Selecting the right dataset is crucial because ML models can only identify anomalies based on what it has known (trained with).The more organic, diverse and properly prepared dataset we have, the more accurate our models will be. Pre-processing steps usually involves mapping symbolic values to numeric values, data scaling, etc.…”
Section: Anomaly Detection Using Machine Learningmentioning
confidence: 99%
“…A large portion of training data for ML-based SDN security applications is synthetic and is not realistic enough. Commonly used data sets include but not limiting to the University of New Brunswick ISCX 2012 Intrusion Detection, Evaluation Data Set, the CIC DOS Dataset, the KDD dataset, the ADFA-LD12 dataset, the UNSW-NB15 dataset, the WSN-DS dataset, and so on [27]. Because those datasets were developed by research institutes and made available to the public, MLbased solutions trained on those datasets alone can be outmaneuvered by adversaries who studied the same data.…”
Section: Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to improve detection accuracy and minimize the low false alarm rate, machine learning (ML) techniques are employed to develop NIDS. Due to its advance features other than machine learning, nowadays the deep learning (DL) approach has also been used extensively in the tracks of anomaly detection [12]. This paper will explore the effects of a flow-based anomaly detection system using both Machine learning and deep learning approach in software-defined networking because of the nature of flow-based traffic analysis of software-defined networking (SDN).…”
Section: Introductionmentioning
confidence: 99%
“…They protect a network from being affected by malicious data. Network intrusion detection systems (NIDS) are developed to detect malicious activities including distributed denial-of-service (DDoS) attacks, virus, worm, and anomaly patterns [12]. A common approach for intrusion detection is detecting anomalies in network traffic, however, network threats are evolving at an unprecedented rate.…”
mentioning
confidence: 99%