Access the full text.
Sign up today, get DeepDyve free for 14 days.
Nutan Haq, Abdur Onik, Md. Hridoy, Musharrat Rafni, F. Shah, D. Farid (2015)
Application of Machine Learning Approaches in Intrusion Detection System: A SurveyInternational Journal of Advanced Research in Artificial Intelligence, 4
M. Kruczkowski, E. Niewiadomska-Szynkiewicz, Adam Kozakiewicz (2015)
FP-tree and SVM for Malicious Web Campaign Detection
T. Kohonen (1998)
Learning vector quantization
Nadya Moussaid, A. Toumanari, Maryam Azhari (2017)
Survey of Security in Software-Defined Network
Syed Mehdi, Junaid Khalid, S. Khayam (2011)
Revisiting Traffic Anomaly Detection Using Software Defined Networking
Hung-Jen Liao, C. Lin, Y. Lin, Kuang-Yuan Tung (2013)
Intrusion detection system: A comprehensive reviewJ. Netw. Comput. Appl., 36
Kreutz (2015)
103IEEE, 1
R. Sathya, R. Thangarajan (2015)
Efficient anomaly detection and mitigation in software defined networking environment2015 2nd International Conference on Electronics and Communication Systems (ICECS)
Rodrigo Braga, E. Mota, A. Passito (2010)
Lightweight DDoS flooding attack detection using NOX/OpenFlowIEEE Local Computer Network Conference
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, I. Witten (2009)
The WEKA data mining software: an updateSIGKDD Explor., 11
J. Esch (2015)
Software-Defined Networking: A Comprehensive SurveyProc. IEEE, 103
Chirag Modi, D. Patel, Bhavesh Borisaniya, H. Patel, Avi Patel, M. Rajarajan (2013)
A survey of intrusion detection techniques in CloudJ. Netw. Comput. Appl., 36
Sergei Dotcenko, A. Vladyko, Ivan Letenko (2014)
A fuzzy logic-based information security management for software-defined networks16th International Conference on Advanced Communication Technology
T. Kohonen (1990)
The self-organizing mapNeurocomputing, 21
Kostas Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, B. Maglaris (2014)
Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environmentsComput. Networks, 62
An Le, Phuong Dinh, Hoa Le, Ngoc Tran (2015)
Flexible Network-Based Intrusion Detection and Prevention System on Software-Defined Networks2015 International Conference on Advanced Computing and Applications (ACOMP)
A. Sperotto, Gregor Schaffrath, R. Sadre, C. Morariu, A. Pras, B. Stiller (2010)
An Overview of IP Flow-Based Intrusion DetectionIEEE Communications Surveys & Tutorials, 12
OpenDaylight
Platform Available https www opendaylight orgOnline, 13
T. Kohonen (2013)
Essentials of the self-organizing mapNeural networks : the official journal of the International Neural Network Society, 37
Georg Pölzlbauer (2004)
Survey and Comparison of Quality Measures for Self-Organizing Maps
Mininet
An Instant Virtual Network on your Laptop ( or other PC ) Available http minimet orgOnline
Abstract We propose a concept of using Software Defined Network (SDN) technology and machine learning algorithms for monitoring and detection of malicious activities in the SDN data plane. The statistics and features of network traffic are generated by the native mechanisms of SDN technology. In order to conduct tests and a verification of the concept, it was necessary to obtain a set of network workload test data. We present virtual environment which enables generation of the SDN network traffic. The article examines the efficiency of selected machine learning methods: Self Organizing Maps and Learning Vector Quantization and their enhanced versions. The results are compared with other SDN-based IDS.
International Journal of Electronics and Telecommunications – de Gruyter
Published: Sep 1, 2016
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.