Skip to main content
Top
Published in:

01-12-2023 | Original Article

An empirical study for the traffic flow rate prediction-based anomaly detection in software-defined networking: a challenging overview

Authors: Nirav M Raja, Sudhir Vegad

Published in: Social Network Analysis and Mining | Issue 1/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Currently, there is an enormous disturbance regarding privacy in information and communication technology around the scientific community. Since any assault or abnormality in the network can seriously disturb numerous realms like national security, private data storage, social welfare, economic issues, and so on. Consequently, one of the domains for detecting intrusion in the network is anomaly detection domain and it is a wide probe area. Various numerous methods and approaches have developed for anomaly detection. In the network security field, traffic anomaly detection has been a main aspect. The network security domain recognizes assaults in terms of significant deviations from the entrenched regular usage profiles. Nowadays, software-defined networking (SDN) is a new networking model has developed to ease effectual network control and management. This view investigates 50 probe papers focused on traffic flow rate prediction-based anomaly detection in SDN. Furthermore, it presents technique wise classifications like flow counting-based techniques, information theory-based approaches, entropy-based techniques, deep learning (DL)-based approaches, hybrid methods and network methods. An examination includes in an overview based on classification research techniques, toolset used, years of publication, datasets, and evaluation metrics for predicting anomaly in the SDN environment. Lastly, the limitations of surveyed techniques are explained, that encourage investigators for inventing more new techniques for predicting anomaly in SDN.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Aljawarneh S, Yassein MB (2019) An enhanced J48 classification algorithm for the anomaly intrusion detection systems”. Cluster Comput 22(5):10549–10565CrossRef Aljawarneh S, Yassein MB (2019) An enhanced J48 classification algorithm for the anomaly intrusion detection systems”. Cluster Comput 22(5):10549–10565CrossRef
go back to reference Boopathi M (2022) Henry maxnet: tversky index based feature selection and competitive swarm henry gas solubility optimization integrated deep maxout network for intrusion detection in IoT. Int J Intell Robot Appl 6(2):365–383CrossRef Boopathi M (2022) Henry maxnet: tversky index based feature selection and competitive swarm henry gas solubility optimization integrated deep maxout network for intrusion detection in IoT. Int J Intell Robot Appl 6(2):365–383CrossRef
go back to reference Carvalho LF, Abrão T, de Souza ML, Proença ML Jr (2018) An ecosystem for anomaly detection and mitigation in software-defined networking. Expert Syst Appl 104:121–133CrossRef Carvalho LF, Abrão T, de Souza ML, Proença ML Jr (2018) An ecosystem for anomaly detection and mitigation in software-defined networking. Expert Syst Appl 104:121–133CrossRef
go back to reference Carvalho LF, Fernandes G, Rodrigues JJ, Mendes LS and Proença ML. (2017) “A novel anomaly detection system to assist network management in SDN environment”. In: 2017 IEEE international conference on communications (ICC), pp 1–6, IEEE, May Carvalho LF, Fernandes G, Rodrigues JJ, Mendes LS and Proença ML. (2017) “A novel anomaly detection system to assist network management in SDN environment”. In: 2017 IEEE international conference on communications (ICC), pp 1–6, IEEE, May
go back to reference Chaudhary R, Kumar N (2019) LOADS: load optimization and anomaly detection scheme for software-defined networks. IEEE Trans Veh Technol 68(12):12329–12344CrossRef Chaudhary R, Kumar N (2019) LOADS: load optimization and anomaly detection scheme for software-defined networks. IEEE Trans Veh Technol 68(12):12329–12344CrossRef
go back to reference Chen JIZ, Smys S (2020) Social multimedia security and suspicious activity detection in SDN using hybrid deep learning technique. J Inf Technol 2(2):108–115 Chen JIZ, Smys S (2020) Social multimedia security and suspicious activity detection in SDN using hybrid deep learning technique. J Inf Technol 2(2):108–115
go back to reference Dawoud A, Shahristani S and Raun C (2019) “Unsupervised deep learning for software defined networks anomalies detection”. In: transactions on computational collective intelligence XXXIII, pp 167–178, Springer, Berlin Dawoud A, Shahristani S and Raun C (2019) “Unsupervised deep learning for software defined networks anomalies detection”. In: transactions on computational collective intelligence XXXIII, pp 167–178, Springer, Berlin
go back to reference Dey SK, Rahman MM (2019) Effects of machine learning approach in flow-based anomaly detection on software-defined networking. Symmetry 12(1):7CrossRef Dey SK, Rahman MM (2019) Effects of machine learning approach in flow-based anomaly detection on software-defined networking. Symmetry 12(1):7CrossRef
go back to reference Elsayed MS, Le-Khac NA, Jahromi HZ and Jurcut AD (2021) “A hybrid CNN-LSTM based approach for anomaly detection systems in SDNs”. The 16th International Conference on Availability, Reliability and Security Elsayed MS, Le-Khac NA, Jahromi HZ and Jurcut AD (2021) “A hybrid CNN-LSTM based approach for anomaly detection systems in SDNs”. The 16th International Conference on Availability, Reliability and Security
go back to reference El-Shamy AM, El-Fishawy NA, Attiya G, Mohamed MA (2021) Anomaly detection and bottleneck identification of the distributed application in cloud data center using software–defined networking. Egyptian Inform J 22(4):417–432CrossRef El-Shamy AM, El-Fishawy NA, Attiya G, Mohamed MA (2021) Anomaly detection and bottleneck identification of the distributed application in cloud data center using software–defined networking. Egyptian Inform J 22(4):417–432CrossRef
go back to reference Garg G, Garg R (2015) Accurate anomaly detection using adaptive monitoring and fast switching in SDN. Int J Inform Technol Comput Sci (IJITCS) 7(11):34–42 Garg G, Garg R (2015) Accurate anomaly detection using adaptive monitoring and fast switching in SDN. Int J Inform Technol Comput Sci (IJITCS) 7(11):34–42
go back to reference Garg S, Kaur K, Kumar N, Rodrigues JJ (2019) Hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in SDN: A social multimedia perspective. IEEE Trans Multimedia 21(3):566–578CrossRef Garg S, Kaur K, Kumar N, Rodrigues JJ (2019) Hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in SDN: A social multimedia perspective. IEEE Trans Multimedia 21(3):566–578CrossRef
go back to reference Garg S, Singh A, Aujla GS, Kaur S, Batra S, Kumar N (2020) A probabilistic data structures-based anomaly detection scheme for software-defined Internet of vehicles. IEEE Trans Intell Transp Syst 22(6):3557–3566CrossRef Garg S, Singh A, Aujla GS, Kaur S, Batra S, Kumar N (2020) A probabilistic data structures-based anomaly detection scheme for software-defined Internet of vehicles. IEEE Trans Intell Transp Syst 22(6):3557–3566CrossRef
go back to reference Garg G and Garg R (2016) “Security of networks using efficient adaptive flow counting for anomaly detection in SDN”. In: artificial intelligence and evolutionary computations in engineering systems, pp 667–674, Springer, New Delhi Garg G and Garg R (2016) “Security of networks using efficient adaptive flow counting for anomaly detection in SDN”. In: artificial intelligence and evolutionary computations in engineering systems, pp 667–674, Springer, New Delhi
go back to reference Giotis K, Argyropoulos C, Androulidakis G, Kalogeras D, Maglaris V (2014a) Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput Netw 62:122–136CrossRef Giotis K, Argyropoulos C, Androulidakis G, Kalogeras D, Maglaris V (2014a) Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput Netw 62:122–136CrossRef
go back to reference Giotis K, Androulidakis G, and Maglaris V (2014b) “Leveraging SDN for efficient anomaly detection and mitigation on legacy networks”, In: 2014b third European workshop on software defined networks pp 85–90, IEEE, Sept 2014b. Giotis K, Androulidakis G, and Maglaris V (2014b) “Leveraging SDN for efficient anomaly detection and mitigation on legacy networks”, In: 2014b third European workshop on software defined networks pp 85–90, IEEE, Sept 2014b.
go back to reference Ha T, Kim S, An N, Narantuya J, Jeong C, Kim J, Lim H (2016) Suspicious traffic sampling for intrusion detection in software-defined networks. Comput Netw 109:172–182CrossRef Ha T, Kim S, An N, Narantuya J, Jeong C, Kim J, Lim H (2016) Suspicious traffic sampling for intrusion detection in software-defined networks. Comput Netw 109:172–182CrossRef
go back to reference He D, Chan S, Ni X, Guizani M (2017) Software-defined-networking-enabled traffic anomaly detection and mitigation. IEEE Internet Things J 4(6):1890–1898CrossRef He D, Chan S, Ni X, Guizani M (2017) Software-defined-networking-enabled traffic anomaly detection and mitigation. IEEE Internet Things J 4(6):1890–1898CrossRef
go back to reference Hussein ZK and Dhannoon BN(2019) “Deep neural network with dropout for anomaly detection in software defined networking”. Int J Innov Technol Exploring Eng (IJITEE) ISSN 8(11):2278–3075 Hussein ZK and Dhannoon BN(2019) “Deep neural network with dropout for anomaly detection in software defined networking”. Int J Innov Technol Exploring Eng (IJITEE) ISSN 8(11):2278–3075
go back to reference Jaber AN (2020) Rehman SU “FCM–SVM based intrusion detection system for cloud computing environment.” Cluster Comput 23:3221–3231CrossRef Jaber AN (2020) Rehman SU “FCM–SVM based intrusion detection system for cloud computing environment.” Cluster Comput 23:3221–3231CrossRef
go back to reference Jafarian T, Masdari M, Ghaffari A, Majidzadeh K (2020) Security anomaly detection in software-defined networking based on a prediction technique. Int J Commun Syst 33(14):4524CrossRef Jafarian T, Masdari M, Ghaffari A, Majidzadeh K (2020) Security anomaly detection in software-defined networking based on a prediction technique. Int J Commun Syst 33(14):4524CrossRef
go back to reference Jafarian T, Masdari M, Ghaffari A, Majidzadeh K (2021) SADM-SDNC: security anomaly detection and mitigation in software-defined networking using C-support vector classification. Computing 103(4):641–673MathSciNetCrossRef Jafarian T, Masdari M, Ghaffari A, Majidzadeh K (2021) SADM-SDNC: security anomaly detection and mitigation in software-defined networking using C-support vector classification. Computing 103(4):641–673MathSciNetCrossRef
go back to reference Jung O, Smith P, Magin J and Reuter L (2019) “Anomaly detection in smart grids based on software defined networks”. In: SMARTGREENS, pp 157–164 Jung O, Smith P, Magin J and Reuter L (2019) “Anomaly detection in smart grids based on software defined networks”. In: SMARTGREENS, pp 157–164
go back to reference Karakus M, Durresi A (2017) Quality of service (QoS) in software defined networking (SDN): a survey. J Netw Comput Appl 80:200–218CrossRef Karakus M, Durresi A (2017) Quality of service (QoS) in software defined networking (SDN): a survey. J Netw Comput Appl 80:200–218CrossRef
go back to reference Karmakar KK, Varadharajan V, Tupakula U (2019) Mitigating attacks in software defined networks. Cluster Comput 22(4):1143–1157CrossRef Karmakar KK, Varadharajan V, Tupakula U (2019) Mitigating attacks in software defined networks. Cluster Comput 22(4):1143–1157CrossRef
go back to reference Kreutz D, Ramos FM and Verissimo P (2013) “Towards secure and dependable software-defined networks”. In: proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pp 55–60, Aug Kreutz D, Ramos FM and Verissimo P (2013) “Towards secure and dependable software-defined networks”. In: proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pp 55–60, Aug
go back to reference KURT Ç and Erdem OA, (2020) Real-time anomaly detection and mitigation using streaming telemetry in SDN. Turkish J Electric Eng Comput Sci 28(5):2448–2466CrossRef KURT Ç and Erdem OA, (2020) Real-time anomaly detection and mitigation using streaming telemetry in SDN. Turkish J Electric Eng Comput Sci 28(5):2448–2466CrossRef
go back to reference Kwon D, Natarajan K, Suh SC, Kim H and Kim J (2018) “An empirical study on network anomaly detection using convolutional neural networks”. In: ICDCS, pp 1595–1598, July Kwon D, Natarajan K, Suh SC, Kim H and Kim J (2018) “An empirical study on network anomaly detection using convolutional neural networks”. In: ICDCS, pp 1595–1598, July
go back to reference Lai YC, Zhou KZ, Lin, SR and Lo, NW (2019) “F1ow-based anomaly detection using multilayer perceptron in software defined networks”, In: 2019 42nd international convention on information and communication technology, electronics and microelectronics (MIPRO), pp 1154–1158, IEEE, May 2019 Lai YC, Zhou KZ, Lin, SR and Lo, NW (2019) “F1ow-based anomaly detection using multilayer perceptron in software defined networks”, In: 2019 42nd international convention on information and communication technology, electronics and microelectronics (MIPRO), pp 1154–1158, IEEE, May 2019
go back to reference Lee S, Kim J, Shin S, Porras P and Yegneswaran V (2017) “Athena: a framework for scalable anomaly detection in software-defined networks”. In: 2017 47th annual IEEE/IFIP international conference on dependable systems and networks (DSN), pp 249–260, IEEE, June Lee S, Kim J, Shin S, Porras P and Yegneswaran V (2017) “Athena: a framework for scalable anomaly detection in software-defined networks”. In: 2017 47th annual IEEE/IFIP international conference on dependable systems and networks (DSN), pp 249–260, IEEE, June
go back to reference Li Q, Liu Y, Liu Z, Zhang P, Pang C (2021) Efficient forwarding anomaly detection in software-defined networks. IEEE Trans Parallel Distrib Syst 32(11):2676–2690CrossRef Li Q, Liu Y, Liu Z, Zhang P, Pang C (2021) Efficient forwarding anomaly detection in software-defined networks. IEEE Trans Parallel Distrib Syst 32(11):2676–2690CrossRef
go back to reference Madhawa S, Balakrishnan P, Arumugam U (2018) Employing invariants for anomaly detection in software defined networking based industrial internet of things. J Intell Fuzzy Syst 35(2):1267–1279CrossRef Madhawa S, Balakrishnan P, Arumugam U (2018) Employing invariants for anomaly detection in software defined networking based industrial internet of things. J Intell Fuzzy Syst 35(2):1267–1279CrossRef
go back to reference Mehdi SA, Khalid J and Khayam SA (2011) “Revisiting traffic anomaly detection using software defined networking”. In: International workshop on recent advances in intrusion detection pp 161–180, Springer, Berlin, 2011 Mehdi SA, Khalid J and Khayam SA (2011) “Revisiting traffic anomaly detection using software defined networking”. In: International workshop on recent advances in intrusion detection pp 161–180, Springer, Berlin, 2011
go back to reference Mukkesh Ganesh, B Saleena, and B Prakash (2022) "Knowledge engineering challenges in smart healthcare data analysis system". Handbook Intell Healthcare Analyt Knowledge Eng Big Data pp 285 Mukkesh Ganesh, B Saleena, and B Prakash (2022) "Knowledge engineering challenges in smart healthcare data analysis system". Handbook Intell Healthcare Analyt Knowledge Eng Big Data pp 285
go back to reference Nazar MJ, Alhudhaif A, Qureshi KN, Iqbal S and Jeon G (2021) “Signature and flow statistics based anomaly detection system in software-defined networking for 6G internet of things network”. International J Syst Assurance Eng Manage pp1–11 Nazar MJ, Alhudhaif A, Qureshi KN, Iqbal S and Jeon G (2021) “Signature and flow statistics based anomaly detection system in software-defined networking for 6G internet of things network”. International J Syst Assurance Eng Manage pp1–11
go back to reference Novaes MP, Carvalho LF, Lloret J, Proença ML (2020) Long short-term memory and fuzzy logic for anomaly detection and mitigation in software-defined network environment. IEEE Access 8:83765–83781CrossRef Novaes MP, Carvalho LF, Lloret J, Proença ML (2020) Long short-term memory and fuzzy logic for anomaly detection and mitigation in software-defined network environment. IEEE Access 8:83765–83781CrossRef
go back to reference Peng H, Sun Z, Zhao X, Tan S, Sun Z (2018) A detection method for anomaly flow in software defined network. IEEE Access 6:27809–27817CrossRef Peng H, Sun Z, Zhao X, Tan S, Sun Z (2018) A detection method for anomaly flow in software defined network. IEEE Access 6:27809–27817CrossRef
go back to reference Phan TV, Nguyen TG, Dao NN, Huong TT, Thanh NH, Bauschert T (2020) Deep guard: efficient anomaly detection in SDN with fine-grained traffic flow monitoring. IEEE Trans Netw Serv Manage 17(3):1349–1362CrossRef Phan TV, Nguyen TG, Dao NN, Huong TT, Thanh NH, Bauschert T (2020) Deep guard: efficient anomaly detection in SDN with fine-grained traffic flow monitoring. IEEE Trans Netw Serv Manage 17(3):1349–1362CrossRef
go back to reference Poornima N, Saleena B (2020) An automated approach to retrieve lecture videos using context based semantic features and deep learning. Sādhanā 45(1):1–11CrossRef Poornima N, Saleena B (2020) An automated approach to retrieve lecture videos using context based semantic features and deep learning. Sādhanā 45(1):1–11CrossRef
go back to reference Qin Y, Wei J and Yang W (2019) “Deep learning based anomaly detection scheme in software-defined networking”. In: 2019 20th Asia-Pacific network operations and management symposium (APNOMS) pp.1–4, IEEE, Sept 2019 Qin Y, Wei J and Yang W (2019) “Deep learning based anomaly detection scheme in software-defined networking”. In: 2019 20th Asia-Pacific network operations and management symposium (APNOMS) pp.1–4, IEEE, Sept 2019
go back to reference Qin J, Zhang X and Li P (2020) “anomaly detection based on feature correlation and influence Degree in SDN”. In: 2020 international conferences on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (smartdata) and IEEE congress on cybermatics (Cybermatics) pp 186–192, IEEE, Nov Qin J, Zhang X and Li P (2020) “anomaly detection based on feature correlation and influence Degree in SDN”. In: 2020 international conferences on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (smartdata) and IEEE congress on cybermatics (Cybermatics) pp 186–192, IEEE, Nov
go back to reference Rama Krishna Meher (2021) Hybrid grasshopper optimization and bat algorithm based DBN for intrusion detection in cloud. Multimedia Res 4(4):31–38CrossRef Rama Krishna Meher (2021) Hybrid grasshopper optimization and bat algorithm based DBN for intrusion detection in cloud. Multimedia Res 4(4):31–38CrossRef
go back to reference Ribeiro ADRL, Santos RYC and Nascimento, ACA (2021) “Anomaly detection technique for intrusion detection in SDN environment using continuous data stream machine learning algorithms”. In 2021 IEEE international systems conference (SysCon), pp 1–7, IEEE, Apr Ribeiro ADRL, Santos RYC and Nascimento, ACA (2021) “Anomaly detection technique for intrusion detection in SDN environment using continuous data stream machine learning algorithms”. In 2021 IEEE international systems conference (SysCon), pp 1–7, IEEE, Apr
go back to reference Rinaldi G, Adamsky F, Soua R, Baiocchi A and Engel T (2019) “Softwarization of SCADA: lightweight statistical SDN-agents for anomaly detection”. In: 2019 10th international conference on networks of the future (NoF), pp 102–109, IEEE, Oct Rinaldi G, Adamsky F, Soua R, Baiocchi A and Engel T (2019) “Softwarization of SCADA: lightweight statistical SDN-agents for anomaly detection”. In: 2019 10th international conference on networks of the future (NoF), pp 102–109, IEEE, Oct
go back to reference Sahri NM, Okamura K (2016) Adaptive query rate for anomaly detection with SDN. IJCSNS 16(6):43 Sahri NM, Okamura K (2016) Adaptive query rate for anomaly detection with SDN. IJCSNS 16(6):43
go back to reference Said Elsayed M, Le-Khac NA, Dev S and Jurcut AD (2020) “Network anomaly detection using LSTM based autoencoder”, In: proceedings of the 16th ACM symposium on qos and security for wireless and mobile networks, pp 37–45, Nov Said Elsayed M, Le-Khac NA, Dev S and Jurcut AD (2020) “Network anomaly detection using LSTM based autoencoder”, In: proceedings of the 16th ACM symposium on qos and security for wireless and mobile networks, pp 37–45, Nov
go back to reference Sampaio LS, Faustini PH, Silva AS, Granville LZ and Schaeffer-Filho A (2018) “Using NFV and reinforcement learning for anomalies detection and mitigation in SDN”. In: 2018 IEEE symposium on computers and communications (ISCC), pp 00432–00437, IEEE, June Sampaio LS, Faustini PH, Silva AS, Granville LZ and Schaeffer-Filho A (2018) “Using NFV and reinforcement learning for anomalies detection and mitigation in SDN”. In: 2018 IEEE symposium on computers and communications (ISCC), pp 00432–00437, IEEE, June
go back to reference Satheesh N, Rathnamma MV, Rajeshkumar G, Sagar PV, Dadheech P, Dogiwal SR, Velayutham P, Sengan S (2020) Flow-based anomaly intrusion detection using machine learning model with software defined networking for openflow network. Microprocess Microsyst 79:103285CrossRef Satheesh N, Rathnamma MV, Rajeshkumar G, Sagar PV, Dadheech P, Dogiwal SR, Velayutham P, Sengan S (2020) Flow-based anomaly intrusion detection using machine learning model with software defined networking for openflow network. Microprocess Microsyst 79:103285CrossRef
go back to reference Sathya R, Saleena B (2022) A framework for designing unsupervised pothole detection by integrating feature extraction using deep recurrent neural network. Wireless Personal Commun 126(2):1241–1271CrossRef Sathya R, Saleena B (2022) A framework for designing unsupervised pothole detection by integrating feature extraction using deep recurrent neural network. Wireless Personal Commun 126(2):1241–1271CrossRef
go back to reference Shafi Q, Basit A, Qaisar S, Koay A, Welch I (2018) Fog-assisted SDN controlled framework for enduring anomaly detection in an IoT network. IEEE Access 6:73713–73723CrossRef Shafi Q, Basit A, Qaisar S, Koay A, Welch I (2018) Fog-assisted SDN controlled framework for enduring anomaly detection in an IoT network. IEEE Access 6:73713–73723CrossRef
go back to reference Shafi Q, Qaisar S, and Basit A (2019) “Software defined machine learning based anomaly detection in fog based iot network”, In: international conference on computational science and its applications, pp 611–621, Springer, Cham, July 2019 Shafi Q, Qaisar S, and Basit A (2019) “Software defined machine learning based anomaly detection in fog based iot network”, In: international conference on computational science and its applications, pp 611–621, Springer, Cham, July 2019
go back to reference Starke A, McNair J, Trevizan R, Bretas A, Peeples J and Zare A“(2018) Toward resilient smart grid communications using distributed sdn with ml-based anomaly detection”. In: international conference on wired/wireless internet communication, pp 83–94, Springer, Cham, June Starke A, McNair J, Trevizan R, Bretas A, Peeples J and Zare A“(2018) Toward resilient smart grid communications using distributed sdn with ml-based anomaly detection”. In: international conference on wired/wireless internet communication, pp 83–94, Springer, Cham, June
go back to reference Sun R, Zhang S, Yin C, Wang J (2019) Min S “strategies for data stream mining method applied in anomaly detection.” Cluster Comput 22(2):399–408CrossRef Sun R, Zhang S, Yin C, Wang J (2019) Min S “strategies for data stream mining method applied in anomaly detection.” Cluster Comput 22(2):399–408CrossRef
go back to reference Tuan A Tang, Lotfi Mhamdi, Des McLernon, Syed Ali Raza Zaidi, and Mounir Ghogho (2016) “Deep learning approach for network intrusion detection in software defined networking”. In: 2016 international conference on wireless networks and mobile communications (WINCOM), IEEE, pp 258–263 Tuan A Tang, Lotfi Mhamdi, Des McLernon, Syed Ali Raza Zaidi, and Mounir Ghogho (2016) “Deep learning approach for network intrusion detection in software defined networking”. In: 2016 international conference on wireless networks and mobile communications (WINCOM), IEEE, pp 258–263
go back to reference Tantar E, Tantar AA, Kantor M and Engel T (2018) “On using cognition for anomaly detection in SDN”, In EVOLVE-A bridge between probability, set oriented numerics, and evolutionary computation VI. Pp 67-81, Springer, Cham Tantar E, Tantar AA, Kantor M and Engel T (2018) “On using cognition for anomaly detection in SDN”, In EVOLVE-A bridge between probability, set oriented numerics, and evolutionary computation VI. Pp 67-81, Springer, Cham
go back to reference Tuan NN, Nghia ND, Hung PH, Tuyen DK, Hieu NM, Hung NT and Thanh NH (2021) “An abnormal network traffic detection scheme using local outlier factor in SDN”. In: 2020 IEEE eighth international conference on communications and electronics (ICCE) pp 141–146, IEEE, Jan Tuan NN, Nghia ND, Hung PH, Tuyen DK, Hieu NM, Hung NT and Thanh NH (2021) “An abnormal network traffic detection scheme using local outlier factor in SDN”. In: 2020 IEEE eighth international conference on communications and electronics (ICCE) pp 141–146, IEEE, Jan
go back to reference Wang J (2019) Xia L “abnormal behavior detection in videos using deep learning.” Cluster Comput 22(4):9229–9239CrossRef Wang J (2019) Xia L “abnormal behavior detection in videos using deep learning.” Cluster Comput 22(4):9229–9239CrossRef
go back to reference Wang M, Zhou H, Chen J (2018) A moving window principal components analysis based anomaly detection and mitigation approach in SDN network. KSII Trans Int Inform Sys (TIIS) 12(8):3946–3965 Wang M, Zhou H, Chen J (2018) A moving window principal components analysis based anomaly detection and mitigation approach in SDN network. KSII Trans Int Inform Sys (TIIS) 12(8):3946–3965
go back to reference Wang B, Sun Y, Xu X (2019) Loose game theory based anomaly detection scheme for SDN-based mMTC services. IEEE Access 7:139350–139357CrossRef Wang B, Sun Y, Xu X (2019) Loose game theory based anomaly detection scheme for SDN-based mMTC services. IEEE Access 7:139350–139357CrossRef
go back to reference Wang B, Sun Y, Xu X (2020) A scalable and energy-efficient anomaly detection scheme in wireless SDN-based mMTC networks for IoT. IEEE Internet Things J 8(3):1388–1405CrossRef Wang B, Sun Y, Xu X (2020) A scalable and energy-efficient anomaly detection scheme in wireless SDN-based mMTC networks for IoT. IEEE Internet Things J 8(3):1388–1405CrossRef
go back to reference Xia W, Wen Y, Foh CH, Niyato D, Xie H (2015) A survey on software-defined networking. IEEE Commun Surv Tutorials 17(1):27–51CrossRef Xia W, Wen Y, Foh CH, Niyato D, Xie H (2015) A survey on software-defined networking. IEEE Commun Surv Tutorials 17(1):27–51CrossRef
go back to reference Yin C, Zhang S, Yin Z (2019) Wang J “anomaly detection model based on data stream clustering.” Cluster Comput 22:1729–1738CrossRef Yin C, Zhang S, Yin Z (2019) Wang J “anomaly detection model based on data stream clustering.” Cluster Comput 22:1729–1738CrossRef
go back to reference You-Chiun Wang and Siang-Yu You (2018) An efficient route management framework for load balance and overhead reduction in SDN-based data center networks. IEEE Trans Net Service Manage 15(4):1422–1434CrossRef You-Chiun Wang and Siang-Yu You (2018) An efficient route management framework for load balance and overhead reduction in SDN-based data center networks. IEEE Trans Net Service Manage 15(4):1422–1434CrossRef
go back to reference Zhang P, Zhang F, Xu S, Yang Z, Li H, Li Q, Wang H, Shen C, Hu C (2020) Network-wide forwarding anomaly detection and localization in software defined networks. IEEE/ACM Trans Networking 29(1):332–345CrossRef Zhang P, Zhang F, Xu S, Yang Z, Li H, Li Q, Wang H, Shen C, Hu C (2020) Network-wide forwarding anomaly detection and localization in software defined networks. IEEE/ACM Trans Networking 29(1):332–345CrossRef
go back to reference Zhou L, Shu J and Jia X (2020)“Collaborative anomaly detection in distributed SDN”, In: GLOBECOM 2020–2020 IEEE global communications conference, pp. 1–6, IEEE Zhou L, Shu J and Jia X (2020)“Collaborative anomaly detection in distributed SDN”, In: GLOBECOM 2020–2020 IEEE global communications conference, pp. 1–6, IEEE
Metadata
Title
An empirical study for the traffic flow rate prediction-based anomaly detection in software-defined networking: a challenging overview
Authors
Nirav M Raja
Sudhir Vegad
Publication date
01-12-2023
Publisher
Springer Vienna
Published in
Social Network Analysis and Mining / Issue 1/2023
Print ISSN: 1869-5450
Electronic ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-023-01057-0

Premium Partner