{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:12:25Z","timestamp":1742911945323,"version":"3.40.3"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030639402"},{"type":"electronic","value":"9783030639419"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63941-9_14","type":"book-chapter","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T21:04:13Z","timestamp":1611867853000},"page":"190-203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on SDN Enabled by Machine Learning: An Overview"],"prefix":"10.1007","author":[{"given":"Pu","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Wentao","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,29]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Abubakar, A., Pranggono, B.: Machine learning based intrusion detection system for software defined networks. In: Proceedings of the 7th International Conference on Emerging Security Technologies, pp. 138\u2013143 (2017)","DOI":"10.1109\/EST.2017.8090413"},{"issue":"9","key":"14_CR2","doi-asserted-by":"publisher","first-page":"D19","DOI":"10.1364\/JOCN.9.000D19","volume":"9","author":"R Alvizu","year":"2017","unstructured":"Alvizu, R., Troia, S., Maier, G., Pattavina, A.: Matheuristic with machine learning based prediction for software defined mobile metro core networks. IEEE\/OSA J. Opt. Commun. Network. 9(9), D19\u2013D30 (2017)","journal-title":"IEEE\/OSA J. Opt. Commun. Network."},{"issue":"6","key":"14_CR3","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2017.2743240","volume":"34","author":"K Arulkumaran","year":"2017","unstructured":"Arulkumaran, K., Deisenroth, M.P., Brundage, M., Bharath, A.A.: Deep reinforcement learning: a brief survey. IEEE Signal Process. Mag. 34(6), 26\u201338 (2017)","journal-title":"IEEE Signal Process. Mag."},{"key":"14_CR4","doi-asserted-by":"publisher","unstructured":"Ashifuddin Mondal, M., Rehena, Z.: Intelligent traffic congestion classification system using artificial neural network. In: Companion Proceedings of The 2019 World Wide Web Conference, WWW 2019, pp. 110\u2013116. , Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3308560.3317053","DOI":"10.1145\/3308560.3317053"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Barki, L., Shidling, A., Meti, N., Narayan, D.G., Mulla, M.M.: Detection of distributed denial of service attacks in software defined networks. In: Proceedings of the IEEE International Conference on Advances in Computing, Communications and Informatics, pp. 2576\u20132581 (2017)","DOI":"10.1109\/ICACCI.2016.7732445"},{"key":"14_CR6","unstructured":"Bendriss, J., Yahia, I.G.B., Chemouil, P., Zeghlache, D.: AI for SLA management in programmable networks. In: Proceedings of the 13th International Conference on Design of Reliable Communication Networks, pp. 1\u20138 (2017)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Bendriss, J., Yahia, I.G.B., Zeghlache, D.: Forecasting and anticipating SLO breaches in programmable networks. In: Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, pp. 127\u2013134 (2017)","DOI":"10.1109\/ICIN.2017.7899402"},{"issue":"6","key":"14_CR8","doi-asserted-by":"publisher","first-page":"1994","DOI":"10.1109\/JIOT.2017.2746186","volume":"4","author":"S Bera","year":"2017","unstructured":"Bera, S., Misra, S., Vasilakos, A.V.: Software-defined networking for internet of things: a survey. IEEE Internet Things J. 4(6), 1994\u20132008 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"14_CR9","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/1129582.1129589","volume":"36","author":"L Bernaille","year":"2006","unstructured":"Bernaille, L., Teixeira, R., Akodkenou, I., Soule, A., Salamatian, K.: Traffic classification on the fly. SIGCOMM Comput. Commun. Rev. 36(2), 23\u201326 (2006). https:\/\/doi.org\/10.1145\/1129582.1129589","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Boero, L., Marchese, M., Zappatore, S.: Support vector machine meets software defined networking in IDS domain. In: Proceedings of the 29th IEEE International Teletraffic Congress, pp. 25\u201330 (2017)","DOI":"10.23919\/ITC.2017.8065806"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Budhraja, K.K., Malvankar, A., Bahrami, M., Kundu, C., Kundu, A., Singhal, M.: Risk-based packet routing for privacy and compliance-preserving SDN. In: Proceedings of the 10th IEEE International Conference on Cloud Computing, pp. 761\u2013765 (2017)","DOI":"10.1109\/CLOUD.2017.109"},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1155\/2018\/7928503","volume":"2018","author":"Z Cai","year":"2018","unstructured":"Cai, Z., Zhang, H., Liu, Q., Xiao, Q., Cheang, C.F.: A survey on security-aware network measurement in SDN. Security and Communication Networks 2018, 14 (2018). Article ID 2459154","journal-title":"Security and Communication Networks"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Carner, J., Mestres, A., Alarcon, E., Cabellos, A.: Machine learning-based network modeling: an artificial neural network model vs a theoretical inspired model. In: Proceedings of the 9th International Conference on Ubiquitous and Future Networks, pp. 2576\u20132581 (2017)","DOI":"10.1109\/ICUFN.2017.7993839"},{"key":"14_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2015.11.008","volume":"58","author":"XF Chen","year":"2016","unstructured":"Chen, X.F., Yu, S.Z.: CIPA: a collaborative intrusion prevention architecture for programmable network and SDN. Comput. Secur. 58, 1\u201319 (2016)","journal-title":"Comput. Secur."},{"issue":"1","key":"14_CR15","doi-asserted-by":"publisher","first-page":"25","DOI":"10.14257\/ijgdc.2016.9.1.03","volume":"9","author":"C Chen-Xiao","year":"2016","unstructured":"Chen-Xiao, C., Ya-Bin, X.: Research on load balance method in SDN. Int. J. Grid Distrib. Comput. 9(1), 25\u201336 (2016)","journal-title":"Int. J. Grid Distrib. Comput."},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Fan, X., Guo, Z.: A semi-supervised text classification method based on incremental EM algorithm. In: Proceedings of the WASE International Conference on Information Engineering, pp. 211\u2013214 (2010)","DOI":"10.1109\/ICIE.2010.146"},{"key":"14_CR17","unstructured":"Gabriel, M.I., Valeriu, V.P.: Achieving DDoS resiliency in a software defined network by intelligent risk assessment based on neural networks and danger theory. In: Proceedings of the 15th IEEE International Symposium on Computational Intelligence and Informatics, pp. 319\u2013324 (2014)"},{"issue":"5","key":"14_CR18","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/1096536.1096541","volume":"35","author":"A Greenberg","year":"2005","unstructured":"Greenberg, A., et al.: A clean slate 4D approach to network control and management. ACM SIGCOMM Comput. Commun. Rev. 35(5), 41\u201354 (2005)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"2","key":"14_CR19","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/1384609.1384625","volume":"38","author":"N Gude","year":"2008","unstructured":"Gude, N., et al.: NOX: towards an operating system for networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 105\u2013110 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"He, M., Kalmbach, P., Blenk, A., Kellerer, W., Schmid, S.: Algorithm-data driven optimization of adaptive communication networks. In: Proceedings of the 25th IEEE International Conference on Network Protocols (ICNP), pp. 1\u20136 (2017)","DOI":"10.1109\/ICNP.2017.8117592"},{"key":"14_CR21","unstructured":"Heorhiadi, V., Reiter, M.K., Sekar, V.: Simplifying software-defined network optimization using SOL. In: Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2016), pp. 223\u2013237 (2016)"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Jain, R.: Ten problems with current internet architecture and solutions for the next generation. In: Proceedings of the IEEE MILCOM 2006, pp. 1\u20139 (2006)","DOI":"10.1109\/MILCOM.2006.301995"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Kokila, R.T., Selvi, S.T., Govindarajan, K.: DDoS detection and analysis in SDN-based environment using support vector machine classifier. In: Proceedings of the 66h IEEE International Conference on Advanced Computing, pp. 205\u2013210 (2014)","DOI":"10.1109\/ICoAC.2014.7229711"},{"issue":"1","key":"14_CR24","doi-asserted-by":"publisher","first-page":"11","DOI":"10.26555\/ijain.v4i1.138","volume":"4","author":"M Latah","year":"2018","unstructured":"Latah, M., Toker, M.: A novel intelligent approach for detecting dos flooding attacks in software defined networks. Int. J. Adv. Intell. Inf. 4(1), 11\u201320 (2018)","journal-title":"Int. J. Adv. Intell. Inf."},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Latah, M., Toker, L.: Artificial intelligence enabled software defined networking: a comprehensive overview (2018)","DOI":"10.1049\/iet-net.2018.5082"},{"issue":"2","key":"14_CR26","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1109\/MCOM.2015.7045408","volume":"53","author":"P Lin","year":"2015","unstructured":"Lin, P., Bi, J., Wolff, S., et al.: A west-east bridge based SDN inter-domain testbed. IEEE Commun. Mag. 53(2), 190\u2013197 (2015)","journal-title":"IEEE Commun. Mag."},{"key":"14_CR27","doi-asserted-by":"publisher","first-page":"12103","DOI":"10.1109\/ACCESS.2018.2805680","volume":"6","author":"Q Liu","year":"2018","unstructured":"Liu, Q., Li, P., Zhao, W., Cai, W., Yu, S., Leung, V.C.M.: A survey on security threats and defensive techniques of machine learning: a data driven view. IEEE Access 6, 12103\u201312117 (2018)","journal-title":"IEEE Access"},{"key":"14_CR28","doi-asserted-by":"publisher","unstructured":"Lyu, Q., Lu, X.: Effective media traffic classification using deep learning. In: Proceedings of the 2019 3rd International Conference on Compute and Data Analysis, ICCDA 2019, pp. 139\u2013146. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3314545.3316278","DOI":"10.1145\/3314545.3316278"},{"key":"14_CR29","doi-asserted-by":"publisher","unstructured":"Madanapalli, S.C., Gharakheili, H.H., Sivaraman, V.: Assisting delay and bandwidth sensitive applications in a self-driving network. In: Proceedings of the 2019 Workshop on Network Meets AI & ML, NetAI 2019, pp. 64\u201369. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3341216.3342215","DOI":"10.1145\/3341216.3342215"},{"issue":"3","key":"14_CR30","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/3138808.3138810","volume":"47","author":"A Mestres","year":"2017","unstructured":"Mestres, A., et al.: Knowledge-defined networking. ACM SIGCOMM Comput. Commun. Rev. 47(3), 2\u201310 (2017)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Mogul, J.C., Congdon, P.: Hey, you darned counters!: Get off my ASIC! In: Proceedings of the ACM SIGCOMM Workshop on HotSDN, pp. 25\u201330 (2012)","DOI":"10.1145\/2342441.2342447"},{"issue":"7","key":"14_CR32","doi-asserted-by":"publisher","first-page":"1536","DOI":"10.1587\/transcom.2017CQI0002","volume":"E101.B","author":"A Nakao","year":"2018","unstructured":"Nakao, A., Du, P.: Toward in-network deep machine learning for identifying mobile applications and enabling application specific network slicing. IEICE Trans. Commun. E101.B(7), 1536\u20131543 (2018). https:\/\/doi.org\/10.1587\/transcom.2017CQI0002","journal-title":"IEICE Trans. Commun."},{"key":"14_CR33","volume-title":"Artificial Intelligence - A Guide to Intelligent Systems","author":"M Negnevitsky","year":"2005","unstructured":"Negnevitsky, M.: Artificial Intelligence - A Guide to Intelligent Systems, 2nd edn. Addison-Wesley, Essex (2005)","edition":"2"},{"issue":"4","key":"14_CR34","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"TT Nguyen","year":"2008","unstructured":"Nguyen, T.T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. Tutor. 10(4), 56\u201376 (2008)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"14_CR35","doi-asserted-by":"crossref","unstructured":"Phan, T.V., Van Toan, T., Van Tuyen, D., Huong, T.T., Thanh, N.H.: OpenFlowSIA: an optimized protection scheme for software defined networks from flooding attacks. In: Proceedings of the 6th IEEE International Conference on Communications and Electronics, pp. 13\u201318 (2016)","DOI":"10.1109\/CCE.2016.7562606"},{"issue":"1","key":"14_CR36","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/TNET.2011.2159991","volume":"20","author":"S Raza","year":"2012","unstructured":"Raza, S., Huang, G., Chuah, C.N., Seetharaman, S., Singh, J.P.: MeasuRouting: a framework for routing assisted traffic monitoring. IEEE\/ACM Trans. Network. 20(1), 45\u201356 (2012)","journal-title":"IEEE\/ACM Trans. Network."},{"key":"14_CR37","doi-asserted-by":"publisher","unstructured":"Rossi, D., Valenti, S.: Fine-grained traffic classification with Netflow data. In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, pp. 479\u2013483. Association for Computing Machinery, New York (2010). https:\/\/doi.org\/10.1145\/1815396.1815507","DOI":"10.1145\/1815396.1815507"},{"key":"14_CR38","volume-title":"Artificial Intelligence (A Modern Approach)","author":"S Russell","year":"1995","unstructured":"Russell, S., Norvig, P.: Artificial Intelligence (A Modern Approach), 3rd edn. Prentice Hall, New Jersey (1995)","edition":"3"},{"key":"14_CR39","doi-asserted-by":"crossref","unstructured":"Sabbeh, A., Al-Dunainawi, Y., Al-Raweshidy, H.S., Abbod, M.F.: Performance prediction of software defined network using an artificial neural network. In: Proceedings of the SAI Computing Conference (SAI), pp. 80\u201384 (2016)","DOI":"10.1109\/SAI.2016.7555965"},{"key":"14_CR40","doi-asserted-by":"crossref","unstructured":"Sahoo, K., Sahoo, S., Mishra, S., Mohanty, S., Sahoo, B.: Analyzing controller placement in software defined networks. In: Proceedings on National Conference on Next Generation Computing and Its Applications in Computer Science and Technology, pp. 12\u201316 (2016)","DOI":"10.1109\/ICIT.2016.047"},{"key":"14_CR41","doi-asserted-by":"publisher","unstructured":"Sander, C., R\u00fcth, J., Hohlfeld, O., Wehrle, K.: DeePCCI: deep learning-based passive congestion control identification. In: Proceedings of the 2019 Workshop on Network Meets AI & ML, NetAI 2019, pp. 37\u201343. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3341216.3342211","DOI":"10.1145\/3341216.3342211"},{"key":"14_CR42","doi-asserted-by":"publisher","unstructured":"Shukla, A., Hudemann, K.N., Hecker, A., Schmid, S.: Runtime verification of P4 switches with reinforcement learning. In: Proceedings of the 2019 Workshop on Network Meets AI & ML, NetAI 2019, pp. 1\u20137. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3341216.3342206","DOI":"10.1145\/3341216.3342206"},{"key":"14_CR43","unstructured":"da Silva, A.S., Wickboldt, J.A., Granville, L.Z., Schaeffer-Filho, A.: Atlantic: a framework for anomaly traffic detection, classification, and mitigation in SDN. In: Proceedings of the 2016 IEEE\/IFIP Network Operations and Management Symposium, pp. 27\u201335 (2016)"},{"issue":"1","key":"14_CR44","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/35.568214","volume":"35","author":"DL Tennenhouse","year":"1997","unstructured":"Tennenhouse, D.L., Smith, J.M., Sincoskie, W.D., Wetherall, D., Minden, G.J.: A survey of active network research. IEEE Commun. Mag. 35(1), 80\u201386 (1997)","journal-title":"IEEE Commun. Mag."},{"issue":"5","key":"14_CR45","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/1290168.1290180","volume":"37","author":"DL Tennenhouse","year":"2007","unstructured":"Tennenhouse, D.L., Wetherall, D.J.: Towards an active network architecture. ACM SIGCOMM Comput. Commun. Rev. 37(5), 81\u201394 (2007)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"14_CR46","doi-asserted-by":"crossref","unstructured":"Wang, P., Chao, K.M., Lin, H.C., Lin, W.H., Lo, C.C.: An efficient flow control approach for SDN-based network threat detection and migration using support vector machine. In: Proceedings of the 13th IEEE International Conference on e-Business Engineering, pp. 56\u201363 (2016)","DOI":"10.1109\/ICEBE.2016.020"},{"issue":"1","key":"14_CR47","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/COMST.2018.2866942","volume":"21","author":"J Xie","year":"2019","unstructured":"Xie, J., et al.: A survey of machine learning techniques applied to software defined networking (SDN). IEEE Commun. Surv. Tutor. 21(1), 393\u2013430 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"14_CR48","unstructured":"Yan, H., Maltz, D.A., Gogineni, H., Cai, Z.: Tesseract: a 4D network control plane. In: Proceedings of the 4th USENIX Symposium on Networked Systems Design & Implementation (NSDI 2007), pp. 369\u2013382 (2007)"},{"issue":"2","key":"14_CR49","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s10796-008-9131-2","volume":"12","author":"R Yuan","year":"2010","unstructured":"Yuan, R., Li, Z., Guan, X., Xu, L.: An SVM-based machine learning method for accurate internet traffic classification. Inf. Syst. Front. 12(2), 149\u2013156 (2010)","journal-title":"Inf. Syst. Front."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","6GN for Future Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63941-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T21:11:07Z","timestamp":1611868267000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-63941-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030639402","9783030639419"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63941-9_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"6GN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on 5G for Future Wireless Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gwn2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/5gwn.eai-conferences.org\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}