{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:13:35Z","timestamp":1770228815281,"version":"3.49.0"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031377648","type":"print"},{"value":"9783031377655","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37765-5_7","type":"book-chapter","created":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T19:01:53Z","timestamp":1688670113000},"page":"90-95","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Case Study on\u00a0the\u00a0Performance of\u00a0ML-Based Network Intrusion Detection Systems in\u00a0SDN"],"prefix":"10.1007","author":[{"given":"Adnane","family":"Mzibri","sequence":"first","affiliation":[]},{"given":"Redouane","family":"Benaini","sequence":"additional","affiliation":[]},{"given":"Mouad Ben","family":"Mamoun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,7]]},"reference":[{"issue":"2","key":"7_CR1","first-page":"30","volume":"17","author":"N McKeown","year":"2009","unstructured":"McKeown, N.: Software-defined networking. INFOCOM keynote talk 17(2), 30\u201332 (2009)","journal-title":"Software-defined networking. INFOCOM keynote talk"},{"key":"7_CR2","doi-asserted-by":"publisher","unstructured":"Bilal, O., Ben mamoun M., Benaini, R.: An overview on SDN architectures with multiple controllers. Comput. Networks Commun. (2016). Article ID 9396525 (2016). https:\/\/doi.org\/10.1155\/2016\/9396525","DOI":"10.1155\/2016\/9396525"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Benamrane, F., Ben mamoun, M., Benaini, R.: An east-west interface for distributed SDN control plane: implementation and evaluation. Comput. Electr. Eng. 57, 162\u2013175 (2017)","DOI":"10.1016\/j.compeleceng.2016.09.012"},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Chica, J. C. C., Imbachi, J. C., Vega, J. F. B.: Security in SDN: a comprehensive survey. J. Network Comput. Appl. 159 (2020). https:\/\/doi.org\/10.1016\/j.jnca.2020.102595","DOI":"10.1016\/j.jnca.2020.102595"},{"key":"7_CR5","doi-asserted-by":"publisher","unstructured":"Elsayed, M. S., Le-Khac, N. -A., Jurcut, A. D.: InSDN: A Novel SDN Intrusion Dataset. IEEE Access 8, 165263\u2013165284 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3022633","DOI":"10.1109\/ACCESS.2020.3022633"},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Almseidin, M., Alzubi, M., Kovacs, S., Alkasassbeh, M.: Evaluation of machine learning algorithms for intrusion detection system. In: Procedings of 15th International Symposium on Intelligent Systems and Informatics (SISY) IEEE, Subotica, Serbia, pp. 000277\u2013000282 (2017). https:\/\/doi.org\/10.1109\/SISY.2017.8080566","DOI":"10.1109\/SISY.2017.8080566"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Ajaeiya, G. A., Adalian, N., Elhajj, I. H., Kayssi, A., Chehab, A.: Flow-based intrusion detection system for SDN. In: Proceedings of 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, pp. 787\u2013793 (2017). https:\/\/doi.org\/10.1109\/ISCC.2017.8024623","DOI":"10.1109\/ISCC.2017.8024623"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"Yang, L., Zhao, H.: DDoS attack identification and defense using SDN based on machine learning method. In: Proceedings of 15th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN), Yichang, China, pp. 174\u2013178 (2018). https:\/\/doi.org\/10.1109\/I-SPAN.2018.00036","DOI":"10.1109\/I-SPAN.2018.00036"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Aiken, J., Sandra, S.-H.: Investigating adversarial attacks against network intrusion detection systems in SDNs. In: IEEE Conference on Network Functions Virtualization and Software Defined Networks (NFV-SDN), Dallas, TX, USA, pp. 1\u20137 (2019)","DOI":"10.1109\/NFV-SDN47374.2019.9040101"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Santos, R., Souza, D., Santo, W., Ribeiro, A., Moreno, E.: Machine learning algorithms to detect DDoS attacks in SDN. Concurr. Comput. Pract. Exp. 16, 1\u201314, (32) (2020)","DOI":"10.1002\/cpe.5402"}],"container-title":["Lecture Notes in Computer Science","Networked Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37765-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T19:02:58Z","timestamp":1688670178000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37765-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031377648","9783031377655"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37765-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"7 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NETYS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Networked Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Benguerir","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"netys2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/netys.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}