{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:45:02Z","timestamp":1765039502014,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811375637"},{"type":"electronic","value":"9789811375644"}],"license":[{"start":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T00:00:00Z","timestamp":1562198400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-13-7564-4_41","type":"book-chapter","created":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T17:03:43Z","timestamp":1562173423000},"page":"483-494","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Performance Analysis of SDN-Based Intrusion Detection Model with Feature Selection Approach"],"prefix":"10.1007","author":[{"given":"Samrat Kumar","family":"Dey","sequence":"first","affiliation":[]},{"given":"Md.","family":"Raihan Uddin","sequence":"additional","affiliation":[]},{"given":"Md.","family":"Mahbubur Rahman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,4]]},"reference":[{"unstructured":"Software Defined Networking Definition. Available. https:\/\/www.opennetworking.org\/sdn-definition. Accessed 16 May 2017","key":"41_CR1"},{"issue":"2","key":"41_CR2","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown N, Anderson T, Balakrishnan H et al (2008) OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput Commun Rev 38(2):69\u201374","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"unstructured":"Open Networking Foundation, ONF SDN Evolution. Available. http:\/\/3vf60mmveq1g8vzn48q2o71a-wpengine.netdna-ssl.com\/wp-content\/uploads\/2013\/05\/TR-535-ONF-SDN-Evolution.pdf. Accessed 25 Feb 2018","key":"41_CR3"},{"issue":"4","key":"41_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/2534169.2486019","volume":"43","author":"S Jain","year":"2013","unstructured":"Jain S, Kumar A, Mandal S, Ong J, Poutievski L, Singh A, Venkata S, Wanderer J, Zhou J, Zhu M et al (2013) B4: experience with a globally-deployed software defined wan. ACM SIGCOMM Comput Commun Rev 43(4):3\u201314","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"unstructured":"C. T. Huawei Press Centre and H. unveil world\u2019s first commercial deployment of SDN in carrier networks. Available. http:\/\/pr.huawei.com\/en\/news\/hw-332209-sdn.htm. Accessed 28 Feb 2018","key":"41_CR5"},{"issue":"3","key":"41_CR6","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/1384609.1384625","volume":"38","author":"N Gude","year":"2008","unstructured":"Gude N, Koponen T, Pettit J, Pfaff B, Casado M, McKeown N, Shenker S (2008) Nox: towards an operating system for networks. ACM SIGCOMM Comput Commun Rev 38(3):105\u2013110","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"doi-asserted-by":"crossref","unstructured":"Ryu. Available. http:\/\/osrg.github.io\/ryu. Accessed 06 March 2018","key":"41_CR7","DOI":"10.4236\/jcc.2018.65010"},{"doi-asserted-by":"crossref","unstructured":"Erickson D (2013) The Beacon OpenFlow controller. In: Proceedings of the second ACM SIGCOMM workshop on hot topics in software defined networking. ACM, pp 13\u201318","key":"41_CR8","DOI":"10.1145\/2491185.2491189"},{"unstructured":"OpenDaylight: a Linux foundation collaborative project. Available. http:\/\/www.opendaylight.org. Accessed 11 March 2018","key":"41_CR9"},{"unstructured":"Floodlight. Available. http:\/\/www.projectfloodlight.org. Accessed 15 March 2018","key":"41_CR10"},{"doi-asserted-by":"crossref","unstructured":"Jadidi Z, Muthukkumarasamy V, Sithirasenan E, Sheikhan M (2013) Flow-based anomaly detection using neural network optimized with gsa algorithm. In: 2013 IEEE 33rd international conference on distributed computing systems workshops, pp 76\u201381","key":"41_CR11","DOI":"10.1109\/ICDCSW.2013.40"},{"doi-asserted-by":"crossref","unstructured":"Winter P, Hermann E, Zeilinger M (2011) Inductive intrusion detection in flow-based network data using one-class support vector machines. In: 2011 4th IFIP international conference on new technologies, mobility and security (NTMS). IEEE, pp 1\u20135","key":"41_CR12","DOI":"10.1109\/NTMS.2011.5720582"},{"doi-asserted-by":"crossref","unstructured":"Mehdi SA, Khalid J, Khayam SA (2011) Revisiting traffic anomaly detection using software defined networking. In: International workshop on recent advances in intrusion detection. Springer, pp 161\u2013180","key":"41_CR13","DOI":"10.1007\/978-3-642-23644-0_9"},{"doi-asserted-by":"crossref","unstructured":"Braga R, Mota E, Passito A (2010) Lightweight ddos flooding attack detection using nox\/openflow. In: 2010 IEEE 35th conference on local computer networks (LCN). IEEE, pp 408\u2013415","key":"41_CR14","DOI":"10.1109\/LCN.2010.5735752"},{"doi-asserted-by":"crossref","unstructured":"Kokila R, Selvi ST, Govindarajan K (2014) Ddos detection and analysis in sdn-based environment using support vector machine classifier. In: 2014 sixth international conference on advanced computing (ICoAC). IEEE, pp 205\u2013210","key":"41_CR15","DOI":"10.1109\/ICoAC.2014.7229711"},{"doi-asserted-by":"crossref","unstructured":"Phan TV, Van Toan T, Van Tuyen D, Huong TT, Thanh NH (2016) Openflowsia: an optimized protection scheme for software-defined networks from flooding attacks. In: 2016 IEEE sixth international conference on communications and electronics (ICCE). IEEE, pp 13\u201318","key":"41_CR16","DOI":"10.1109\/CCE.2016.7562606"},{"doi-asserted-by":"crossref","unstructured":"Tang T, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M (2016) Deep learning approach for network intrusion detection in software defined networking. In: 2016 International conference on wireless networks and mobile communications (WINCOM) (WINCOM16), Fez, Morocco, Oct 2016","key":"41_CR17","DOI":"10.1109\/WINCOM.2016.7777224"},{"issue":"5","key":"41_CR18","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/MS.2016.114","volume":"33","author":"P Louridas","year":"2016","unstructured":"Louridas P, Ebert C (2016) Machine learning. IEEE Softw 33(5):110\u2013115","journal-title":"IEEE Softw"},{"doi-asserted-by":"crossref","unstructured":"Meng YX (2011) The practice on using machine learning for network anomaly intrusion detection. In: International conference on machine learning and cybernetics (ICMLC), vol 2. IEEE, pp 576\u2013581","key":"41_CR19","DOI":"10.1109\/ICMLC.2011.6016798"},{"doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani A-A (2009) A detailed analysis of the kdd cup 99 data set. In: Proceedings of the second IEEE symposium on computational intelligence for security and defence applications","key":"41_CR20","DOI":"10.1109\/CISDA.2009.5356528"},{"unstructured":"WEKA. Data Mining Machine Learning Software [Available Online]. http:\/\/www.cs.waikato.ac.nz\/ml\/weka. Accessed 11 May 2018","key":"41_CR21"},{"doi-asserted-by":"crossref","unstructured":"Ingre B, Yadav A (2015) Performance analysis of NSL-KDD dataset using ANN. In: 2015 International conference on signal processing and communication engineering systems, Guntur, pp 92\u201396","key":"41_CR22","DOI":"10.1109\/SPACES.2015.7058223"},{"doi-asserted-by":"crossref","unstructured":"Abubakar A, Pranggono B (2017) Machine learning based intrusion detection system for software defined networks. In: Proceedings of the 2017 eighth international conference on emerging security technologies (EST). IEEE","key":"41_CR23","DOI":"10.1109\/EST.2017.8090413"},{"doi-asserted-by":"crossref","unstructured":"Ashraf J, Latif S (2014) Handling intrusion and DDoS attacks in Software Defined Networks using machine learning techniques. In: 2014 national software engineering conference, Rawalpindi, pp 55\u201360","key":"41_CR24","DOI":"10.1109\/NSEC.2014.6998241"},{"unstructured":"Dhanabal L, Shantharajah P (2015) A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int J Adv Res Comput Commun Eng 446\u2013452","key":"41_CR25"}],"container-title":["Algorithms for Intelligent Systems","Proceedings of International Joint Conference on Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-7564-4_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T11:28:17Z","timestamp":1721993297000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-13-7564-4_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,4]]},"ISBN":["9789811375637","9789811375644"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-7564-4_41","relation":{},"ISSN":["2524-7565","2524-7573"],"issn-type":[{"type":"print","value":"2524-7565"},{"type":"electronic","value":"2524-7573"}],"subject":[],"published":{"date-parts":[[2019,7,4]]},"assertion":[{"value":"4 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}