{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T11:19:01Z","timestamp":1775042341473,"version":"3.50.1"},"reference-count":20,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.32604\/iasc.2023.026769","type":"journal-article","created":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T05:57:26Z","timestamp":1654495046000},"page":"867-880","source":"Crossref","is-referenced-by-count":101,"title":["An Intrusion Detection System for SDN Using Machine Learning"],"prefix":"10.32604","volume":"35","author":[{"given":"G.","family":"Logeswari","sequence":"first","affiliation":[]},{"given":"S.","family":"Bose","sequence":"additional","affiliation":[]},{"given":"T.","family":"Anitha","sequence":"additional","affiliation":[]}],"member":"17807","reference":[{"key":"ref1","series-title":"Int. Telecommunication Networks and Applications Conf. (ITNAC)","first-page":"1","article-title":"Network anomaly detection using light GBM: A gradient boosting classifier","author":"Islam","year":"2020"},{"key":"ref2","first-page":"251","article-title":"Building an effective intrusion detection system by using hybrid data optimization based on machine learning algorithms","volume":"2","author":"Ren","year":"2019","journal-title":"Security and Communication Networks"},{"key":"ref3","series-title":"MILCOM 2019 - 2019 IEEE Military Communications Conf. (MILCOM)","first-page":"1","article-title":"An intelligent system for preventing SSL stripping-based session hijacking attacks","volume":"2","author":"Jonas","year":"2019"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1145\/1355734.1355746","article-title":"OpenFlow: Enabling innovation in campus networks","volume":"38","author":"McKeown","year":"2008","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"ref5","series-title":"HotSDN \u201813: Proc. of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking","first-page":"55","article-title":"Towards secure and dependable software-defined networks","volume":"3","author":"Kreutz","year":"2013"},{"key":"ref6","series-title":"2017 Seventh Int. Conf. on Emerging Security Technologies (EST)","first-page":"138","article-title":"Machine learning based intrusion detection system for software defined networks","volume":"15","author":"Abubakar","year":"2017"},{"key":"ref7","series-title":"TENCON 2018 - 2018 IEEE Region 10 Conf. (2018)","first-page":"0144","article-title":"ML-Based approach to detect DDOS attack in V2I communication under SDN architecture","volume":"10","author":"Singh","year":"2018"},{"key":"ref8","series-title":"2018 IEEE Int. Conf. on Big Data and Smart Computing (BigComp)","first-page":"251","article-title":"XGBoost classifier for DDoS attack detection and analysis in SDN-based cloud","volume":"11","author":"Chen","year":"2018"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.comnet.2018.02.028","article-title":"A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection","volume":"136","author":"Hajisalem","year":"2018","journal-title":"Computer Networks"},{"key":"ref10","series-title":"Proc. of the 15th Int. Conf. on Emerging Networking Experiments and Technologies (2019)","first-page":"72","article-title":"An SVM based DDoS attack detection method for RYU SDN controller","volume":"12","author":"Mehr","year":"2019"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"133","DOI":"10.20532\/cit.2016.1002701","article-title":"Improving accuracy of intrusion detection model using PCA and optimized SVM","volume":"24","author":"Ikram","year":"2016","journal-title":"CIT. Journal of Computing and Information Technology"},{"key":"ref12","first-page":"512","article-title":"Voting-based intrusion detection framework for securing software-defined networks","volume":"2","author":"Swami","year":"2020","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"15","DOI":"10.5815\/ijcnis.2021.03.02","article-title":"Machine learning-based distributed denial of service attacks detection technique using new features in software-defined networks","volume":"3","author":"Gadallah","year":"2021","journal-title":"International. Journal Computer Network and Information Security"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1007\/s12083-017-0630-0","article-title":"Survey on SDN based network intrusion detection system using machine learning approaches","volume":"12","author":"Sultana","year":"2019","journal-title":"Peer-to-Peer Network Application"},{"key":"ref15","series-title":"2019 3rd Int. Conf. on Trends in Electronics and Informatics (ICOEI)","first-page":"916","article-title":"Machine learning based intrusion detection system","volume":"3","author":"Halimaa","year":"2019"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1016\/j.eswa.2016.09.041","article-title":"Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system","volume":"67","author":"Al-Yaseen","year":"2017","journal-title":"Expert Systems with Applications"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.iot.2021.100462","article-title":"Intrusion detection based on machine learning techniques in computer networks","volume":"16","author":"Dina","year":"2021","journal-title":"Internet of Things"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1155\/2020\/8875404","article-title":"Feature selection based on cross-correlation for the intrusion detection system","volume":"2020","author":"Farahani","year":"2020","journal-title":"Security and Communication Networks"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"83654","DOI":"10.1109\/ACCESS.2021.3087175","article-title":"ML-LGBM: A machine learning model based on light gradient boosting machine for the detection of version number attacks in RPL-based networks","volume":"9","author":"Osman","year":"2021","journal-title":"IEEE Access"},{"key":"ref20","series-title":"IEEE Symposium on Computational Intelligence for Security and Defense Applications","first-page":"1","article-title":"A detailed analysis of the KDD CUP 99 data set","volume":"3","author":"Tavallaee","year":"2009"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/ueditor\/files\/iasc\/TSP_IASC-35-1\/TSP_IASC_26769\/TSP_IASC_26769.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T21:28:42Z","timestamp":1733520522000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/iasc\/v35n1\/48147"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.32604\/iasc.2023.026769","relation":{},"ISSN":["1079-8587"],"issn-type":[{"value":"1079-8587","type":"print"}],"subject":[],"published":{"date-parts":[[2023]]}}}