{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:46:19Z","timestamp":1778168779119,"version":"3.51.4"},"reference-count":169,"publisher":"MDPI AG","issue":"20","license":[{"start":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T00:00:00Z","timestamp":1665964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia","award":["PNURSP2022R97"],"award-info":[{"award-number":["PNURSP2022R97"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>A revolution in network technology has been ushered in by software defined networking (SDN), which makes it possible to control the network from a central location and provides an overview of the network\u2019s security. Despite this, SDN has a single point of failure that increases the risk of potential threats. Network intrusion detection systems (NIDS) prevent intrusions into a network and preserve the network\u2019s integrity, availability, and confidentiality. Much work has been done on NIDS but there are still improvements needed in reducing false alarms and increasing threat detection accuracy. Recently advanced approaches such as deep learning (DL) and machine learning (ML) have been implemented in SDN-based NIDS to overcome the security issues within a network. In the first part of this survey paper, we offer an introduction to the NIDS theory, as well as recent research that has been conducted on the topic. After that, we conduct a thorough analysis of the most recent ML- and DL-based NIDS approaches to ensure reliable identification of potential security risks. Finally, we focus on the opportunities and difficulties that lie ahead for future research on SDN-based ML and DL for NIDS.<\/jats:p>","DOI":"10.3390\/s22207896","type":"journal-article","created":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T00:31:01Z","timestamp":1666053061000},"page":"7896","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":56,"title":["Network Threat Detection Using Machine\/Deep Learning in SDN-Based Platforms: A Comprehensive Analysis of State-of-the-Art Solutions, Discussion, Challenges, and Future Research Direction"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4758-8265","authenticated-orcid":false,"given":"Naveed","family":"Ahmed","sequence":"first","affiliation":[{"name":"School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Johor Bahru 81310, Johor, Malaysia"}]},{"given":"Asri bin","family":"Ngadi","sequence":"additional","affiliation":[{"name":"School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Johor Bahru 81310, Johor, Malaysia"}]},{"given":"Johan Mohamad","family":"Sharif","sequence":"additional","affiliation":[{"name":"School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Johor Bahru 81310, Johor, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1523-1330","authenticated-orcid":false,"given":"Saddam","family":"Hussain","sequence":"additional","affiliation":[{"name":"School of Digital Science, University Brunei Darussalam, Jalan Tungku Link, Gadong BE1410, Brunei"}]},{"given":"Mueen","family":"Uddin","sequence":"additional","affiliation":[{"name":"College of Computing and Information Technology, University of Doha For Science and Technology, Doha 24449, Qatar"}]},{"given":"Muhammad Siraj","family":"Rathore","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Capital University of Science and Technology, Islamabad 44000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5045-7485","authenticated-orcid":false,"given":"Jawaid","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Capital University of Science and Technology, Islamabad 44000, Pakistan"}]},{"given":"Maha","family":"Abdelhaq","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8227-9110","authenticated-orcid":false,"given":"Raed","family":"Alsaqour","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computing and Informatics, Saudi Electronic University, Riyadh 93499, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5406-0389","authenticated-orcid":false,"given":"Syed Sajid","family":"Ullah","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Technology, University of Agder (UiA), N-4898 Grimstad, Norway"}]},{"given":"Fatima Tul","family":"Zuhra","sequence":"additional","affiliation":[{"name":"School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Johor Bahru 81310, Johor, Malaysia"}]}],"member":"1968","published-online":{"date-parts":[[2022,10,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Mehdi, S.A., Khalid, J., and Khayam, S.A. (2011). Revisiting Traffic Anomaly Detection Using Software Defined Networking. International Workshop on Recent Advances in Intrusion Detection, Springer.","DOI":"10.1007\/978-3-642-23644-0_9"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","article-title":"Anomaly-Based Network Intrusion Detection: Techniques, Systems and Challenges","volume":"28","year":"2009","journal-title":"Comput. Secur."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Ahmed, M.E., Kim, H., and Park, M. (2017, January 23\u201325). Mitigating DNS Query-Based DDoS Attacks with Machine Learning on Software-Defined Networking. Proceedings of the MILCOM 2017\u20132017 IEEE Military Communications Conference (MILCOM), Baltimore, MD, USA.","DOI":"10.1109\/MILCOM.2017.8170802"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.iot.2018.09.003","article-title":"Deep Learning and Software-Defined Networks: Towards Secure IoT Architecture","volume":"3","author":"Dawoud","year":"2018","journal-title":"Internet Things"},{"key":"ref_5","unstructured":"Herrera, A., and Camargo, J.E. (2019, January 5\u20137). A Survey on Machine Learning Applications for Software Defined Network Security. Proceedings of the International Conference on Applied Cryptography and Network Security, Bogota, Colombia."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2181","DOI":"10.1109\/COMST.2014.2326417","article-title":"A Survey on Software-Defined Network and Openflow: From Concept to Implementation","volume":"16","author":"Hu","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1007\/s12083-017-0630-0","article-title":"Survey on SDN Based Network Intrusion Detection System Using Machine Learning Approaches","volume":"12","author":"Sultana","year":"2019","journal-title":"Peer-Peer Netw. Appl."},{"key":"ref_8","unstructured":"Hodo, E., Bellekens, X., Hamilton, A., Tachtatzis, C., and Atkinson, R. (2017). Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey. arXiv."},{"key":"ref_9","first-page":"1017","article-title":"Survey on Sdn Based Network Intrusion Detection System Using Machine Learning Framework","volume":"6","author":"Tiwari","year":"2019","journal-title":"IRJET"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1109\/COMST.2018.2866942","article-title":"A Survey of Machine Learning Techniques Applied to Software Defined Networking (SDN): Research Issues and Challenges","volume":"21","author":"Xie","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Chalapathy, R., and Chawla, S. (2019). Deep Learning for Anomaly Detection: A Survey. arXiv.","DOI":"10.1145\/3394486.3406704"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"105124","DOI":"10.1016\/j.knosys.2019.105124","article-title":"Deep Learning Approaches for Anomaly-Based Intrusion Detection Systems: A Survey, Taxonomy, and Open Issues","volume":"189","author":"Aldweesh","year":"2020","journal-title":"Knowl.-Based Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"e4150","DOI":"10.1002\/ett.4150","article-title":"Network Intrusion Detection System: A Systematic Study of Machine Learning and Deep Learning Approaches","volume":"32","author":"Ahmad","year":"2021","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"105992","DOI":"10.1016\/j.knosys.2020.105992","article-title":"Systematic ensemble model selection approach for educational data mining","volume":"200","author":"Injadat","year":"2020","journal-title":"Knowl. -Based Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.jnca.2018.08.005","article-title":"Modelling Software-Defined Networking: Software and Hardware Switches","volume":"122","author":"Singh","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Krongbaramee, P., and Somchit, Y. (2018, January 11\u201313). Implementation of SDN Stateful Firewall on Data Plane Using Open VSwitch. Proceedings of the 2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE), Nakhonpathom, Thailand.","DOI":"10.1109\/JCSSE.2018.8457354"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Lockwood, J.W., McKeown, N., Watson, G., Gibb, G., Hartke, P., Naous, J., Raghuraman, R., and Luo, J. (2007, January 3\u20134). NetFPGA\u2013An Open Platform for Gigabit-Rate Network Switching and Routing. Proceedings of the 2007 IEEE International Conference on Microelectronic Systems Education (MSE\u201907), San Diego, CA, USA.","DOI":"10.1109\/MSE.2007.69"},{"key":"ref_18","unstructured":"Lu, G., Guo, C., Li, Y., Zhou, Z., Yuan, T., Wu, H., Xiong, Y., Gao, R., and Zhang, Y. (April, January 30). ServerSwitch: A Programmable and High Performance Platform for Data Center Networks. Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 11), Boston, MA, USA."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Anwer, M.B., Motiwala, M., Tariq, M.B., and Feamster, N. (September, January 30). Switchblade: A Platform for Rapid Deployment of Network Protocols on Programmable Hardware. Proceedings of the ACM SIGCOMM 2010 Conference, New Delhi, India.","DOI":"10.1145\/1851182.1851206"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Medved, J., Varga, R., Tkacik, A., and Gray, K. (2014, January 19). Opendaylight: Towards a Model-Driven Sdn Controller Architecture. Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Sydney, NSW, Australia.","DOI":"10.1109\/WoWMoM.2014.6918985"},{"key":"ref_21","unstructured":"Itoh, T., Sakai, M., and Okada, M. (2011). Floodlight. (Application CA 139471), Google Patents."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1145\/1384609.1384625","article-title":"NOX: Towards an Operating System for Networks","volume":"38","author":"Gude","year":"2008","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_23","unstructured":"Tootoonchian, A., and Ganjali, Y. (2010, January 27). Hyperflow: A Distributed Control Plane for Openflow. Proceedings of the 2010 Internet Network Management Conference on Research on Enterprise Networking, San Jose, CA, USA."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Prakash, A., and Priyadarshini, R. (2018, January 20\u201321). An Intelligent Software Defined Network Controller for Preventing Distributed Denial of Service Attack. Proceedings of the 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, India.","DOI":"10.1109\/ICICCT.2018.8473340"},{"key":"ref_25","first-page":"27","article-title":"Survey of Current Network Intrusion Detection Techniques","volume":"3","author":"Srivastava","year":"2013","journal-title":"J. Inf. Eng. Appl."},{"key":"ref_26","first-page":"1","article-title":"Dielectric, Impedance\/Modulus and Conductivity Studies on [Bi0. 5 (Na1-XKx) 0.5] 0.94 Ba0. 06TiO3, (0.16 \u2264 x \u2264 0.20) Lead-Free Ceramics","volume":"6","author":"Kumari","year":"2016","journal-title":"Am. J. Mater. Sci"},{"key":"ref_27","unstructured":"Wu, H., Schwab, S., and Peckham, R.L. (2008). Signature Based Network Intrusion Detection System and Method. (Application US10\/092,179), Google Patents."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"012018","DOI":"10.1088\/1742-6596\/1192\/1\/012018","article-title":"Improving Adaboost-Based Intrusion Detection System (IDS) Performance on CIC IDS 2017 Dataset","volume":"1192","author":"Yulianto","year":"2019","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","article-title":"Intrusion Detection System: A Comprehensive Review","volume":"36","author":"Liao","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"37","DOI":"10.3233\/JCS-1999-7103","article-title":"NetSTAT: A Network-Based Intrusion Detection System","volume":"7","author":"Vigna","year":"1999","journal-title":"J. Comput. Secur."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Sekar, R., Guang, Y., Verma, S., and Shanbhag, T. (1999, January 1\u20134). A High-Performance Network Intrusion Detection System. Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore.","DOI":"10.1145\/319709.319712"},{"key":"ref_32","unstructured":"Hoque, M.S., Mukit, M., Bikas, M., and Naser, A. (2012). An Implementation of Intrusion Detection System Using Genetic Algorithm. arXiv."},{"key":"ref_33","unstructured":"Gales, G. (2003). Network Intrusion Detection System and Method. (Application US12\/411,916), Google Patents, Available online: https:\/\/patents.google.com\/patent\/US20030084323A1\/en."},{"key":"ref_34","unstructured":"Brownlee, J. (2016). Supervised and Unsupervised Machine Learning Algorithms. Mach. Learn. Mastery, 16, Available online: https:\/\/machinelearningmastery.com\/supervised-and-unsupervised-machine-learning-algorithms\/."},{"key":"ref_35","unstructured":"Bonaccorso, G. (2017). Machine Learning Algorithms, Packt Publishing Ltd."},{"key":"ref_36","unstructured":"Zamani, M., and Movahedi, M. (2013). Machine Learning Techniques for Intrusion Detection. arXiv."},{"key":"ref_37","unstructured":"Vishwanathan, S., and Narasimha, M.M. SSVM: A Simple SVM Algorithm. Proceedings of the Proceedings of the 2002 International Joint Conference on Neural Networks, IJCNN\u201902 (Cat. No.02CH37290)."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"El Naqa, I., and Murphy, M.J. (2015). What Is Machine Learning?, Springer.","DOI":"10.1007\/978-3-319-18305-3_1"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","article-title":"Intrusion Detection by Machine Learning: A Review","volume":"36","author":"Tsai","year":"2009","journal-title":"Expert Syst. Appl."},{"key":"ref_40","first-page":"18","article-title":"Classification and Regression by RandomForest","volume":"2","author":"Liaw","year":"2002","journal-title":"R News"},{"key":"ref_41","unstructured":"Vapnik, V.N., and Vapnik, V. (1998). Statistical Learning Theory, Wiley."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"281","DOI":"10.5194\/isprsarchives-XL-2-W3-281-2014","article-title":"A Comparison Study of Different Kernel Functions for SVM-Based Classification of Multi-Temporal Polarimetry SAR Data","volume":"40","author":"Yekkehkhany","year":"2014","journal-title":"Int. Arch. Photogramm. Remote Sens. Spat. Inf. Sci."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"97117","DOI":"10.1109\/ACCESS.2019.2929316","article-title":"Improved Blind Spectrum Sensing by Covariance Matrix Cholesky Decomposition and RBF-SVM Decision Classification at Low SNRs","volume":"7","author":"Bao","year":"2019","journal-title":"IEEE Access"},{"key":"ref_44","unstructured":"Steinwart, I., and Christmann, A. (2008). Support Vector Machines, Springer Science & Business Media."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-031-01691-2","article-title":"Support Vector Machines for Antenna Array Processing and Electromagnetics","volume":"1","author":"Christodoulou","year":"2005","journal-title":"Synth. Lect. Comput. Electromagn."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Zwane, S., Tarwireyi, P., and Adigun, M. (2019, January 21\u201322). A Flow-Based IDS for SDN-Enabled Tactical Networks. Proceedings of the 2019 International Multidisciplinary Information Technology and Engineering Conference (IMITEC), Vanderbijlpark, South Africa.","DOI":"10.1109\/IMITEC45504.2019.9015900"},{"key":"ref_47","unstructured":"Eid, H.F., Darwish, A., Hassanien, A.E., and Abraham, A. (December, January 29). Principle Components Analysis and Support Vector Machine Based Intrusion Detection System. Proceedings of the 2010 10th International Conference on Intelligent Systems Design and Applications, Cairo, Egypt."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Zanero, S., and Savaresi, S.M. (2004, January 14\u201317). Unsupervised Learning Techniques for an Intrusion Detection System. Proceedings of the 2004 ACM Symposium on Applied Computing, New York, NY, USA.","DOI":"10.1145\/967900.967988"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","article-title":"Nearest Neighbor Pattern Classification","volume":"13","author":"Cover","year":"1967","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Syarif, I., Prugel-Bennett, A., and Wills, G. (2012, January 24\u201326). Unsupervised Clustering Approach for Network Anomaly Detection. Proceedings of the International Conference on Networked Digital Technologies, Dubai, United Arab Emirates.","DOI":"10.1007\/978-3-642-30507-8_13"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0925-2312(98)00030-7","article-title":"The Self-Organizing Map","volume":"21","author":"Kohonen","year":"1998","journal-title":"Neurocomputing"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1007\/978-3-540-92910-9_19","article-title":"Self-Organizing Maps","volume":"1","author":"Hulle","year":"2012","journal-title":"Handb. Nat. Comput."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Hastie, T., Tibshirani, R., and Friedman, J. (2001). The Elements of Statistical Learning. Springer Series in Statistics, Springer.","DOI":"10.1007\/978-0-387-21606-5"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1109\/TPAMI.2002.1017616","article-title":"An Efficient K-Means Clustering Algorithm: Analysis and Implementation","volume":"24","author":"Kanungo","year":"2002","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_55","first-page":"27","article-title":"Network Intrusion Detection Using Semi Supervised Support Vector Machine","volume":"85","author":"Haweliya","year":"2014","journal-title":"Int. J. Comput. Appl."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Chen, C., Gong, Y., and Tian, Y. (2008, January 12\u201315). Semi-Supervised Learning Methods for Network Intrusion Detection. Proceedings of the 2008 IEEE International Conference on Systems, Man and Cybernetics, Singapore.","DOI":"10.1109\/ICSMC.2008.4811688"},{"key":"ref_57","unstructured":"Lee, D.-H. (2013, January 20\u201321). Pseudo-Label: The Simple and Efficient Semi-Supervised Learning Method for Deep Neural Networks. Proceedings of the Workshop on Challenges in Representation Learning, Atlanta, GA, USA."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1109\/TIP.2017.2772836","article-title":"Semi-Supervised Deep Learning Using Pseudo Labels for Hyperspectral Image Classification","volume":"27","author":"Wu","year":"2017","journal-title":"IEEE Trans. Image Process."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1109\/TNN.2009.2015974","article-title":"Semi-Supervised Learning","volume":"20","author":"Chapelle","year":"2009","journal-title":"IEEE Trans. Neural Netw."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.sysconle.2016.12.003","article-title":"Q-Learning for Continuous-Time Linear Systems: A Model-Free Infinite Horizon Optimal Control Approach","volume":"100","author":"Vamvoudakis","year":"2017","journal-title":"Syst. Control Lett."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MSP.2017.2743240","article-title":"Deep Reinforcement Learning: A Brief Survey","volume":"34","author":"Arulkumaran","year":"2017","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_62","unstructured":"Li, Y. (2017). Deep Reinforcement Learning: An Overview. arXiv."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/TNSE.2018.2865183","article-title":"Trust-Based Social Networks with Computing, Caching and Communications: A Deep Reinforcement Learning Approach","volume":"7","author":"He","year":"2018","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/JSAC.2017.2672278","article-title":"A Game Theoretic Approach for Distributed Resource Allocation and Orchestration of Softwarized Networks","volume":"35","author":"Galluccio","year":"2017","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Narmanlioglu, O., and Zeydan, E. (2017, January 8\u201312). Learning in SDN-Based Multi-Tenant Cellular Networks: A Game-Theoretic Perspective. Proceedings of the 2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, Portugal.","DOI":"10.23919\/INM.2017.7987414"},{"key":"ref_66","unstructured":"Gao, Y., Cheng, L., Sang, L., and Yang, D. (2016, January 3\u20136). Spectrum Sharing for LTE and WiFi Coexistence Using Decision Tree and Game Theory. Proceedings of the 2016 IEEE Wireless Communications and Networking Conference, Doha, Qatar."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"9055","DOI":"10.3390\/s120709055","article-title":"Game Theory for Wireless Sensor Networks: A Survey","volume":"12","author":"Shi","year":"2012","journal-title":"Sensors"},{"key":"ref_68","first-page":"1","article-title":"When Machine Learning Meets Ai and Game Theory","volume":"2012","author":"Agrawal","year":"2012","journal-title":"Comput. Sci."},{"key":"ref_69","unstructured":"Ranadheera, S., Maghsudi, S., and Hossain, E. (2017). Mobile Edge Computation Offloading Using Game Theory and Reinforcement Learning. arXiv."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Salama, M.A., Eid, H.F., Ramadan, R.A., Darwish, A., and Hassanien, A.E. (2011). Hybrid Intelligent Intrusion Detection Scheme, Springer.","DOI":"10.1007\/978-3-642-20505-7_26"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.neucom.2012.11.050","article-title":"Network Anomaly Detection with the Restricted Boltzmann Machine","volume":"122","author":"Fiore","year":"2013","journal-title":"Neurocomputing"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Thaseen, S., and Kumar, C.A. (2013, January 21\u201322). An Analysis of Supervised Tree Based Classifiers for Intrusion Detection System. Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and MOBILE Engineering, Salem, India.","DOI":"10.1109\/ICPRIME.2013.6496489"},{"key":"ref_73","unstructured":"Goodfellow, I., Bengio, Y., and Courville, A. (2016). Deep Learning, MIT Press."},{"key":"ref_74","unstructured":"Bengio, Y., Goodfellow, I., and Courville, A. (2017). Deep Learning, MIT Press."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"1903","DOI":"10.1109\/TIFS.2016.2561898","article-title":"Detecting Facial Retouching Using Supervised Deep Learning","volume":"11","author":"Bharati","year":"2016","journal-title":"IEEE Trans. Inf. Secur."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Ren, Z., Yan, J., Ni, B., Liu, B., Yang, X., and Zha, H. (2017, January 4\u20139). Unsup75ervised Deep Learning for Optical Flow Estimation. Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, San Francisco, CA, USA.","DOI":"10.1609\/aaai.v31i1.10723"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Taylor, A., Leblanc, S., and Japkowicz, N. (2016, January 17\u201319). Anomaly Detection in Automobile Control Network Data with Long Short-Term Memory Networks. Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), Montreal, QC, Canada.","DOI":"10.1109\/DSAA.2016.20"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Kang, M.-J., and Kang, J.-W. (2016). Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security. PLoS ONE, 11.","DOI":"10.1371\/journal.pone.0155781"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"165","DOI":"10.33851\/JMIS.2019.6.4.165","article-title":"An Intrusion Detection Model Based on a Convolutional Neural Network","volume":"6","author":"Kim","year":"2019","journal-title":"J. Multimed. Inf. Syst."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"38597","DOI":"10.1109\/ACCESS.2019.2905633","article-title":"A Deep Learning Method with Filter Based Feature Engineering for Wireless Intrusion Detection System","volume":"7","author":"Kasongo","year":"2019","journal-title":"IEEE Access"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim, J., Huong, T., and Kim, H. (2016, January 15\u201317). Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection. Proceedings of the International Conference on Platform Technology and Service (PlatCon), Jeju, Korea.","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","article-title":"A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks","volume":"5","author":"Yin","year":"2017","journal-title":"IEEE Access"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., Raza, A., and Ghogho, M. (2018, January 25-29). Deep Recurrent Neural Network for Intrusion Detection in Sdn-Based Networks. Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), Montreal, QC, Canada.","DOI":"10.1109\/NETSOFT.2018.8460090"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Nasr, M., Bahramali, A., and Houmansadr, A. (2018, January 15\u201319). Deepcorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada.","DOI":"10.1145\/3243734.3243824"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"37004","DOI":"10.1109\/ACCESS.2019.2905041","article-title":"Network Intrusion Detection: Based on Deep Hierarchical Network and Original Flow Data","volume":"7","author":"Zhang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"4184196","DOI":"10.1155\/2017\/4184196","article-title":"Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders","volume":"2017","author":"Yu","year":"2017","journal-title":"Secur. Commun. Netw."},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Alrawashdeh, K., and Purdy, C. (2016, January 18\u201320). Toward an Online Anomaly Intrusion Detection System Based on Deep Learning. Proceedings of the 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), Anaheim, CA, USA.","DOI":"10.1109\/ICMLA.2016.0040"},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1080\/23335777.2015.1056234","article-title":"From algorithms to architectures in cyber-physical networks","volume":"1","author":"Egerstedt","year":"2015","journal-title":"Cyber-Phys. Syst."},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Gao, N., Gao, L., Gao, Q., and Wang, H. (2014, January 20\u201322). An Intrusion Detection Model Based on Deep Belief Networks. Proceedings of the 2017 VI International Conference on Network, Communication and Computing Huangshan, China.","DOI":"10.1109\/CBD.2014.41"},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/LNET.2019.2901792","article-title":"On the Feasibility of Deep Learning in Sensor Network Intrusion Detection","volume":"1","author":"Otoum","year":"2019","journal-title":"IEEE Netw. Lett."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Inayat, U., Zia, M.F., Mahmood, S., Khalid, H.M., and Benbouzid, M. (2020). Learning-Based Methods for Cyber Attacks Detection in IoT Systems: A Survey on Methods, Analysis, and Future Prospects. Electronics, 11.","DOI":"10.3390\/electronics11091502"},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Thamilarasu, G., and Chawla, S. (2019). Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things. Sensors, 19.","DOI":"10.3390\/s19091977"},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"2505","DOI":"10.1109\/TSG.2017.2703842","article-title":"Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism","volume":"8","author":"He","year":"2017","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","article-title":"A Deep Learning Approach to Network Intrusion Detection","volume":"2","author":"Shone","year":"2018","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1109\/JSYST.2017.2741483","article-title":"A Prediction Algorithm to Enhance Grid Resilience Toward Cyber Attacks in WAMCS Applications","volume":"13","author":"Musleh","year":"2019","journal-title":"IEEE Syst. J."},{"key":"ref_96","unstructured":"Zhang, H., Yu, X., Ren, P., Luo, C., and Min, G. (2019). Deep Adversarial Learning in Intrusion Detection: A Data Augmentation Enhanced Framework. arXiv."},{"key":"ref_97","unstructured":"Zhou, L., Ouyang, X., Ying, H., Han, L., Cheng, Y., and Zhang, T. (October, January China). Cyber-Attack Classification in Smart Grid via Deep Neural Network. Proceedings of the 2nd International Conference on Computer Science and Application Engineering, Hohhot."},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.adhoc.2018.09.014","article-title":"Anomaly Detection in Ad-Hoc Networks Based on Deep Learning Model: A Plug and Play Device","volume":"84","author":"Feng","year":"2019","journal-title":"Ad Hoc Netw."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"31711","DOI":"10.1109\/ACCESS.2019.2903723","article-title":"Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network","volume":"7","author":"Zhang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1109\/TSUSC.2018.2793284","article-title":"Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security","volume":"5","author":"Jiang","year":"2018","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.yofte.2017.09.023","article-title":"Exploring Machine-Learning-Based Control Plane Intrusion Detection Techniques in Software Defined Optical Networks","volume":"39","author":"Zhang","year":"2017","journal-title":"Opt. Fiber Technol."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.comnet.2018.07.025","article-title":"An Evaluation of the Performance of Restricted Boltzmann Machines as a Model for Anomaly Network Intrusion Detection","volume":"144","author":"Aldwairi","year":"2018","journal-title":"Comput. Netw."},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Alom, M.Z., Taha, T.M., Yakopcic, C., Westberg, S., Sidike, P., Nasrin, M.S., Hasan, M., Essen, V., Awwal, A.A., and Asari, V.K. (2019). A State-of-The-Art Survey on Deep Learning Theory and Architectures. Electronics, 8.","DOI":"10.3390\/electronics8030292"},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"3101","DOI":"10.1007\/s00500-015-1994-9","article-title":"Improved Traffic Detection with Support Vector Machine Based on Restricted Boltzmann Machine","volume":"21","author":"Yang","year":"2017","journal-title":"Soft Comput."},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Zhao, G., Zhang, C., and Zheng, L. (2017, January 21\u201324). Intrusion Detection Using Deep Belief Network and Probabilistic Neural Network. Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) Guangzhou, China.","DOI":"10.1109\/CSE-EUC.2017.119"},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"30373","DOI":"10.1109\/ACCESS.2019.2899721","article-title":"A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection","volume":"7","author":"Khan","year":"2019","journal-title":"IEEE Access"},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"13546","DOI":"10.1109\/ACCESS.2019.2893871","article-title":"Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems","volume":"7","author":"Papamartzivanos","year":"2019","journal-title":"IEEE Access"},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Marotta, A., Carrozza, G., Avallone, S., and Manetti, V. (2013, January 28\u201330). An OpenFlow-Based Architecture for IaaS Security. Proceedings of the ATACCS \u201813: International Conference on Application and Theory of Automation in Command and Control Systems, Naples, Italy.","DOI":"10.1145\/2494493.2494510"},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Yasrebi, P., Monfared, S., Bannazadeh, H., and Leon-Garcia, A. (2015, January 11\u201315). Security Function Virtualization in Software Defined Infrastructure. Proceedings of the 2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, Canada.","DOI":"10.1109\/INM.2015.7140374"},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.eswa.2018.03.027","article-title":"An Ecosystem for Anomaly Detection and Mitigation in Software-Defined Networking","volume":"104","author":"Carvalho","year":"2018","journal-title":"Expert Syst. Appl."},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1145\/205447.205464","article-title":"On the Self-Similar Nature of Ethernet Traffic","volume":"25","author":"Leland","year":"1995","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_112","doi-asserted-by":"crossref","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., Raza, A., and Ghogho, M. (2016, January 26\u201329). Deep Learning Approach for Network Intrusion Detection in Software Defined Networking. Proceedings of the 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), Fez, Morocco.","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1049\/iet-net.2018.5080","article-title":"Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks","volume":"7","author":"Latah","year":"2018","journal-title":"IET Netw."},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"e2047","DOI":"10.1002\/nem.2047","article-title":"A Meta-Heuristic Bayesian Network Classification for Intrusion Detection","volume":"29","author":"Prasath","year":"2019","journal-title":"Int. J. Netw. Manag."},{"key":"ref_115","unstructured":"Kannadiga, P., and Zulkernine, M. (2005, January 23\u201325). DIDMA: A Distributed Intrusion Detection System Using Mobile Agents. Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network, Towson, MD, USA."},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Wang, B., Sun, Y., Yuan, C., and Xu, X. (2018, January 26\u201325). LESLA: A Smart Solution for SDN-Enabled MMTC E-Health Monitoring System. Proceedings of the 8th ACM MobiHoc 2018 Workshop on Pervasive Wireless Healthcare Workshop, Los Angeles, CA, USA.","DOI":"10.1145\/3220127.3220128"},{"key":"ref_117","doi-asserted-by":"crossref","unstructured":"Ashraf, S., Shawon, M.H., Khalid, H.M., and Muyeen, S.M. (2021). Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways. Sensors, 21.","DOI":"10.3390\/s21196415"},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Ashraf, J., and Latif, S. (2014, January 11\u201312). Handling Intrusion and DDoS Attacks in Software Defined Networks Using Machine Learning Techniques. Proceedings of the 2014 National Software Engineering Conference, Rawalpindi, Pakistan.","DOI":"10.1109\/NSEC.2014.6998241"},{"key":"ref_119","doi-asserted-by":"crossref","unstructured":"Kokila, R., Thamarai, S.S., and Govindarajan, K. (2014, January 17\u201319). DDoS Detection and Analysis in SDN-Based Environment Using Support Vector Machine Classifier. In Proceeding of the 2014 Sixth International Conference on Advanced Computing (ICoAC), Chennai, India.","DOI":"10.1109\/ICoAC.2014.7229711"},{"key":"ref_120","doi-asserted-by":"crossref","unstructured":"Wang, P., Chao, K.-M., Lin, H.-C., Lin, W.-H., and Lo, C.-C. (2016, January 4\u20136). An Efficient Flow Control Approach for SDN-Based Network Threat Detection and Migration Using Support Vector Machine. Proceedings of the 2016 IEEE 13th International Conference on e-Business Engineering (ICEBE), Macau, China.","DOI":"10.1109\/ICEBE.2016.020"},{"key":"ref_121","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","article-title":"Toward Developing a Systematic Approach to Generate Benchmark Datasets for Intrusion Detection","volume":"31","author":"Shiravi","year":"2012","journal-title":"Comput. Secur."},{"key":"ref_122","doi-asserted-by":"crossref","unstructured":"Gangadhar, S., and Sterbenz, J.P. (2017, January 4\u20136). Machine Learning Aided Traffic Tolerance to Improve Resilience for Software Defined Networks. Proceedings of the 2017 9th International Workshop on Resilient Networks Design and Modeling (RNDM), Alghero, Italy.","DOI":"10.1109\/RNDM.2017.8093035"},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Neupane, R.L., Neely, T., Chettri, N., Vassell, M., Zhang, Y., Calyam, P., and Durairajan, R. (2018, January 4\u20137). Dolus: Cyber Defense Using Pretense against DDoS Attacks in Cloud Platforms. Proceedings of the 19th International Conference on Distributed Computing and Networking, Varanasi, India.","DOI":"10.1145\/3154273.3154346"},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Nanda, S., Zafari, F., DeCusatis, C., Wedaa, E., and Yang, B. (2016, January 7\u201310). Predicting Network Attack Patterns in SDN Using Machine Learning Approach. Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Palo Alto, CA, USA.","DOI":"10.1109\/NFV-SDN.2016.7919493"},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Song, C., Park, Y., Golani, K., Kim, Y., Bhatt, K., and Goswami, K. (August, January 31). Machine-Learning Based Threat-Aware System in Software Defined Networks. Proceedings of the 2017 26th International Conference on Computer Communication and Networks (ICCCN), Vancouver, BC, Canada.","DOI":"10.1109\/ICCCN.2017.8038436"},{"key":"ref_126","doi-asserted-by":"crossref","unstructured":"Alshamrani, A., Chowdhary, A., Pisharody, S., Lu, D., and Huang, D. (2017, January 21\u201325). A Defense System for Defeating DDoS Attacks in SDN Based Networks. Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access, Miami, FL, USA.","DOI":"10.1145\/3132062.3132074"},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Smith, R.J., Zincir-Heywood, A.N., Heywood, M.I., and Jacobs, J.T. (2016, January 20\u201324). Initiating a Moving Target Network Defense with a Real-Time Neuro-Evolutionary Detector. Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion, Denver, CO, USA.","DOI":"10.1145\/2908961.2931681"},{"key":"ref_128","doi-asserted-by":"crossref","unstructured":"Narayanadoss, A.R., Truong-Huu, T., Mohan, P.M., and Gurusamy, M. (May, January 28). Crossfire Attack Detection Using Deep Learning in Software Defined ITS Networks. Proceeding of the 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia.","DOI":"10.1109\/VTCSpring.2019.8746594"},{"key":"ref_129","unstructured":"Anderson, S., Wickboldt, J.A., Granville, L.Z., and Schaeffer-Filho, A. (2016, January 25\u201329). ATLANTIC: A Framework for Anomaly Traffic Detection, Classification, and Mitigation in SDN. Proceedings of the NOMS 2016\u20142016 IEEE\/IFIP Network Operations and Management Symposium, Istanbul, Turkey."},{"key":"ref_130","doi-asserted-by":"crossref","unstructured":"Kreutz, D., Ramos, F.M., and Verissimo, P. (2013, January 16). Towards Secure and Dependable Software-Defined Networks. Proceedings of the HotSDN \u201813: Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, Hong Kong China.","DOI":"10.1145\/2491185.2491199"},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.jnca.2015.11.012","article-title":"Secure and Dependable Software Defined Networks","volume":"61","author":"Akhunzada","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"1520","DOI":"10.1002\/sec.1441","article-title":"A Deep Learning Approach for Detecting Malicious JavaScript Code","volume":"9","author":"Wang","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_133","doi-asserted-by":"crossref","unstructured":"Sommer, R., and Paxson, V. (2010, January 16\u201319). Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA.","DOI":"10.1109\/SP.2010.25"},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.comnet.2016.06.028","article-title":"Patterns for the Design of Secure and Dependable Software Defined Networks","volume":"109","author":"Petroulakis","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_135","unstructured":"Prete, L.R., Shinoda, A.A., Schweitzer, C.M. (2014, January 4\u20136). Simulation in an SDN Network Scenario Using the POX Controller. Proceedings of the 2014 IEEE Colombian Conference on Communications and Computing (COLCOM), Bogota, Colombia."},{"key":"ref_136","doi-asserted-by":"crossref","unstructured":"Wehrle, K., G\u00fcnes, M., and Gross, J. (2010). Modeling and Tools for Network Simulation, Springer Science & Business Media.","DOI":"10.1007\/978-3-642-12331-3"},{"key":"ref_137","doi-asserted-by":"crossref","unstructured":"Fontes, R.R., Afzal, S., Brito, S.H., Santos, M.A., and Rothenberg, C.E. (2015, January 9\u201313). Mininet-WiFi: Emulating Software-Defined Wireless Networks. Proceedings of the 2015 11th International Conference on Network and Service Management (CNSM), Barcelona, Spain.","DOI":"10.1109\/CNSM.2015.7367387"},{"key":"ref_138","doi-asserted-by":"crossref","unstructured":"Hande, Y., and Muddana, A. (2021). A Survey on Intrusion Detection System for Software Defined Networks (SDN), IGI Global.","DOI":"10.4018\/978-1-7998-7705-9.ch023"},{"key":"ref_139","doi-asserted-by":"crossref","unstructured":"Elsayed, M.S., Le-Khac, N.-A., Dev, S., and Jurcut, A.D. (September, January 31). Ddosnet: A Deep-Learning Model for Detecting Network Attacks. Proceedings of the 2020 IEEE 21st International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM), Cork, Ireland.","DOI":"10.1109\/WoWMoM49955.2020.00072"},{"key":"ref_140","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","article-title":"A Survey of Defense Mechanisms against Distributed Denial of Service (DDoS) Flooding Attacks","volume":"15","author":"Zargar","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_141","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MC.2017.201","article-title":"DDoS in the IoT: Mirai and Other Botnets","volume":"50","author":"Kolias","year":"2017","journal-title":"Computer"},{"key":"ref_142","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1145\/1151659.1159962","article-title":"Drafting behind Akamai (Travelocity-Based Detouring)","volume":"36","author":"Su","year":"2006","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_143","doi-asserted-by":"crossref","first-page":"2054","DOI":"10.1109\/JSYST.2019.2941759","article-title":"Cyber-Attacks in a Looped Energy-Water Nexus: An Inoculated Sub-Observer-Based Approach","volume":"14","author":"Khalid","year":"2020","journal-title":"IEEE Syst. J."},{"key":"ref_144","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.bjp.2013.10.014","article-title":"Combining OpenFlow and SFlow for an Effective and Scalable Anomaly Detection and Mitigation Mechanism on SDN Environments","volume":"62","author":"Giotis","year":"2014","journal-title":"Comput. Netw."},{"key":"ref_145","doi-asserted-by":"crossref","unstructured":"Lim, S., Ha, J., Kim, H., Kim, Y., and Yang, S. (2014, January 8\u201311). A SDN-Oriented DDoS Blocking Scheme for Botnet-Based Attacks. Proceedings of the 2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN), Shanghai, China.","DOI":"10.1109\/ICUFN.2014.6876752"},{"key":"ref_146","doi-asserted-by":"crossref","first-page":"144","DOI":"10.23919\/JCC.2019.07.012","article-title":"DDoS Attack Detection Scheme Based on Entropy and PSO-BP Neural Network in SDN","volume":"16","author":"Liu","year":"2019","journal-title":"China Commun."},{"key":"ref_147","doi-asserted-by":"crossref","unstructured":"Winter, P., Hermann, E., and Zeilinger, M. (2011, January 7\u201310). Inductive Intrusion Detection in Flow-Based Network Data Using One-Class Support Vector Machines. Proceedings of the 2011 4th IFIP International Conference on New Technologies, Mobility and Security, Paris, France.","DOI":"10.1109\/NTMS.2011.5720582"},{"key":"ref_148","unstructured":"Trung, V., Huong, T.T., Tuyen, V., Duc, D.M., Thanh, N.H., and Marshall, A. (2015, January 14\u201316). A Multi-Criteria-Based DDoS-Attack Prevention Solution Using Software Defined Networking. Proceedings of the 2015 International Conference on Advanced Technologies for Communications (ATC), Ho Chi Minh City, Vietnam."},{"key":"ref_149","doi-asserted-by":"crossref","unstructured":"Jadidi, Z., Muthukkumarasamy, V., Sithirasenan, E., and Sheikhan, M. (2013, January 8\u201311). Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm. Proceedings of the 33rd International Conference on Distributed Computing System, Philadelphia, PA, USA.","DOI":"10.1109\/ICDCSW.2013.40"},{"key":"ref_150","doi-asserted-by":"crossref","unstructured":"Niyaz, Q., Sun, W., and Javaid, A.Y. (2016). A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN). arXiv.","DOI":"10.4108\/eai.28-12-2017.153515"},{"key":"ref_151","doi-asserted-by":"crossref","unstructured":"Dawoud, A., Shahristani, S., and Raun, C. (2018, January 16\u201318). A Deep Learning Framework to Enhance Software Defined Networks Security. Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications Workshops: IEEE WAINA 2018, Krakow, Poland.","DOI":"10.1109\/WAINA.2018.00172"},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1109\/TSG.2016.2544854","article-title":"A Bayesian Algorithm to Enhance the Resilience of WAMS Applications Against Cyber Attacks","volume":"7","author":"Khalid","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_153","unstructured":"Team, M. (2022, August 26). Mininet an Instant Virtual Network on Your Laptop (or Other PC). Available online: https:\/\/ic.unicamp.br."},{"key":"ref_154","doi-asserted-by":"crossref","first-page":"4519","DOI":"10.1109\/TITS.2020.3027390","article-title":"Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach","volume":"22","author":"Shu","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_155","doi-asserted-by":"crossref","first-page":"2480","DOI":"10.1109\/TNSM.2020.3024225","article-title":"Experimental Review of Neural-Based Approaches for Network Intrusion Management","volume":"17","author":"Mauro","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_156","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/TMM.2019.2893549","article-title":"Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective","volume":"21","author":"Garg","year":"2019","journal-title":"IEEE Trans. Multimed."},{"key":"ref_157","doi-asserted-by":"crossref","unstructured":"Creech, G., and Hu, J. (2013, January 7\u201310). Generation of a New IDS Test Dataset: Time to Retire the KDD Collection. Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, China.","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"ref_158","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1080\/19393555.2015.1125974","article-title":"The Evaluation of Network Anomaly Detection Systems: Statistical Analysis of the UNSW-NB15 Data Set and the Comparison with the KDD99 Data Set","volume":"25","author":"Moustafa","year":"2016","journal-title":"Inf. Secur. J. A Glob. Perspect."},{"key":"ref_159","doi-asserted-by":"crossref","unstructured":"Lee, J., Pak, J., and Lee, M. (2020, January 21\u201323). Network Intrusion Detection System Using Feature Extraction Based on Deep Sparse Autoencoder. Proceedings of the 2020 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea.","DOI":"10.1109\/ICTC49870.2020.9289253"},{"key":"ref_160","doi-asserted-by":"crossref","first-page":"104216","DOI":"10.1016\/j.engappai.2021.104216","article-title":"Supervised Feature Selection Techniques in Network Intrusion Detection: A Critical Review","volume":"101","author":"Mauro","year":"2021","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_161","unstructured":"Coates, A., Ng, A., and Lee, H. (2011, January 11\u201313). An Analysis of Single-Layer Networks in Unsupervised Feature Learning. Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics, Fort Lauderdale, FL, USA."},{"key":"ref_162","doi-asserted-by":"crossref","unstructured":"Lu, Y., Cohen, I., Zhou, X.S., and Tian, Q. (2007, January 25\u201329). Feature Selection Using Principal Feature Analysis. Proceedings of the Proceedings of the 15th ACM International Conference on Multimedia, Augsburg, Germany.","DOI":"10.1145\/1291233.1291297"},{"key":"ref_163","doi-asserted-by":"crossref","unstructured":"Eid, H.F., Salama, M.A., Hassanien, A.E., and Kim, T. (2011). Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification, Springer.","DOI":"10.1007\/978-3-642-27189-2_21"},{"key":"ref_164","unstructured":"Kloft, M., Brefeld, U., D\u00fcessel, P., Gehl, C., and Laskov, P. (2022, August 26). Automatic Feature Selection for Anomaly Detection. Available online: https:\/\/ml.cs.uni-kl.de\/publications\/aisec08-kloft.pdf."},{"key":"ref_165","doi-asserted-by":"crossref","unstructured":"Gogoi, P., Bhuyan, M.H., Bhattacharyya, D., and Kalita, J.K. (2012). Packet and Flow Based Network Intrusion Dataset, Springer.","DOI":"10.1007\/978-3-642-32129-0_34"},{"key":"ref_166","unstructured":"Axelsson, S. (1998). Research in Intrusion-Detection Systems: A Survey, Department of Computer Engineering, Chalmers. Technical Report 98-17."},{"key":"ref_167","doi-asserted-by":"crossref","unstructured":"Alom, M.Z., Bontupalli, V., and Taha, T.M. (2015, January 15\u201319). Intrusion Detection Using Deep Belief Networks. Proceedings of the 2015 National Aerospace and Electronics Conference (NAECON), Dayton, OH, USA.","DOI":"10.1109\/NAECON.2015.7443094"},{"key":"ref_168","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","article-title":"Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges","volume":"18","author":"Yan","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_169","doi-asserted-by":"crossref","unstructured":"Aburomman, A.A., and Reaz, M.B. (2016, January 14\u201316). Survey of Learning Methods in Intrusion Detection Systems. Proceedings of the 2016 International Conference on Advances in Electrical, Electronic and Systems Engineering (ICAEES), Putrajaya, Malaysia.","DOI":"10.1109\/ICAEES.2016.7888070"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/20\/7896\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:55:57Z","timestamp":1760144157000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/20\/7896"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,17]]},"references-count":169,"journal-issue":{"issue":"20","published-online":{"date-parts":[[2022,10]]}},"alternative-id":["s22207896"],"URL":"https:\/\/doi.org\/10.3390\/s22207896","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,17]]}}}