The Usage Analysis of Machine Learning Methods for Intrusion Detection in Software-Defined Networks

The Usage Analysis of Machine Learning Methods for Intrusion Detection in Software-Defined Networks

Derya Yiltas-Kaplan
ISBN13: 9781522573531|ISBN10: 1522573534|ISBN13 Softcover: 9781522586173|EISBN13: 9781522573548
DOI: 10.4018/978-1-5225-7353-1.ch005
Cite Chapter Cite Chapter

MLA

Yiltas-Kaplan, Derya. "The Usage Analysis of Machine Learning Methods for Intrusion Detection in Software-Defined Networks." Artificial Intelligence and Security Challenges in Emerging Networks, edited by Ryma Abassi, IGI Global, 2019, pp. 124-145. https://doi.org/10.4018/978-1-5225-7353-1.ch005

APA

Yiltas-Kaplan, D. (2019). The Usage Analysis of Machine Learning Methods for Intrusion Detection in Software-Defined Networks. In R. Abassi (Ed.), Artificial Intelligence and Security Challenges in Emerging Networks (pp. 124-145). IGI Global. https://doi.org/10.4018/978-1-5225-7353-1.ch005

Chicago

Yiltas-Kaplan, Derya. "The Usage Analysis of Machine Learning Methods for Intrusion Detection in Software-Defined Networks." In Artificial Intelligence and Security Challenges in Emerging Networks, edited by Ryma Abassi, 124-145. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7353-1.ch005

Export Reference

Mendeley
Favorite

Abstract

This chapter focuses on the process of the machine learning with considering the architecture of software-defined networks (SDNs) and their security mechanisms. In general, machine learning has been studied widely in traditional network problems, but recently there have been a limited number of studies in the literature that connect SDN security and machine learning approaches. The main reason of this situation is that the structure of SDN has emerged newly and become different from the traditional networks. These structural variances are also summarized and compared in this chapter. After the main properties of the network architectures, several intrusion detection studies on SDN are introduced and analyzed according to their advantages and disadvantages. Upon this schedule, this chapter also aims to be the first organized guide that presents the referenced studies on the SDN security and artificial intelligence together.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.