The Usage Analysis of Machine Learning Methods for Intrusion Detection in Software-Defined Networks

The Usage Analysis of Machine Learning Methods for Intrusion Detection in Software-Defined Networks

Derya Yiltas-Kaplan
ISBN13: 9781799877059|ISBN10: 1799877051|EISBN13: 9781799877486
DOI: 10.4018/978-1-7998-7705-9.ch045
Cite Chapter Cite Chapter

MLA

Yiltas-Kaplan, Derya. "The Usage Analysis of Machine Learning Methods for Intrusion Detection in Software-Defined Networks." Research Anthology on Artificial Intelligence Applications in Security, edited by Information Resources Management Association, IGI Global, 2021, pp. 959-975. https://doi.org/10.4018/978-1-7998-7705-9.ch045

APA

Yiltas-Kaplan, D. (2021). The Usage Analysis of Machine Learning Methods for Intrusion Detection in Software-Defined Networks. In I. Management Association (Ed.), Research Anthology on Artificial Intelligence Applications in Security (pp. 959-975). IGI Global. https://doi.org/10.4018/978-1-7998-7705-9.ch045

Chicago

Yiltas-Kaplan, Derya. "The Usage Analysis of Machine Learning Methods for Intrusion Detection in Software-Defined Networks." In Research Anthology on Artificial Intelligence Applications in Security, edited by Information Resources Management Association, 959-975. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-7705-9.ch045

Export Reference

Mendeley
Favorite

Abstract

This chapter focuses on the process of the machine learning with considering the architecture of software-defined networks (SDNs) and their security mechanisms. In general, machine learning has been studied widely in traditional network problems, but recently there have been a limited number of studies in the literature that connect SDN security and machine learning approaches. The main reason of this situation is that the structure of SDN has emerged newly and become different from the traditional networks. These structural variances are also summarized and compared in this chapter. After the main properties of the network architectures, several intrusion detection studies on SDN are introduced and analyzed according to their advantages and disadvantages. Upon this schedule, this chapter also aims to be the first organized guide that presents the referenced studies on the SDN security and artificial intelligence together.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.