Cite

Gereltsetseg ALTANGEREL and Mate TEJFEL. Study on emerging applications on data plane and optimization possibilities. arXiv preprint arXiv:2204.10186, 2022. Search in Google Scholar

Perekebode AMANGELE, Martin J. REED, Mays AL-NADAY, Nikolaos THOMOS, and Mateusz NOWAK. Hierarchical machine learning for iot anomaly detection in sdn. In 2019 International Conference on Information Technologies (InfoTech), pages 1–4, 2019. Search in Google Scholar

Elisa BERTINO and Nayeem ISLAM. Botnets and internet of things security. Computer, 50:76–79, 2017. Search in Google Scholar

Suman Sankar BHUNIA and Mohan GURUSAMY. Dynamic attack detection and mitigation in iot using sdn. In 2017 27th International telecommunication networks and applications conference (ITNAC), pages 1–6. IEEE, 2017. Search in Google Scholar

Pat BOSSHART, Dan DALY, Glen GIBB, Martin IZZARD, Nick McKEOWN, Jennifer REXFORD, Cole SCHLESINGER, Dan TALAYCO, Amin VAHDAT, George VARGHESE, and David WALKER. P4: Programming protocol-independent packet processors. Computer Communication Review, 44(3):87–95, 2014. Search in Google Scholar

Rodrigo BRAGA, Edjard MOTA, and Alexandre PASSITO. Lightweight ddos flooding attack detection using nox/openflow. In IEEE Local Computer Network Conference, pages 408–415, 2010. Search in Google Scholar

Debasrita CHAKRABORTY, Vaasudev NARAYANAN, and Ashish GHOSH. Integration of deep feature extraction and ensemble learning for outlier detection. Pattern Recognition, 89:161–171, 2019. Search in Google Scholar

Sharon EZEKIEL, Dinil Mon DIVAKARAN, and Mohan GURUSAMY. Dynamic attack mitigation using SDN. 2017 27th International Telecommunication Networks and Applications Conference, ITNAC 2017, 2017-Janua:1–6, 2017. Search in Google Scholar

Kostas GIOTIS, Georgios ANDROULIDAKIS, and Vasilis MAGLARIS. Leveraging sdn for efficient anomaly detection and mitigation on legacy networks. In 2014 Third European Workshop on Software Defined Networks, pages 85–90, 2014. Search in Google Scholar

Jiuxiang GU, Zhenhua WANG, Jason KUEN, Lianyang MA, Amir SHAHROUDY, Bing SHUAI, Ting LIU, Xingxing WANG, Gang WANG, Jianfei CAI, and Tsuhan CHEN. Recent advances in convolutional neural networks. Pattern Recognition, 77:354–377, 2018. Search in Google Scholar

Zhiling GUO, Qi CHEN, Guangming WU, Yongwei XU, Ryosuke SHIBASAKI, and Xiaowei SHAO. Village building identification based on Ensemble Convolutional Neural Networks. Sensors (Switzerland), 17(11):1–22, 2017. Search in Google Scholar

Ayyoob HAMZA, Hassan Habibi GHARAKHEILI, Theophilus A BENSON, and Vijay SIVARAMAN. Detecting volumetric attacks on lot devices via sdn-based monitoring of mud activity. In Proceedings of the 2019 ACM Symposium on SDN Research, pages 36–48, 2019. Search in Google Scholar

MAHMUDUL Hasan, Md MILON Islam, Md ISHRAK Islam Zarif, and MMA HASHEM. Attack and anomaly detection in iot sensors in iot sites using machine learning approaches. Internet of Things, 7:100059, 2019. Search in Google Scholar

Daojing HE, Sammy CHAN, Xiejun NI, and Mohsen GUIZANI. Software-defined-networking-enabled traffic anomaly detection and mitigation. IEEE Internet of Things Journal, 4(6):1890–1898, 2017. Search in Google Scholar

Alexandre DA SILVEIRA ILHA, Angelo Cardoso LAPOLLI, Jonatas Adilson MARQUES, and Luciano Paschoal GASPARY. Euclid: A Fully In-Network, P4-Based Approach for Real-Time DDoS Attack Detection and Mitigation. IEEE Transactions on Network and Service Management, 18(3):3121–3139, 2021. Search in Google Scholar

Qiao KANG, Jiarong XING, and Ang CHEN. Automated attack discovery in data plane systems. 12th USENIX Workshop on Cyber Security Experimentation and Test, CSE T 2019, co-located with USENIX Security 2019, 2019. Search in Google Scholar

Changhoon KIM, Anirudh SVARAMAN, Naga KATTA, Antonin BAS, Advait DIXIT, Lawrence J WOBKER, and Barefoot NETWORKS. In-band Network Telemetry via Programmable Dataplanes. Sosr, (Figure 2):2–3, 2015. Search in Google Scholar

Diederik P. KINGMA and Jimmy Lei BA. Adam: A method for stochastic optimization. 3rd International Conference on Learning Representations, ICLR 2015 - Conference Track Proceedings, pages 1–15, 2015. Search in Google Scholar

Constantinos KOLIAS, Georgios KAMBOURAKIS, Angelos STAVROU, and Jeffrey VOAS. Ddos in the iot: Mirai and other botnets. Computer, 50(7):80–84, 2017. Search in Google Scholar

Nickolaos KORONIOTIS, Nour MOUSTAFA, Elena SITNIKOVA, and Benjamin TURNBULL. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Botiot dataset. Future Generation Computer Systems, 100:779–796, 2019. Search in Google Scholar

Yair MEIDAN, Michael BOHADANA, Yael MATHOV, Yisroel MIRSKY, Asaf SHABTAI, Dominik BREITENBACHER, and Yuval ELOVICI. N-baiot—network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing, 17(3):12–22, 2018. Search in Google Scholar

Francesco MUSUMECI, Ali Can FIDANCI, Francesco PAOLUCCI, Filippo CUGINI, and Massimo TORNATORE. Machine-Learning-Enabled DDoS Attacks Detection in P4 Programmable Networks. Journal of Network and Systems Management, 30(1), 2022. Search in Google Scholar

Sukhyun NAM, Jiyoon LIM, Jae Hyoung YOO, and James Won Ki HONG. Network Anomaly Detection Based on In-band Network Telemetry with RNN. 2020 IEEE International Conference on Consumer Electronics - Asia, ICCE-Asia 2020, 2020. Search in Google Scholar

Thien Duc NGUYEN, Samuel MARCHAL, Markus MIETTINEN, Hossein FEREIDOONI, N. ASOKAN, and Ahmad-Reza SADEGHI. DÏot: A federated self-learning anomaly detection system for iot. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pages 756–767, 2019. Search in Google Scholar

Bruno Astuto A. NUNES, Marc MENDONCA, Xuan-Nam NGUYEN, Katia OBRACZKA, and Thierry TURLETTI. A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Communications Surveys Tutorials, 16(3):1617–1634, 2014. Search in Google Scholar

M. B. I REAZ. Artificial Intelligence Techniques for Advanced Computing Applications, volume 6. 2013. Search in Google Scholar

Archit SANGHI, Krishna P. KADIYALA, Praveen TAMMANA, and Saurabh JOSHI. Anomaly Detection in Data Plane Systems using Packet Execution Paths. In SPIN 2021 - Proceedings of the 2021 ACM SIGCOMM Workshop on Secure Programmable network INfrastructure, number 1, pages 9–15, 2021. Search in Google Scholar

Mohanad SARHAN, Siamak LAYEGHY, Nour MOUSTAFA, and Marius PORTMANN. NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 371 LNICST(November):117–135, 2021. Search in Google Scholar

Huasong SHAN, Qingyang WANG, and Qiben YAN. Very short intermittent ddos attacks in an unsaturated system. 4 2018. Search in Google Scholar

Valentina TIMČENKO and Slavko GAJIN. Machine learning based network anomaly detection for iot environments. In ICIST-2018 conference, 2018. Search in Google Scholar

Enkhtur TSOGBAATAR, Monowar H. BHUYAN, Yuzo TAENAKA, Doudou FALL, Khishigjargal GONCHIGSUMLAA, Erik ELMROTH, and Youki KADOBAYASHI. DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT. Internet of Things, 14(March):100391, 2021. Search in Google Scholar

Nguyen Van TU, Jonghwan HYUN, Ga Yeon KIM, Jae Hyoung YOO, and James Won Ki HONG. INT-Collector: A High-performance Collector for In-band Network Telemetry. 14th International Conference on Network and Service Management, pages 10–18, 2018. Search in Google Scholar

Ying ZHANG. An adaptive flow counting method for anomaly detection in sdn. In Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies, CoNEXT ’13, page 25–30, New York, NY, USA, 2013. Association for Computing Machinery. Search in Google Scholar

eISSN:
1338-3957
Language:
English