{"id":"https://openalex.org/W2612558585","doi":"https://doi.org/10.1109/nfv-sdn.2016.7919493","title":"Predicting network attack patterns in SDN using machine learning approach","display_name":"Predicting network attack patterns in SDN using machine learning approach","publication_year":2016,"publication_date":"2016-11-01","ids":{"openalex":"https://openalex.org/W2612558585","doi":"https://doi.org/10.1109/nfv-sdn.2016.7919493","mag":"2612558585"},"language":"en","primary_location":{"id":"doi:10.1109/nfv-sdn.2016.7919493","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nfv-sdn.2016.7919493","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073552268","display_name":"Saurav Nanda","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Saurav Nanda","raw_affiliation_strings":["Deparment of Computer and Information Technology, Purdue University, West Lafayette, IN"],"affiliations":[{"raw_affiliation_string":"Deparment of Computer and Information Technology, Purdue University, West Lafayette, IN","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022512709","display_name":"Faheem Zafari","orcid":"https://orcid.org/0000-0002-6793-1745"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Faheem Zafari","raw_affiliation_strings":["Deparment of Computer and Information Technology, Purdue University, West Lafayette, IN"],"affiliations":[{"raw_affiliation_string":"Deparment of Computer and Information Technology, Purdue University, West Lafayette, IN","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050873803","display_name":"Casimer DeCusatis","orcid":"https://orcid.org/0000-0002-6181-6594"},"institutions":[{"id":"https://openalex.org/I926137907","display_name":"Marist College","ror":"https://ror.org/04wx3x242","country_code":"US","type":"education","lineage":["https://openalex.org/I926137907"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Casimer DeCusatis","raw_affiliation_strings":["Marist College, School of Computer Science and Mathematics, Poughkeepsie, NY"],"affiliations":[{"raw_affiliation_string":"Marist College, School of Computer Science and Mathematics, Poughkeepsie, NY","institution_ids":["https://openalex.org/I926137907"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004584555","display_name":"Eric Wedaa","orcid":null},"institutions":[{"id":"https://openalex.org/I926137907","display_name":"Marist College","ror":"https://ror.org/04wx3x242","country_code":"US","type":"education","lineage":["https://openalex.org/I926137907"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eric Wedaa","raw_affiliation_strings":["Information Technology Marist College, Poughkeepsie, NY"],"affiliations":[{"raw_affiliation_string":"Information Technology Marist College, Poughkeepsie, NY","institution_ids":["https://openalex.org/I926137907"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089355143","display_name":"Baijian Yang","orcid":"https://orcid.org/0000-0003-4440-3701"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Baijian Yang","raw_affiliation_strings":["Deparment of Computer and Information Technology, Purdue University, West Lafayette, IN"],"affiliations":[{"raw_affiliation_string":"Deparment of Computer and Information Technology, Purdue University, West Lafayette, IN","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5073552268"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":11.5389,"has_fulltext":false,"cited_by_count":160,"citation_normalized_percentile":{"value":0.98651809,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"167","last_page":"172"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8262661099433899},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.6070356965065002},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.6033839583396912},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5833600759506226},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5263215899467468},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.5089869499206543},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5049815773963928},{"id":"https://openalex.org/keywords/blocking","display_name":"Blocking (statistics)","score":0.47083544731140137},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4566574990749359},{"id":"https://openalex.org/keywords/bayesian-network","display_name":"Bayesian network","score":0.45645424723625183},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.45526057481765747},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4518054723739624},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4427621364593506},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.42675384879112244},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4217529892921448},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.4140339493751526},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3676351308822632},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2195541262626648},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.182689368724823},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.16904869675636292},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16480332612991333}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8262661099433899},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.6070356965065002},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.6033839583396912},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5833600759506226},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5263215899467468},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.5089869499206543},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5049815773963928},{"id":"https://openalex.org/C144745244","wikidata":"https://www.wikidata.org/wiki/Q4927286","display_name":"Blocking (statistics)","level":2,"score":0.47083544731140137},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4566574990749359},{"id":"https://openalex.org/C33724603","wikidata":"https://www.wikidata.org/wiki/Q812540","display_name":"Bayesian network","level":2,"score":0.45645424723625183},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.45526057481765747},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4518054723739624},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4427621364593506},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.42675384879112244},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4217529892921448},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.4140339493751526},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3676351308822632},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2195541262626648},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.182689368724823},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.16904869675636292},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16480332612991333},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/nfv-sdn.2016.7919493","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nfv-sdn.2016.7919493","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1570448133","https://openalex.org/W1630964756","https://openalex.org/W1873332500","https://openalex.org/W1972427747","https://openalex.org/W2007111180","https://openalex.org/W2016931528","https://openalex.org/W2035549557","https://openalex.org/W2037998200","https://openalex.org/W2061519380","https://openalex.org/W2069841875","https://openalex.org/W2087968523","https://openalex.org/W2113251471","https://openalex.org/W2125560635","https://openalex.org/W2126822952","https://openalex.org/W2137900839","https://openalex.org/W2150093579","https://openalex.org/W2151629867","https://openalex.org/W2171265988","https://openalex.org/W2318029894","https://openalex.org/W2963331194","https://openalex.org/W4220749221","https://openalex.org/W4231184172","https://openalex.org/W4297792526","https://openalex.org/W6636614058","https://openalex.org/W6640453930","https://openalex.org/W6677000993"],"related_works":["https://openalex.org/W2767068794","https://openalex.org/W4229489764","https://openalex.org/W3114854705","https://openalex.org/W2735897973","https://openalex.org/W4315705477","https://openalex.org/W4213341501","https://openalex.org/W1543555101","https://openalex.org/W3195575042","https://openalex.org/W2898113880","https://openalex.org/W2793567886"],"abstract_inverted_index":{"An":[0],"experimental":[1],"setup":[2],"of":[3,38,57,97,114,186],"32":[4],"honeypots":[5],"reported":[6],"17M":[7],"login":[8,98],"attempts":[9,99],"originating":[10],"from":[11],"112":[12],"different":[13],"countries":[14],"and":[15,26,78,93,146,164],"over":[16],"6000":[17],"distinct":[18],"source":[19,101],"IP":[20,102,119],"addresses.":[21],"Due":[22],"to":[23,63,75,91,140,166],"decoupled":[24],"control":[25],"data":[27,71],"plane,":[28],"Software":[29],"Defined":[30],"Networks":[31],"(SDN)":[32],"can":[33,72],"handle":[34],"these":[35,106],"increasing":[36],"number":[37,96],"attacks":[39,115],"by":[40,122],"blocking":[41],"those":[42],"network":[43,66,69,137],"connections":[44,145],"at":[45],"the":[46,50,55,60,80,95,142,168,176],"switch":[47],"level.":[48],"However,":[49,105],"challenge":[51],"lies":[52],"in":[53],"defining":[54],"set":[56],"rules":[58],"on":[59,135,175],"SDN":[61],"controller":[62],"block":[64,79],"malicious":[65,81,144],"connections.":[67,82],"Historical":[68],"attack":[70,138,148],"be":[73,172],"used":[74,121],"automatically":[76],"identify":[77,141],"There":[83],"are":[84],"a":[85,112],"few":[86],"existing":[87],"open-source":[88],"software":[89],"tools":[90],"monitor":[92],"limit":[94],"per":[100],"address":[103],"one-by-one.":[104],"solutions":[107],"cannot":[108],"efficiently":[109],"act":[110],"against":[111],"chain":[113],"that":[116,170,182],"comprises":[117],"multiple":[118],"addresses":[120],"each":[123],"attacker.":[124],"In":[125],"this":[126],"paper,":[127],"we":[128],"propose":[129],"using":[130,190],"machine":[131,154],"learning":[132,155],"algorithms,":[133],"trained":[134],"historical":[136,177],"data,":[139],"potential":[143,147],"destinations.":[149],"We":[150],"use":[151],"four":[152],"widely-known":[153],"algorithms:":[156],"C4.5,":[157],"Bayesian":[158,191],"Network":[159],"(BayesNet),":[160],"Decision":[161],"Table":[162],"(DT),":[163],"Naive-Bayes":[165],"predict":[167],"host":[169],"will":[171],"attacked":[173],"based":[174],"data.":[178],"Experimental":[179],"results":[180],"show":[181],"average":[183],"prediction":[184],"accuracy":[185],"91.68%":[187],"is":[188],"attained":[189],"Networks.":[192]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":20},{"year":2022,"cited_by_count":25},{"year":2021,"cited_by_count":27},{"year":2020,"cited_by_count":26},{"year":2019,"cited_by_count":18},{"year":2018,"cited_by_count":17},{"year":2017,"cited_by_count":3}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
