{"id":"https://openalex.org/W3168165348","doi":"https://doi.org/10.1109/syscon48628.2021.9447092","title":"Anomaly Detection Technique for Intrusion Detection in SDN Environment using Continuous Data Stream Machine Learning Algorithms","display_name":"Anomaly Detection Technique for Intrusion Detection in SDN Environment using Continuous Data Stream Machine Learning Algorithms","publication_year":2021,"publication_date":"2021-04-15","ids":{"openalex":"https://openalex.org/W3168165348","doi":"https://doi.org/10.1109/syscon48628.2021.9447092","mag":"3168165348"},"language":"en","primary_location":{"id":"doi:10.1109/syscon48628.2021.9447092","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon48628.2021.9447092","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109845902","display_name":"Admilson de Ribamar Lima Ribeiro","orcid":null},"institutions":[{"id":"https://openalex.org/I190085865","display_name":"Universidade Federal de Sergipe","ror":"https://ror.org/028ka0n85","country_code":"BR","type":"education","lineage":["https://openalex.org/I190085865"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Admilson de Ribamar Lima Ribeiro","raw_affiliation_strings":["Federal University of Sergipe, UFS, S\u00e3o Crist\u00f3v\u00e3o, Brazil"],"affiliations":[{"raw_affiliation_string":"Federal University of Sergipe, UFS, S\u00e3o Crist\u00f3v\u00e3o, Brazil","institution_ids":["https://openalex.org/I190085865"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037023801","display_name":"Reneilson Santos","orcid":"https://orcid.org/0000-0001-9328-9744"},"institutions":[{"id":"https://openalex.org/I190085865","display_name":"Universidade Federal de Sergipe","ror":"https://ror.org/028ka0n85","country_code":"BR","type":"education","lineage":["https://openalex.org/I190085865"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Reneilson Yves Carvalho Santos","raw_affiliation_strings":["Federal University of Sergipe, UFS, S\u00e3o Crist\u00f3v\u00e3o, Brazil"],"affiliations":[{"raw_affiliation_string":"Federal University of Sergipe, UFS, S\u00e3o Crist\u00f3v\u00e3o, Brazil","institution_ids":["https://openalex.org/I190085865"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070505291","display_name":"Anderson C. A. Nascimento","orcid":"https://orcid.org/0000-0002-8298-6250"},"institutions":[{"id":"https://openalex.org/I4210150356","display_name":"University of Washington Tacoma","ror":"https://ror.org/05n8t2628","country_code":"US","type":"education","lineage":["https://openalex.org/I201448701","https://openalex.org/I4210150356"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anderson Clayton Alves Nascimento","raw_affiliation_strings":["Institute of Technology, University of Washington Tacoma, Tacoma, Washington"],"affiliations":[{"raw_affiliation_string":"Institute of Technology, University of Washington Tacoma, Tacoma, Washington","institution_ids":["https://openalex.org/I4210150356"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5109845902"],"corresponding_institution_ids":["https://openalex.org/I190085865"],"apc_list":null,"apc_paid":null,"fwci":1.5281,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.83252463,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.806903600692749},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7335745096206665},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7235840559005737},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6945750713348389},{"id":"https://openalex.org/keywords/internet-control-message-protocol","display_name":"Internet Control Message Protocol","score":0.6437735557556152},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.6334053874015808},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3950776755809784},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3493545353412628},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.2655676603317261},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2552778124809265},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2488342523574829},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.15143665671348572},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11924007534980774}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.806903600692749},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7335745096206665},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7235840559005737},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6945750713348389},{"id":"https://openalex.org/C195219913","wikidata":"https://www.wikidata.org/wiki/Q13162","display_name":"Internet Control Message Protocol","level":3,"score":0.6437735557556152},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.6334053874015808},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3950776755809784},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3493545353412628},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.2655676603317261},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2552778124809265},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2488342523574829},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.15143665671348572},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11924007534980774},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/syscon48628.2021.9447092","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon48628.2021.9447092","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1555576437","https://openalex.org/W1561447113","https://openalex.org/W1975936173","https://openalex.org/W1985987493","https://openalex.org/W1988774297","https://openalex.org/W1995995106","https://openalex.org/W2037693158","https://openalex.org/W2040340473","https://openalex.org/W2054181184","https://openalex.org/W2063955498","https://openalex.org/W2122646361","https://openalex.org/W2147118406","https://openalex.org/W2163375756","https://openalex.org/W2245787472","https://openalex.org/W2276629685","https://openalex.org/W2548015322","https://openalex.org/W2606138355","https://openalex.org/W3170930805","https://openalex.org/W6633114986","https://openalex.org/W6660333570","https://openalex.org/W6735936941","https://openalex.org/W6796823923"],"related_works":["https://openalex.org/W2376613537","https://openalex.org/W3076649823","https://openalex.org/W1994311829","https://openalex.org/W2969677719","https://openalex.org/W4312258000","https://openalex.org/W2168801335","https://openalex.org/W2278600692","https://openalex.org/W2886398423","https://openalex.org/W3177384695","https://openalex.org/W3009355147"],"abstract_inverted_index":{"Software":[0],"Defined":[1],"Networks":[2],"(SDN)":[3],"present":[4,42,77],"some":[5,18],"security":[6,20],"weakness":[7],"due":[8,56],"to":[9,25,45,57,101,152,185,200],"the":[10,43,58,103,120,136,153,169,172,175,202,215,232,238,241],"separation":[11],"between":[12,171],"control":[13],"and":[14,41,141,174,188,224],"data":[15,89],"planes.":[16],"Thus,":[17,72],"operational":[19],"mechanisms":[21],"have":[22,123],"been":[23],"designed":[24],"deal":[26],"with":[27],"malicious":[28,48],"code":[29],"in":[30,73,94],"SDN.":[31,155],"However,":[32],"most":[33],"of":[34,60,69,127,138,146,162,205,240],"those":[35],"approaches":[36,53,81],"require":[37],"a":[38,95,125,149],"signature":[39],"basis":[40],"inability":[44],"anticipate":[46],"novel":[47],"activity.":[49],"Other":[50],"anomaly":[51,79,111],"based":[52,80,112],"are":[54,159],"inefficient":[55],"possibility":[59],"an":[61,78,110],"attacker":[62],"simulates":[63],"legitimate":[64],"traffic,":[65],"which":[66],"causes":[67],"lots":[68],"false":[70],"alarms.":[71],"this":[74],"paper,":[75],"we":[76,122,212],"that":[82,106,134,214],"uses":[83],"machine":[84,115],"learning":[85,116],"algorithms":[86],"over":[87],"continuous":[88],"stream":[90],"for":[91,227],"intrusion":[92],"detection":[93],"SDN":[96],"environment.":[97],"Our":[98],"approach":[99],"is":[100,191],"overcome":[102],"main":[104],"challenges":[105],"happen":[107],"when":[108],"developing":[109],"system":[113],"using":[114],"algorithms.":[117],"For":[118],"characterising":[119],"anomalies,":[121],"analysed":[124],"type":[126,145],"DDoS":[128,229],"attack":[129,133,147,167,198],"classified":[130],"as":[131],"infrastructure":[132],"considers":[135],"impact":[137],"both":[139],"bandwidth":[140,165],"resource":[142,196],"depletions.":[143],"This":[144],"imposes":[148],"high":[150],"affect":[151],"whole":[154],"In":[156],"fact,":[157],"there":[158],"two":[160],"types":[161],"attacks.":[163],"The":[164,195],"depletion":[166,197],"targets":[168],"channel":[170],"switches":[173,206],"controller":[176],"through":[177,192,207],"either":[178],"UDP":[179],"or":[180],"HTTP":[181],"flooding.":[182,194,209],"Another":[183],"way":[184],"exhaust":[186,201],"outgoing":[187],"ingoing":[189],"bandwidths":[190],"ICMP":[193],"attempts":[199],"flow":[203],"table":[204],"SYN":[208],"From":[210],"experiments,":[211],"notice":[213],"solution":[216],"obtains":[217],"97.83%":[218],"accuracy,":[219],"99%":[220],"recall,":[221],"80%":[222],"precision":[223],"2.3%":[225],"FPR":[226],"10%":[228],"attacks":[230],"on":[231],"normal":[233],"traffic.":[234],"These":[235],"results":[236],"show":[237],"effectiveness":[239],"proposed":[242],"technique.":[243]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
