4.6 Review

Deep learning for the security of software-defined networks: a review

Publisher

SPRINGER
DOI: 10.1007/s10586-023-04069-9

Keywords

Software-defined networks; Network security; SDN security; Deep learning

Ask authors/readers for more resources

With the rapid growth in scale and complexity of networks, managing, maintaining, and optimizing them has become increasingly challenging. Software-Defined Networking (SDN) is widely adopted for managing large-scale networks due to its centralized control, global network view, and software-based traffic analysis. However, SDN is vulnerable to cyber attacks, especially certain types such as denial of service. Various attack mitigation strategies, including statistical, threshold-based, and Machine Learning (ML) methods, have been proposed. Among them, Deep Learning (DL)-based models have shown the best results by extracting complex relationships between input and output. This paper presents a comprehensive survey of the literature on the use of different DL algorithms for SDN security.
As the scale and complexity of networks grow rapidly, management, maintenance, and optimization of them are becoming increasingly challenging tasks for network administrators. Software-Defined Networking (SDN) was introduced to facilitate these tasks as it offers logically centralized control, a global view of the network, and software-based traffic analysis, thus, it is widely adopted of SDN to manage large-scale networks. On the other hand, SDN is not immune to cyber attacks. In fact, its centralized architecture makes it more vulnerable to certain types of attacks, such as denial of service. Various attack mitigation strategies are proposed to strengthen the security of SDNs including statistical, threshold-based, and Machine Learning (ML) methods. Among them, Deep Learning (DL)-based models attained the best results as they were able to extract the complex relationship between input parameters and output that could not be achieved with other solutions. Hence, this paper presents a comprehensive survey of the literature on the utilization of different DL algorithms for the security of SDN. We first explain the types of attacks that SDNs are exposed to, then present papers that applied DL to detect and/or mitigate these attacks. We further discuss the public datasets used to train DL models and evaluate their advantages and disadvantages. Finally, we share insights into future research directions to improve the efficiency of DL methods for SDN security.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available