Mobile QR Code QR CODE

  1. (Escuela Profesional de Ingenieria de Sistemas, Universidad Autonoma del Peru / Lima, Peru {aaparcana, jgamboa}@autonoma.edu.pe )



Machine learning (ML), Management, Software-defined networks (SDN), Systematic literature review (SLR)

1. Introduction

The Software-Defined Networking (SDN) paradigm has emerged as a response to the inability of today's networks to maintain a global view of network elements [87]. SDN enables innovation and programmability through a centralized structure, which in turn provides global-view data that can be used by different algorithms [89]. Many technologies have been used to improve various aspects of management in software-defined networks, and one of the most important is Machine Learning (ML) [89]. With these techniques, networks become smarter, more autonomous, and more efficient in improving the utilization and optimization of network resources [88].

Research linking two variables has increased in the last five years. This makes it necessary to have a systematic literature review that brings together this research and answers the right questions for researchers in the area, as well as comparing it with similar works. Thus, a systematic literature review was done to analyze ML and its influence on SDN management.

The paper is structured as follows. Section 2 presents a summary of the concepts used and related works that serve as a comparison with the present study. Section 3 explains the methodology used for the systematic literature review based on Kitchenham’s guidelines [82] and the PRISMA guidelines. Section 4 analyzes and compares the results obtained with those of other researchers. Finally, Section 5 presents the conclusions of the study and guidelines for future research.

2. Background and Related Works

In the process of systematic literature review, the search for review papers was replicated to compare the results obtained. However, in many of the cases, the papers did not make very broad explorations of areas within the software-defined networks, so the comparisons could not be made completely. The studies were focused on certain areas applicable to software-defined networks. However, they were not limited to studies in this paradigm of networks. Also, these studies present descriptive questions that are much simpler than the analytics presented in this paper. It is important to highlight that these investigations were from 2019 onward, so the growing demand for these papers still leaves room for future research.

In 2019, Öney and Peker [86] published a review on only techniques based on neural networks and their influence on Intrusion Detection Systems (IDS). The results of this research were mainly that the most used technique to deal with IDS was deep neural networks, and the main database was KDD'99. Then, in 2020, Amarudin, Ferdiana, and Widyawan [85] published a study that also focused on IDSs for network security and analyzed the papers related to techniques in ML. As a result, the SVM technique was the most used to give IDS solutions, and 87 % of the ML techniques studied were classification techniques.

In the year 2021, there were two important studies prepared by Nassif et al. [83,84], who deeply studied the techniques of ML and the application for anomaly detection and security in the Cloud, respectively. The first paper [84] highlights increasing research in the area in recent years. The date range used by the authors was 20 years. It also highlighted that the SVM technique is the most used for anomaly detection but that unsupervised techniques are the most abundant among researchers.

The second study [83] extended the studies to cloud security. They highlight that in this field, DDoS attacks are the most common and also reaffirm that SVM is the most used technique in the literature. They particularly mention that KDD and KDD CUP'99 are the most commonly used databases to enter algorithms. They recommend that researchers include data selection and extraction strategies in the systematic reviews consulted. Finally, they also recommend conducting research in this area.

The contribution of this work is to expand knowledge and analyze ML techniques for DN Management. In the present study, the following contributions are made. The search equations follow strict PRISMA guidelines to answer the research questions, the search sources are specialized and include peer-reviewed articles, and the author makes use of the Research Assistant Joshua (RAj) tool, an intelligent assistant developed by Gamboa-Cruzado. RAj makes use of the TextBlob release for sentiment analysis. Polarity refers to the feeling of the text, where -1.0 is a text written in a very negative way, 0.0 is neutral, and 1.0 is very positive. Objectivity refers to how the text is written, where 0.0 is given to a text written entirely based on facts, and 1.0 is given to a text written entirely based on opinions and personal feelings [90].

3. Methodology

The methodology of the systematic review of literature takes into account the work of Kitchenham [82]. The methodology defines research phases and techniques involving research problems and objectives, search sources and search strategies, identified studies, exclusion criteria, paper selection, quality assessment, data extraction strategy, and finally, data synthesis.

3.1 Research Problems and Objectives

Identifying research questions and objectives is an essential procedure in the systematic literature review process because it is necessary for the following steps: search strategy planning, data extraction, and data analysis. Table 1 shows a table with the research questions and their related objectives.

Table 1. Research questions and objectives.

Research Question

Objectives

RQ1: Who are the most productive authors in ML development?

Identify the most productive authors in ML development

RQ2: What are the most cited articles on ML and its influence on software-defined network management whose discussions and conclusions are characterized by their objectivity and polarity?

Identify the most cited articles on ML and its influence on software-defined network management whose discussions and conclusions are characterized by their objectivity and polarity

RQ3: Who are the authors who are frequently Co-authors in research on ML and its influence on software-defined network management?

Determine the authors who are often co-authors in research on ML and its influence on software-defined network management

RQ4: What are the keywords that frequently present cooccurrence in ML research and its influence on software-defined network management?

Identify the Keywords that frequently present cooccurrence in ML research and its influence on software-defined network management

3.2 Search Sources and Search Strategies

Scientific data sources were chosen to provide research papers focused on engineering, which were used to find the papers relevant to the study. The sources were Taylor & Francis, IEEE Xplore, Springer Link, Scopus, Science Direct, Wiley Online Library, ACM Digital Library, and ProQuest. The search strategy requires the identification of descriptors related to the independent and dependent variables. Table 2 shows the descriptors, which make use of synonyms separated by "/" to expand and consider similar papers that do not have nomenclatures equal to those of the study. The search procedure was carried out using search equations that strictly respect the syntax of the chosen data sources. These are shown in Table 3.

Table 2. Search descriptors.

Descriptor

Variable

Machine learning / ML

Independent

Network management / management

Dependent

Software-defined networks / SDN

Methodology / Method / Model

Table 3. Sources and search equations.

Sources

Search equation

Taylor & Francis

[[All: "machine learning"] OR [All: ml]] AND [[All: management] OR [All: "network management"]] AND [[All: "software-defined network"] OR [All: sdn]] AND [[All: methodology] OR [All: method] OR [All: model]]

IEEE Xplore

(("Full Text & Metadata":"Machine Learning") OR ("Full Text & Metadata":ML)) AND (("Full Text & Metadata":Management) OR ("Full Text & Metadata":"Network Management")) AND (("Full Text & Metadata":"Software-Defined Network") OR ("Full Text & Metadata":SDN)) AND (("Full Text & Metadata":Methodology) OR ("Full Text & Metadata":Method) OR ("Full Text & Metadata":Model))

Springer Link

("Machine Learning" OR ML) AND (Management OR "Network Management") AND ("Software-Defined Network" OR SDN) AND (Methodology OR Method OR Model)

Scopus

ALL ( ( "Machine Learning" OR ML ) AND ( Management OR "Network Management" ) AND ( "Software-Defined Network" OR SDN ) AND ( Methodology OR Method OR Model ) )

Science Direct

("Machine Learning" OR ML) AND (Management OR "Network Management") AND ("Software-Defined Network" OR SDN) AND (Methodology OR Method OR Model)

Wiley Online Library

""Machine Learning" OR ML" anywhere and "Management OR "Network Management"" anywhere and ""Software-Defined Network" OR SDN" anywhere and "Methodology OR Method OR Model" anywhere

ACM Digital Library

[[All: "machine learning"] OR [All: ml]] AND [[All: management] OR [All: "network management"]] AND [[All: "software-defined network"] OR [All: sdn]] AND [[All: methodology] OR [All: method] OR [All: model]]

ProQuest

("Machine Learning" OR ML) AND ( Management OR "Network Management" ) AND ( "Software-Defined Network" OR SDN ) AND ( Methodology OR Method OR Model)

3.3 Identified Studies

Once the search for research papers is complete, the results are presented in a diagram that includes the results from data sources and the total set of primary papers found. This is shown in Fig. 1.

3.4 Exclusion Criteria

Exclusion criteria were defined to filter the papers relevant to the research. Given the criteria below, the papers were filtered in the following order:

EC1. The items are older than 5 years.

EC2. Papers are not written in English.

EC3. Papers were not published in peer-reviewed conferences or journals.

EC4. Paper titles and keywords are not very suitable.

EC5. The proposed solution does not apply to software-defined network management.

Fig. 1. Number of studies identified.
../../Resources/ieie/IEIESPC.2022.11.6.400/fig1.png

EC6. The abstract of the papers is not very relevant.

EC7. The items are not unique.

EC8. The full text of the paper is not available.

3.5 Selection of Papers

The first results gave 21,743 papers based on the strategy described in section 3.2 using the descriptors of the study. The following selection and filtering steps were:

1) Applying exclusion criteria to guarantee relevant documents for the study

2) Applying quality assessments to include papers that give a clear answer to the given research questions

The results of the first step gave the 81 papers shown in Fig. 2 (PRISMA chart).

Fig. 2. Application of exclusion criteria.
../../Resources/ieie/IEIESPC.2022.11.6.400/fig2.png

3.6 Quality Assessment

Applying quality assessment was the second step described in section 3.5 to identify a final set of papers that were included in this systematic review. QAs have been applied to evaluate the quality of the papers. 7 QAs were selected, which are listed as follows:

QA1. Are the research objectives visibly identified in the paper?

QA2. Is the experiment appropriate and acceptable?

QA3. Does the paper explain the context in which the research was conducted?

QA4. Is the document well constituted?

QA5. Are the methods used to analyze the results timely?

QA6. Are the results of the experiment visibly identified and reported?

QA7. Is the document considered appropriate?

After an exhaustive review of the filtered papers, we verified the quality based on the criteria presented above to ensure their relevance within the objectives set out in section 3. It was concluded that all 81 studies met the quality criteria.

3.7 Data Extraction Strategy

A data collection structure was used where the necessary information is extracted to answer the research questions. The information extracted from each paper includes the following data: PAPER ID, title, URL, source, year, country, number of pages, language, type of paper, publication medium name, authors, affiliation, number of citations, abstract, keywords, sample size, RQ1, RQ2, RQ3, and RQ4. The Zotero software was used to obtain the data, as shown in Fig. 3.

Fig. 3. Document management with Zotero.
../../Resources/ieie/IEIESPC.2022.11.6.400/fig3.png

3.8 Data Synthesis

Finally, the data were collected, typed, and presented in figures and tables to make a visual analysis and a statistical comparison of the results obtained. These figures and tables answer each research question posed and show relevant findings from papers published during the last five years.

4. Results and Discussion

4.1 Study Overview

The selection ended with 81 research papers that were rigorously analyzed to obtain the relevant data for the study. The papers were selected considering the last five years; that is, papers from 2016 to the year of 2021. Fig. 4 shows the distribution of papers in these years, and the tendency to use ML techniques in the management of software-defined networks is growing. It is unavoidable that ML techniques are becoming increasingly important in research and development within the paradigm of software-defined networks.

Fig. 5 shows the location of the most relevant papers for the study. This figure allows researchers to define the countries that invest the most in research in software-defined networks by applying ML. The countries with the most research are China, the United States, and India with 15 (18.52 %), 14 (17.28 %), and 11 (13.58 %) publications, respectively. The selected papers also showed remarkable results in terms of the ML algorithms (Table 4) used by the researchers. Among these algorithms, Support Vector Machine (SVM), Naive Bayes, and Reinforcement Learning are the most popular with 14.4 %, 9.3 %, and 7.9 %, respectively.

Although it is not included as a research question, it is important to know what techniques are used in the reviewed papers. The review shows us that SVM is the most popular ML algorithm. This is partially confirmed in

Fig. 4. Papers per year.
../../Resources/ieie/IEIESPC.2022.11.6.400/fig4.png
Fig. 5. Georeferential map of publications by country.
../../Resources/ieie/IEIESPC.2022.11.6.400/fig5.png
Table 4. ML algorithms.

Algorithms

Reference

Qty. (%)

Support Vector Machine (SVM)

[1][2][5][7][13][15][16][17][18][20][25][31][38][41][42][43][44][45][47][49]

[51][56][57][59][63][65][66][69][72][73][81]

31 (14.4)

Naive Bayes (NB)

[1][2][5][18][22][38][40][43][45][48][49][59][60][61][64][65][66][69][72][78]

20

(9.3)

Reinforcement Learning (RL)

[6][7][11][14][19][21][28][33][34][52][53][54][55] [58][71][74][77]

17

(7.9)

Artificial Neural Networks (ANN)

[8][9][12][25][29][31][43][50][53][55][59][61] [69][72][73][75][76]

17

(7.9)

Random Forest (RF)

[17][25][26][27][31][35][38][48][51][59][60][61] [73][78][80][81]

16

(7.4)

Regression

[5][7][16][21][22][27][38][44][47][59][72][73][76] [81]

15

(7)

K-Nearest Neighborhood (KNN)

[2][7][18][25][38][43][44][49][50][51][59][61][65] [78]

14

(6.5)

Decision Tree (DT)

[5][7][15][22][27][38][43][48][50][59][60][66][67] [73]

14

(6.5)

Deep Neural Networks (DNN)

[10][16][21][23][30][39] [44][62][74]

9

(4.2)

Long-Short Term Memory (LSTM)

[3][4][21][30][44][46][62] [75]

8

(3.7)

Gated Recurrent Unit (GRU)

[30][36][37][44][54][55] [79]

7

(3.3)

J48

[1][31][51][60][72]

5 (2.3)

K-means

[3][17][56][68][70]

5

(2.3)

Convolutional Neural Network (CNN)

[30][39][44][75][79]

5

(2.3)

Recurrent Neural network (RNN)

[36][37][52][53]

4

(1.9)

Stacked Autoencoder (SAE)

[16][39][75][76]

4

(1.9)

Bayesian Neural Networks (BNN)

[7][22][24]

3

(1.4)

Extreme Gradient Boosting (XGBoost)

[27][50][61]

3

(1.4)

C4.5

[31][60][78]

3

(1.4)

Graph Neural Network (GNN)

[36][37]

2

(0.9)

Autoencoder (AE)

[63][65]

2

(0.9)

Extreme Learning Machine (ELM)

[23][43]

2

(0.9)

Deep Belief Network (DBN)

[32][76]

2

(0.9)

CART

[61][78]

2

(0.9)

One-Class SVM

[65]

1

(0.5)

Isolation Forest

[65]

1

(0.5)

Wavelet

[17]

1

(0.5)

Meta-Heuristic Bayesian Network Classifier

[41]

1

(0.5)

Random Undersampling Boosting (RUSBoost)

[67]

1

(0.5)

the reviews consulted since they do not focus on SDN only. According to Nassif, Talib, Nasir, and Dakalbab [84], for Anomaly Detection, SVM is the most popular ML technique. In another study on Cloud Security, the same authors [83] reveal that SVM is still the first technique. Amarudin, Ferdiana, and Widyawan [85] focused on IDSs and stated that SVM maintains the first place with the same number of studies. Finally, Öney and Peker [86] focused on IDSs with only Neural Network (NN) techniques contradict the results obtained, finding deep neural networks to have the largest number of studies.

4.2 Answers to Research Questions

RQ1: Who are the most productive authors in ML development?

Given the question asked, the study has done the task of finding the most productive authors in ML. Fig. 6 shows that Julong Lan and Yuxiang Hu are the most productive authors, both with 5 papers. Secondly, Penghao Sun and Zehua Guo have 4 items. It should be noted that the first two authors have the same papers, which were mostly indexed in Scopus. Likewise, the second place also has papers found in this data source, so these authors publish high-quality papers.

Undoubtedly, the most productive authors publish in data sources indexed in Scopus. The relationship between these authors is discussed in question RQ4. This answer fulfills the objective of identifying the authors with more products in the area but does not find review papers that have asked the same question.

RQ2: What are the most cited papers on ML and its influence on software-defined network management whose discussions and conclusions are characterized by their objectivity and polarity?

Based on this question, Fig. 7 shows the objectivity and polarity of the discussions and conclusions ordered by the most cited papers. It can be noted that the most cited paper is subjective and of positive polarity. Positive polarity means that the paper was written formally. Instead, the following papers are shown to be neutral in both their objectivity and polarity. The most cited papers are from the scientific data sources IEEE Xplore, Scopus, and ACM Digital Library. All papers are also shown in a graph of objectivity and polarity in Fig. 8.

The study finds that for this question most of the most cited papers are in the balance of these characteristics. These papers maintain a factual argument of their findings in their research, and they also write neutrally to the reader. The study determined the most cited papers and characterized them for their objectivity and polarity. No other review paper consulted contains any similar questions for comparison.

RQ3: Who are the authors who are frequently co-authors in research on ML and its influence on software-defined network management?

Authors who are often co-authors in research on ML and software-defined network management are shown visually with bibliometric networks in Fig. 9. The elaboration of these bibliometric networks was done while taking into account that authors and their co-authors carry out more research. Consequently, the authors who appear are also the most productive, as answered in RQ1. The figure mainly shows that Julong Lan and Yuxian Hu share the same publications (5). It is also appreciated that these authors carry out work together with other researchers, such as Penghao Sun sharing 7 papers through a network of researchers that link Junfei Li and Zehua Guo. They make up the strongest network of authors.

The present study presents graphs not found in the systematic reviews consulted. The graphs are bibliometric networks that visually show the strongest relationships between the authors, who are also the ones with the most publications. These authors are of Chinese origin and belong to the same research institutes.

RQ4: What are the Keywords that frequently present cooccurrence in ML research and its influence on software-defined network management?

To answer this question, two figures were elaborated. Fig. 10 shows that the most frequent keywords are "Machine Learning", "SDN", and as a complete concept, "Software-Defined Networking". This is mainly due to the rigorous selection of research variables. These more frequent keywords also show important connections. Fig. 11 shows bibliometric networks that relate the most important keywords. These networks show that "Machine Learning" has a strong relationship with "SDN" and "Software-Defined Networking". It also shows strong relationships with the most used ML techniques, as well as important concepts in SDN, such as the OpenFlow protocol and security.

The last question has also been answered by bibliometric networks that identify the strong relationships between the words "Machine Learning" and "Software-Defined Networks", or its more popular abbreviation, "SDN". These types of questions and graphical representations are also not found in the systematic reviews consulted.

Fig. 6. Most productive authors in ML.
../../Resources/ieie/IEIESPC.2022.11.6.400/fig6.png
Fig. 7. Most cited papers characterized by their objectivity and polarity.
../../Resources/ieie/IEIESPC.2022.11.6.400/fig7.png
Fig. 8. Papers in graph of objectivity and polarity.
../../Resources/ieie/IEIESPC.2022.11.6.400/fig8.png
Fig. 9. Bibliometric networks of authors.
../../Resources/ieie/IEIESPC.2022.11.6.400/fig9.png
Fig. 10. Most used keywords.
../../Resources/ieie/IEIESPC.2022.11.6.400/fig10.png
Fig. 11. Bibliometric network of keywords.
../../Resources/ieie/IEIESPC.2022.11.6.400/fig11.png

5. Conclusions and Future Research

The relationship between ML and its influence on software-defined network management has increased in the number of publications in the last five years. In this study, 81 papers were determined to contribute to the 4 research questions posed. These papers were chosen after a search in the most specialized scientific data sources on these topics: Taylor & Francis, IEEE Xplore, Springer Link, Scopus, Science Direct, Wiley Online Library, ACM Digital Library, and ProQuest. Exclusion and quality criteria were also applied to them through the adoption of Kitchenham’s guidelines [82], and together with the Zotero tool, the correct data can be extracted.

The results and discussion showed important findings. The most productive countries are China, US, and India, and the most popular technique among researchers is SVM. In response to RQ1, Julong Lan and Yuxian Hu are the authors with the most publications. The response to RQ2 shows that the most cited papers are mostly neutral. For RQ3, the result relates authors and co-authors, which gives us a look at the academic relationships of authors and products. Finally, the answer of RQ4 gives bibliometric networks of the most used keywords and those with whom they relate the most.

Researchers in ML and its influence on software-defined network management are recommended to consider the evolution of concepts in variables their review papers, as well as key phrases that influence this type of research. Upcoming researchers are also urged to use bibliometric networks in research questions that analyze the relationships between elements through the use of IT tools. Finally, it is proposed that in future systematic reviews, ML and text mining techniques be implemented to increase the objectivity and polarity of the investigations.

ACKNOWLEDGMENTS

This research was supported by Universidad Autonoma del Peru, Lima, Peru. We thank Prof. Favio Cuya for his invaluable help during the review process.

REFERENCES

1 
Alshamrani A., Chowdhary A., Pisharody S., Lu D., Huang D., 2017, A Defense System for Defeating DDoS Attacks in SDN based Networks, Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access. Association for Computing Machinery, Miami, Florida, USA, pp. 83-92DOI
2 
Prakash A., Priyadarshini R., Apr. 2018, An Intelligent Software defined Network Controller for preventing Distributed Denial of Service Attack, in 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, pp. 585-589DOI
3 
Lazaris A., Prasanna V. K., Mar. 2021, An LSTM Framework for Software-Defined Measurement, IEEE Trans. Netw. Serv. Manage., Vol. 18, No. 1, pp. 855-869DOI
4 
Lazaris A., Prasanna V. K., 2017, DeepFlow: a deep learning framework for software-defined measurement, in Proceedings of the 2nd Workshop on Cloud-Assisted Networking - CAN '17, Incheon, Republic of Korea, pp. 43-48DOI
5 
El-Shamy A. M., El-Fishawy N. A., Attiya G., Mohamed M. A. A., Jan. 2021, Anomaly Detection and Bottleneck Identification of The Distributed Application in Cloud Data Center using Software-Defined Networking, Egyptian Informatics JournalDOI
6 
Rego A., Sendra S., Garcia L., Lloret J., Sep. 2019, Adapting reinforcement learning for multimedia transmission on SDN, Trans Emerging Tel Tech, Vol. 30, No. 9DOI
7 
Canovas A., Rego A., Romero O., Lloret J., Jan. 2020, A robust multimedia traffic SDN-Based management system using patterns and models of QoE estimation with BRNN, Journal of Network and Computer Applications, Vol. 150, pp. 102498DOI
8 
Ruelas A. M. R., Rothenberg C. E., Oct. 2018, A Load Balancing Method based on Artificial Neural Networks for Knowledge-defined Data Center Networking, in Proceedings of the 10th Latin America Networking Conference, São Paulo Brazil, pp. 106-109DOI
9 
Pradana A. M., Purboyo T. W., Latuconsina R., 2020, A Simulation Of Load Balancing In Software Defined Network (Sdn) Based On Artificial Neural Networks Method, ARPN Journal of Engineering and Applied Sciences, Vol. 15, No. 6, pp. 748-758URL
10 
Volkov A., Proshutinskiy K., Adam A. B. M., Ateya A. A., Muthanna A., Koucheryavy A., 2019, SDN Load Prediction Algorithm Based on Artificial Intelligence, in Distributed Computer and Communication Networks, Cham, pp. 27-40DOI
11 
Ben Letaifa A., Maher G., Mouna S., Jun. 2017, ML based QoE enhancement in SDN context: Video streaming case, in 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, pp. 103-108DOI
12 
Abubakar A., Pranggono B., Sep. 2017, Machine learning based intrusion detection system for software defined networks, in 2017 Seventh International Conference on Emerging Security Technologies (EST), Canterbury, pp. 138-143DOI
13 
Kyaw A. T., Zin Oo M., Khin C. S., Jun. 2020, Machine-Learning Based DDOS Attack Classifier in Software Defined Network, in 2020 17th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), Phuket, Thailand, pp. 431-434DOI
14 
Yu C., Lan J., Guo Z., Hu Y., 2018, DROM: Optimizing the Routing in Software-Defined Networks With Deep Reinforcement Learning, IEEE Access, Vol. 6, pp. 64533-64539DOI
15 
Liu C.-C., Chang Y., Tseng C.-W., Yang Y.-T., Lai M.-S., Chou L.-D., Jul. 2018, SVM-based Classification Mechanism and Its Application in SDN Networks, in 2018 10th International Conference on Communication Software and Networks (ICCSN), Chengdu, pp. 45-49DOI
16 
Zhang C., Wang X., Li F., He Q., Huang M., May 2018, Deep learning-based network application classification for SDN: Deep learning-based network application classification for SDN, Trans Emerging Tel Tech, Vol. 29, No. 5, pp. e3302DOI
17 
Zerbini C. B., Carvalho L. F., Abrão T., Proença M. L., Jul. 2019, Wavelet against random forest for anomaly mitigation in software-defined networking, Applied Soft Computing, Vol. 80, pp. 138-153DOI
18 
Khamaiseh S., Serra E., Li Z., Xu D., Oct. 2019, Detecting Saturation Attacks in SDN via Machine Learning, in 2019 4th International Conference on Computing, Communications and Security (ICCCS), Rome, Italy, pp. 1-8DOI
19 
Castillo E. F., Rendon O. M. C., Ordonez A., Zambenedetti Granville L., Apr. 2020, IPro: An approach for intelligent SDN monitoring, Computer Networks, Vol. 170, pp. 107108DOI
20 
S. E. R., Ravi R., Mar. 2020, A performance analysis of Software Defined Network based prevention on phishing attack in cyberspace using a deep machine learning with CANTINA approach (DMLCA), Computer Communications, Vol. 153, pp. 375-381DOI
21 
Bouzidi E. H., Outtagarts A., Langar R., Dec. 2019, Deep Reinforcement Learning Application for Network Latency Management in Software Defined Networks, in 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, pp. 1-6DOI
22 
Unal E., Sen-Baidya S., Hewett R., Dec. 2018, Towards Prediction of Security Attacks on Software Defined Networks: A Big Data Analytic Approach, in 2018 IEEE International Conference on Big Data (Big Data), pp. 4582-4588DOI
23 
Alhaidari F., et al. , 2021, Intelligent Software-Defined Network for Cognitive Routing Optimization using Deep Extreme Learning Machine Approach, Computers, Materials & Continua, Vol. 67, No. 1, pp. 1269-1285DOI
24 
Benayas F., Carrera A., Iglesias C. A., Apr. 2018, Towards an autonomic Bayesian fault diagnosis service for SDN environments based on a big data infrastructure, in 2018 Fifth International Conference on Software Defined Systems (SDS), pp. 7-13DOI
25 
Kaur G., Gupta P., Aug. 2019, Hybrid Approach for detecting DDOS Attacks in Software Defined Networks, in 2019 Twelfth International Conference on Contemporary Computing (IC3), Noida, India, pp. 1-6DOI
26 
Cusack G., Michel O., Keller E., 2018, Machine Learning-Based Detection of Ransomware Using SDN, Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization. Association for Computing Machinery, Tempe, AZ, USA, pp. 1-6DOI
27 
Alamri H. A., Thayananthan V., 2020, Bandwidth Control Mechanism and Extreme Gradient Boosting Algorithm for Protecting Software-Defined Networks Against DDoS Attacks, IEEE Access, Vol. 8, pp. 194269-194288DOI
28 
An H., Ji Y., Zhang N., Hu W., Yu P., Wang Y., Jun. 2020, Dynamically Split the Traffic in Software Defined Network Based on Deep Reinforcement Learning, in 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, pp. 806-811DOI
29 
Bolodurina I., Parfenov D., Jan. 2018, Comprehensive approach for optimization traffic routing and using network resources in a virtual data center, Procedia Computer Science, Vol. 136, pp. 62-71DOI
30 
Malik J., Akhunzada A., Bibi I., Imran M., Musaddiq A., Kim S. W., 2020, Hybrid Deep Learning: An Efficient Reconnaissance and Surveillance Detection Mechanism in SDN, IEEE Access, Vol. 8, pp. 134695-134706DOI
31 
Perez-Diaz J. A., Valdovinos I. A., Choo K.-K. R., Zhu D., 2020, A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning, IEEE Access, Vol. 8, pp. 155859-155872DOI
32 
Pei J., Hong P., Xue K., Li D., Wei D. S. L., Wu F., Jun. 2020, Two-Phase Virtual Network Function Selection and Chaining Algorithm Based on Deep Learning in SDN/NFV-Enabled Networks, IEEE J. Select. Areas Commun., Vol. 38, No. 6, pp. 1102-1117DOI
33 
Witanto J. N., Lim H., 2019, Software-Defined Networking Application with Deep Deterministic Policy Gradient, Proceedings of the 11th International Conference on Computer Modeling and Simulation. Association for Computing Machinery, North Rockhampton, QLD, Australia, pp. 176-179DOI
34 
Zhang J., Ye M., Guo Z., Yen C.-Y., Chao H. J., Oct. 2020, CFR-RL: Traffic Engineering With Reinforcement Learning in SDN, IEEE J. Select. Areas Commun., Vol. 38, No. 10, pp. 2249-2259DOI
35 
Lou K., Yang Y., Wang C., 2019, An Elephant Flow Detection Method Based on Machine Learning, in Smart Computing and Communication, Cham, Vol. 11910, pp. 212-220DOI
36 
Rusek K., Suarez-Varela J., Almasan P., Barlet-Ros P., Cabellos-Aparicio A., Oct. 2020, RouteNet: Leveraging Graph Neural Networks for Network Modeling and Optimization in SDN, IEEE J. Select. Areas Commun., Vol. 38, No. 10, pp. 2260-2270DOI
37 
Rusek K., Suárez-Varela J., Mestres A., Barlet-Ros P., Cabellos-Aparicio A., 2019, Unveiling the potential of Graph Neural Networks for network modeling and optimization in SDN, Proceedings of the 2019 ACM Symposium on SDN Research. Association for Computing Machinery, San Jose, CA, USA, pp. 140-151DOI
38 
Sahoo K. S., Iqbal A., Maiti P., Sahoo B., Dec. 2018, A Machine Learning Approach for Predicting DDoS Traffic in Software Defined Networks, in 2018 International Conference on Information Technology (ICIT), Bhubaneswar, India, pp. 199-203DOI
39 
Chang L.-H., Lee T.-H., Chu H.-C., Su C.-W., Sep. 2020, Application-Based Online Traffic Classification with Deep Learning Models on SDN Networks, Advances in Technology Innovation, Vol. 5, No. 4DOI
40 
Audah M. Z. F., Chin T. S., Zulfadzli Y., Lee C. K., Rizaluddin K., 2019, Towards Efficient and Scalable Machine Learning-Based QoS Traffic Classification in Software-Defined Network, in Mobile Web and Intelligent Information Systems, Cham, pp. 217-229DOI
41 
Prasath M. K., Perumal B., 2019, A meta-heuristic Bayesian network classification for intrusion detection, International Journal of Network Management, Vol. 29, No. 3, pp. e2047DOI
42 
Latah M., Toker L., Mar. 2018, A novel intelligent approach for detecting DoS flooding attacks in software-defined networks, Int. J. Adv. Intell. Informatics, Vol. 4, No. 1, pp. 11DOI
43 
Latah M., Toker L., Dec. 2020, An efficient flow-based multi-level hybrid intrusion detection system for software-defined networks, CCF Trans. Netw., Vol. 3, No. 3, pp. 261-271DOI
44 
Assis M. V. O., Carvalho L. F., Lloret J., Proen\c{c}a M. L., Mar. 2021, A GRU deep learning system against attacks in software defined networks, Journal of Network and Computer Applications, Vol. 177, pp. 102942DOI
45 
Raikar M. M., S m M., Mulla M. M., Shetti N. S., Karanandi M., Jan. 2020, Data Traffic Classification in Software Defined Networks (SDN) using supervised-learning, Procedia Computer Science, Vol. 171, pp. 2750-2759DOI
46 
Aibin M., Oct. 2020, LSTM for Cloud Data Centers Resource Allocation in Software-Defined Optical Networks, in 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, pp. 0162-0167DOI
47 
Ibrar M., Wang L., Muntean G.-M., Akbar A., Shah N., Malik K. R., Jan. 2021, PrePass-Flow: A Machine Learning based technique to minimize ACL policy violation due to links failure in hybrid SDN, Computer Networks, Vol. 184, pp. 107706DOI
48 
Satheesh N., et al. , Nov. 2020, Flow-based anomaly intrusion detection using machine learning model with software defined networking for OpenFlow network, Microprocessors and Microsystems, Vol. 79, pp. 103285DOI
49 
Bouacida N., Alghadhban A., Alalmaei S., Mohammed H., Shihada B., May 2017, Failure mitigation in software defined networking employing load type prediction, in 2017 IEEE International Conference on Communications (ICC), Paris, France, pp. 1-7DOI
50 
Tuan N. N., Hung P. H., Nghia N. D., Van Tho N., Van Phan T., Thanh N. H., 2020, A DDoS attack mitigation scheme in ISP networks using machine learning based on SDN, Electronics (Switzerland), Vol. 9, No. 3, pp. 19DOI
51 
Rahman O., Quraishi M. A. G., Lung C.-H., Jul. 2019, DDoS Attacks Detection and Mitigation in SDN Using Machine Learning, in 2019 IEEE World Congress on Services (SERVICES), Milan, Italy, pp. 184-189DOI
52 
Sun P., Li J., Lan J., Hu Y., Lu X., Dec. 2018, RNN Deep Reinforcement Learning for Routing Optimization, in 2018 IEEE 4th International Conference on Computer and Communications (ICCC), Chengdu, China, pp. 285-289DOI
53 
Sun P., Hu Y., Lan J., Tian L., Chen M., Oct. 2019, TIDE: Time-relevant deep reinforcement learning for routing optimization, Future Generation Computer Systems, Vol. 99, pp. 401-409DOI
54 
Sun P., Guo Z., Lan J., Li J., Hu Y., Baker T., May 2021, ScaleDRL: A Scalable Deep Reinforcement Learning Approach for Traffic Engineering in SDN with Pinning Control, Computer Networks, Vol. 190, pp. 107891DOI
55 
Sun P., Guo Z., Liu S., Lan J., Wang J., Hu Y., Oct. 2020, SmartFCT: Improving power-efficiency for data center networks with deep reinforcement learning, Computer Networks, Vol. 179, pp. 107255DOI
56 
Wang P., Lin S.-C., Luo M., Jun. 2016, A Framework for QoS-aware Traffic Classification Using Semi-supervised Machine Learning in SDNs, in 2016 IEEE International Conference on Services Computing (SCC), San Francisco, CA, USA, pp. 760-765DOI
57 
Hadem P., Saikia D. K., Moulik S., May 2021, An SDN-based Intrusion Detection System using SVM with Selective Logging for IP Traceback, Computer Networks, Vol. 191, pp. 108015DOI
58 
Zhang Q., Wang X., Lv J., Huang M., May 2020, Intelligent Content-Aware Traffic Engineering for SDN: An AI-Driven Approach, IEEE Network, Vol. 34, No. 3, pp. 186-193DOI
59 
ur Rasool R., Ahmed K., Anwar Z., Wang H., Ashraf U., Rafique W., 2021, CyberPulse++: A machine learning-based security framework for detecting link flooding attacks in software defined networks, International Journal of Intelligent SystemsDOI
60 
Durner R., Kellerer W., Jun. 2020, Network Function Offloading Through Classification of Elephant Flows, IEEE Trans. Netw. Serv. Manage., Vol. 17, No. 2, pp. 807-820DOI
61 
Swami R., Dave M., Ranga V., 2020, Voting-based intrusion detection framework for securing software-defined networks, Concurrency and Computation: Practice and Experience, Vol. 32, No. 24, pp. e5927DOI
62 
Volkov S. S., Kurochkin I. I., Jan. 2020, Network attacks classification using Long Short-term memory based neural networks in Software-Defined Networks, Procedia Computer Science, Vol. 178, pp. 394-403DOI
63 
Garg S., Kaur K., Kumar N., Rodrigues J. J. P. C., Mar. 2019, Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective, IEEE Trans. Multimedia, Vol. 21, No. 3, pp. 566-578DOI
64 
Mohammed S. S., et al. , Oct. 2018, A New Machine Learning-based Collaborative DDoS Mitigation Mechanism in Software-Defined Network, in 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Limassol, pp. 1-8DOI
65 
Khamaiseh S., Serra E., Xu D., Jul. 2020, vSwitchGuard: Defending OpenFlow Switches Against Saturation Attacks, in 2020 IEEE 44th Annual Computers, Software, Applications Conference (COMPSAC), Madrid, Spain, pp. 851-860DOI
66 
Gangadhar S., Sterbenz J. P. G., Sep. 2017, Machine learning aided traffic tolerance to improve resilience for software defined networks, in 2017 9th International Workshop on Resilient Networks Design and Modeling (RNDM), Alghero, pp. 1-7DOI
67 
Petrangeli S., Wu T., Wauters T., Huysegems R., Bostoen T., De Turck F., Sep. 2017, A machine learning-based framework for preventing video freezes in HTTP adaptive streaming, Journal of Network and Computer Applications, Vol. 94, pp. 78-92DOI
68 
Kumar S., Bansal G., Shekhawat V. S., Jan. 2020, A Machine Learning Approach for Traffic Flow Provisioning in Software Defined Networks, in 2020 International Conference on Information Networking (ICOIN), Barcelona, Spain, pp. 602-607DOI
69 
Abhiroop T., Babu S., Manoj B. S., Feb. 2018, A Machine Learning Approach for Detecting DoS Attacks in SDN Switches, in 2018 Twenty Fourth National Conference on Communications (NCC), Hyderabad, pp. 1-6DOI
70 
Bakhshi T., Ghita B., Oct. 2016, OpenFlow-enabled user traffic profiling in campus software defined networks, in 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), New York, NY, pp. 1-8DOI
71 
Mu T.-Y., Al-Fuqaha A., Shuaib K., Sallabi F. M., Qadir J., 2018, SDN Flow Entry Management Using Reinforcement Learning, ACM Trans. Auton. Adapt. Syst. Association for Computing Machinery, Vol. 13, No. 2, pp. Article 11DOI
72 
Chin T., Xiong K., Hu C., 2018, Phishlimiter: A Phishing Detection and Mitigation Approach Using Software-Defined Networking, IEEE Access, Vol. 6, pp. 42516-42531DOI
73 
Truong-Huu T., Prathap P., Mohan P. M., Gurusamy M., May 2019, Fast and Adaptive Failure Recovery using Machine Learning in Software Defined Networks, in 2019 IEEE International Conference on Communications Workshops (ICC Workshops), Shanghai, China, pp. 1-6DOI
74 
Huong T. T., Khoa N. D. D., Dung N. X., Thanh N. H., Oct. 2019, A global multipath load-balanced routing algorithm based on Reinforcement Learning in SDN, in 2019 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea (South), pp. 1336-1341DOI
75 
Lee T.-H., Chang L.-H., Syu C.-W., Jun. 2020, Deep Learning Enabled Intrusion Detection and Prevention System over SDN Networks, in 2020 IEEE International Conference on Communications Workshops (ICC Workshops), Dublin, Ireland, pp. 1-6DOI
76 
Liu W.-X., Zhang J., Liang Z.-W., Peng L.-X., Cai J., 2018, Content Popularity Prediction and Caching for ICN: A Deep Learning Approach With SDN, IEEE Access, Vol. 6, pp. 5075-5089DOI
77 
Liu W., Cai J., Chen Q. C., Wang Y., Mar. 2021, DRL-R: Deep reinforcement learning approach for intelligent routing in software-defined data-center networks, Journal of Network and Computer Applications, Vol. 177, pp. 102865DOI
78 
Sun W., Wang Z., Zhang G., Feb. 2021, A QoS-guaranteed intelligent routing mechanism in software-defined networks, Computer Networks, Vol. 185, pp. 107709DOI
79 
Qin Y., Wei J., Yang W., Sep. 2019, Deep Learning Based Anomaly Detection Scheme in Software-Defined Networking, in 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS), Matsue, Japan, pp. 1-4DOI
80 
Park Y., Kengalahalli N. V., Chang S.-Y., Nov. 2018, Distributed Security Network Functions against Botnet Attacks in Software-defined Networks, in 2018 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Verona, Italy, pp. 1-7DOI
81 
Ma Z., Huang J., 2020, Research on DDoS Abnormal Traffic Detection Under SDN Network, in Parallel Architectures, Algorithms and Programming, Singapore, pp. 368-379DOI
82 
Kitchenham B., Jul. 2007, Guidelines for performing Systematic Literature Reviews in Software Engineering, Keele University, UK, EBSE Technical ReportGoogle Search
83 
Nassif A. B., Talib M. A., Nasir Q., Albadani H., Dakalbab F. M., 2021, Machine Learning for Cloud Security: A Systematic Review, IEEE Access, Vol. 9, pp. 20717-20735DOI
84 
Nassif A. B., Talib M. A., Nasir Q., Dakalbab F. M., 2021, Machine Learning for Anomaly Detection: A Systematic Review, IEEE Access, Vol. 9, pp. 78658-78700DOI
85 
Amarudin , Ferdiana R., Widyawan , 2020, A Systematic Literature Review of Intrusion Detection System for Network Security: Research Trends, Datasets and Methods, presented at the ICICoS 2020 - Proceeding: 4th International Conference on Informatics and Computational SciencesDOI
86 
Öney M. U., Peker S., 2019, The Use of Artificial Neural Networks in Network Intrusion Detection: A Systematic Review, presented at the 2018 International Conference on Artificial Intelligence and Data Processing, IDAP 2018DOI
87 
Xie J., et al. , 2019, A Survey of Machine Learning Techniques Applied to Software Defined Networking (SDN): Research Issues and Challenges, IEEE Commun. Surv. Tutorials, Vol. 21, No. 1, pp. 393-430DOI
88 
Liu Y., Yu F. R., Li X., Ji H., Leung V. C. M., Secondquarter 2020, Blockchain and Machine Learning for Communications and Networking Systems, IEEE Communications Surveys Tutorials, Vol. 22, No. 2, pp. 1392-1431DOI
89 
Liu J., Xu Q., Mar. 2019, Machine Learning in Software Defined Network, in 2019 IEEE 3rd Information Technology, Electronic and Automation Control Conference (ITNEC), Chengdu, China, Vol. networking, pp. 1114-1120DOI
90 
TextBlob , 2021, API Reference - TextBlob 0.16.0 documentationURL

Author

Andres J. Aparcana-Tasayco
../../Resources/ieie/IEIESPC.2022.11.6.400/au1.png

Andres J. Aparcana-Tasayco received his Bach. Eng. in Systems Engineering in 2021 from Universidad Autonoma del Peru, Lima, Peru. His skills are Software Development, Database Design and Programming, Machine Learning, Networking, and Network Programmability. Additionally, he was awarded in Huawei’s ICT Competition Peru and Thesis Workshop by Universidad Autonoma del Peru in 2021. In addition, he has published and reviewed papers for international conferences. He was a research committee chair in his IEEE Student Branch and is currently an IEEE, IEEE ComSoc, and IEEE Computer member. He currently works as a research assistant at the coordination of Cybersecurity and Networking in Instituto Nacional de Investigacion y Capacitacion de Telecomunicaciones de la Universidad Nacional de Ingenieria, Lima, Peru. His current research interests include virtualization technologies and Software-Defined Networking, Programmable Data Planes, Network Monitoring, and Network Security.

Javier Gamboa-Cruzado
../../Resources/ieie/IEIESPC.2022.11.6.400/au2.png

Javier Gamboa-Cruzado works at the Faculty of Systems Engineering of the Universidad Nacional Mayor de San Marcos, Lima, Peru. He is Doctor in Systems Engineering and Doctor in Administrative Sciences. He has published several articles in inter-national journals and conferences. His research interests are in machine learning, big data, the internet of things, natural language processing, and business intelligence (email: jgamboa65@hotmail.com).