Skip to main content

Showing 1–3 of 3 results for author: Toker, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:1806.03875  [pdf

    cs.CR cs.NI

    An Efficient Flow-based Multi-level Hybrid Intrusion Detection System for Software-Defined Networks

    Authors: Majd Latah, Levent Toker

    Abstract: Software-Defined Networking (SDN) is a novel networking paradigm that provides enhanced programming abilities, which can be used to solve traditional security challenges on the basis of more efficient approaches. The most important element in the SDN paradigm is the controller, which is responsible for managing the flows of each correspondence forwarding element (switch or router). Flow statistics… ▽ More

    Submitted 11 June, 2018; originally announced June 2018.

  2. Artificial Intelligence Enabled Software Defined Networking: A Comprehensive Overview

    Authors: Majd Latah, Levent Toker

    Abstract: Software defined networking (SDN) represents a promising networking architecture that combines central management and network programmability. SDN separates the control plane from the data plane and moves the network management to a central point, called the controller, that can be programmed and used as the brain of the network. Recently, the research community has showed an increased tendency to… ▽ More

    Submitted 6 November, 2018; v1 submitted 19 March, 2018; originally announced March 2018.

    Comments: This manuscript has been accepted for publication in IET Networks

    Journal ref: https://digital-library.theiet.org/content/journals/10.1049/iet-net.2018.5082

  3. Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks

    Authors: Majd Latah, Levent Toker

    Abstract: Software-defined networking (SDN) is a new paradigm that allows developing more flexible network applications. SDN controller, which represents a centralized controlling point, is responsible for running various network applications as well as maintaining different network services and functionalities. Choosing an efficient intrusion detection system helps in reducing the overhead of the running c… ▽ More

    Submitted 19 August, 2018; v1 submitted 18 March, 2018; originally announced March 2018.

    Comments: This manuscript has been accepted for publication in IET Networks, 2018

    Journal ref: https://digital-library.theiet.org/content/journals/10.1049/iet-net.2018.5080