Detecting and mitigating security anomalies in Software-Defined Networking (SDN) using Gradient-Boosted Trees and Floodlight Controller characteristics.
Tohid JafarianAli GhaffariAli SeyfollahiBahman ArastehPublished in: Comput. Stand. Interfaces (2025)
Keyphrases
- detecting anomalies
- anomaly detection
- information security
- neural network
- real time
- decision trees
- security vulnerabilities
- root cause
- software design
- security issues
- intrusion prevention
- windows xp
- computer security
- software systems
- intrusion detection
- computer systems
- peer to peer
- control system
- closed loop
- network security
- random forests
- operating system
- security requirements
- key management
- cyber security
- source code
- edge detection
- intellectual property protection