An Exhaustive Parametric Analysis for Securing SDN Through Traditional, AI/ML, and Blockchain Approaches: A Systematic Review

Technology has revolutionized various aspects of human life, and networking plays an important role in this revolution. Networks have gained significant importance with the evolution of technology. Traditional networks have served human life for decades but cannot provide future networking requireme...

Full description

Saved in:
Bibliographic Details
Published inThe International journal of networked and distributed computing (Online) Vol. 13; no. 1
Main Authors Shahzad, Muhammad, Rizvi, Safdar, Khan, Talha Ahmed, Ahmad, Sadique, Ateya, Abdelhamied A.
Format Journal Article
LanguageEnglish
Published Dordrecht Springer Netherlands 01.06.2025
Subjects
Online AccessGet full text
ISSN2211-7938
2211-7946
DOI10.1007/s44227-024-00055-8

Cover

Abstract Technology has revolutionized various aspects of human life, and networking plays an important role in this revolution. Networks have gained significant importance with the evolution of technology. Traditional networks have served human life for decades but cannot provide future networking requirements. Software-defined networking (SDN) is a major paradigm shift in the networking field; it provides an efficient way of managing and controlling networks by separating the control layer from the data layer. SDN has gained significant attention from researchers and industry experts in recent years. However, to accept SDN as a replacement for traditional networking, several areas need to be improved, and security is one of them. This exhaustive literature survey presents a detailed analysis of security solutions proposed by researchers for SDN security. This literature review can be classified into three main categories of SDN security solutions: conventional network security solutions, machine learning (ML)-based, and blockchain-based security solutions. A detailed domain analysis has been performed, and the proposed strategies and their results have been evaluated. Moreover, the shortcomings and contributions of previous approaches toward scientific society have been analyzed to facilitate the new research. This research has completed a detailed and diversified literature review to have wide concrete knowledge regarding the future trends for designing and developing innovative SDN security solutions. An exhaustive literature review revealed that various ML-based SDN security approaches have been proposed, including convolutional neural network (CNN), support vector machine (SVM), and k-nearest neighbors (KNN). Among these ML algorithms, CNN and SVM were found to be more effective and state-of-the-art in securing the SDN. Parametric analysis of different researchers demonstrated that blockchain-based flow rules, blockchain-based packet parsers, and controller authentication outperformed while securing the SDN networks. The paper covered all the aspects of previous research that have been experimented with to determine the robust and concrete techniques for the security of SDN networks.
AbstractList Technology has revolutionized various aspects of human life, and networking plays an important role in this revolution. Networks have gained significant importance with the evolution of technology. Traditional networks have served human life for decades but cannot provide future networking requirements. Software-defined networking (SDN) is a major paradigm shift in the networking field; it provides an efficient way of managing and controlling networks by separating the control layer from the data layer. SDN has gained significant attention from researchers and industry experts in recent years. However, to accept SDN as a replacement for traditional networking, several areas need to be improved, and security is one of them. This exhaustive literature survey presents a detailed analysis of security solutions proposed by researchers for SDN security. This literature review can be classified into three main categories of SDN security solutions: conventional network security solutions, machine learning (ML)-based, and blockchain-based security solutions. A detailed domain analysis has been performed, and the proposed strategies and their results have been evaluated. Moreover, the shortcomings and contributions of previous approaches toward scientific society have been analyzed to facilitate the new research. This research has completed a detailed and diversified literature review to have wide concrete knowledge regarding the future trends for designing and developing innovative SDN security solutions. An exhaustive literature review revealed that various ML-based SDN security approaches have been proposed, including convolutional neural network (CNN), support vector machine (SVM), and k-nearest neighbors (KNN). Among these ML algorithms, CNN and SVM were found to be more effective and state-of-the-art in securing the SDN. Parametric analysis of different researchers demonstrated that blockchain-based flow rules, blockchain-based packet parsers, and controller authentication outperformed while securing the SDN networks. The paper covered all the aspects of previous research that have been experimented with to determine the robust and concrete techniques for the security of SDN networks.
ArticleNumber 12
Author Shahzad, Muhammad
Khan, Talha Ahmed
Ateya, Abdelhamied A.
Ahmad, Sadique
Rizvi, Safdar
Author_xml – sequence: 1
  givenname: Muhammad
  surname: Shahzad
  fullname: Shahzad, Muhammad
  organization: Department of Computer Science, Bahria University
– sequence: 2
  givenname: Safdar
  surname: Rizvi
  fullname: Rizvi, Safdar
  organization: Department of Computer Science, Bahria University
– sequence: 3
  givenname: Talha Ahmed
  surname: Khan
  fullname: Khan, Talha Ahmed
  organization: Department of Computer Science, Bahria University
– sequence: 4
  givenname: Sadique
  surname: Ahmad
  fullname: Ahmad, Sadique
  organization: EIAS Data Science and BlockChain Lab, CCIS, Prince Sultan University
– sequence: 5
  givenname: Abdelhamied A.
  orcidid: 0000-0002-1610-9612
  surname: Ateya
  fullname: Ateya, Abdelhamied A.
  email: aateya@psu.edu.sa
  organization: EIAS Data Science and BlockChain Lab, CCIS, Prince Sultan University, Department of Electronics and Communications Engineering, Zagazig University
BookMark eNp9kL1OwzAUhS0EEqX0BZj8AA11nDhx2EIpUKn8iJbZcu2bxtDGkZ0UOvDupBQxMt07nO9I5ztDx5WtAKGLkFyGhKQjH8eUpgGhcUAIYSzgR6hHaRgGaRYnx39_xE_RwHuzJCwknKWc9dBXXuHJZylb35gt4Gfp5AYaZxTOK7neeeNxYR2eg2qdqVZ4fvOIF6Wz7arECye1aYztgkOcT0cPsyGWlcbXa6veVSlNhfO6dlaqEvwVzvF85xvYyKZrf4GtgY9zdFLItYfB7-2j19vJYnwfzJ7upuN8FijKkybQrEiKZQaR1kpFLM262TrRvJBLDVlII8o5CUHRGBRAUiQ8pmlGlI7SLpaxqI_ooVc5672DQtTObKTbiZCIvUNxcCg6h-LHoeAdFB0gX--ngxNvtnXdWP8f9Q0v3HdU
Cites_doi 10.1109/WAINA.2017.100
10.2298/CSIS210222001G
10.1109/SURV.2014.012214.00180
10.1155/2023/6013270
10.1109/TDSC.2022.3158690
10.1109/ACCESS.2020.2992580
10.21203/rs.3.rs-1648186/v1
10.1016/j.vehcom.2023.100663
10.1007/s10922-022-09682-4
10.1109/WPMC.2017.8301788
10.1145/2491185.2491212
10.3390/app13053183
10.3390/su141911950
10.1007/s10207-023-00687-x
10.32604/cmes.2022.020724
10.3390/en16031510
10.1109/ICUFN55119.2022.9829621
10.1016/j.inffus.2020.12.006
10.1016/j.jnca.2019.01.019
10.3390/fi13050111
10.1109/ICUFN.2015.7182679
10.1109/ACCESS.2020.2964751
10.1109/ACCESS.2019.2930715
10.1007/978-3-030-36625-4_3
10.1016/j.jnca.2020.102814
10.1016/j.comnet.2022.108802
10.1109/Trustcom.2015.454
10.1109/JIOT.2020.3017354
10.1109/PDCAT.2016.064
10.3390/electronics9030413
10.1371/journal.pone.0291596
10.3390/jsan8010015
10.1007/978-981-16-4244-9_3
10.1109/ACCESS.2020.2999668
10.1177/08944393221110148
10.1016/j.comnet.2023.109905
10.1049/wss2.12031
10.1109/COMST.2018.2866942
10.1109/IPTCOMM.2017.8169748
10.1145/3368926.3369709
10.1016/j.future.2022.01.017
10.1007/978-3-319-64653-4_1
10.1109/ACCESS.2021.3101650
10.1109/SmartIoT.2019.00044
10.1109/ICC.2018.8422405
10.1109/ACCESS.2022.3148134
10.9734/ajrcos/2021/v9i230216
10.1109/ACCAI53970.2022.9752574
10.3390/s22207896
10.1016/j.csi.2017.01.005
10.1016/j.comnet.2021.108015
10.1109/ACCESS.2023.3260777
10.1002/9781119857921.ch10
10.3390/sym14081563
10.1002/spy2.178
10.14569/IJACSA.2016.070817
10.3390/electronics11070996
10.1007/978-3-030-22277-2_14
10.1109/ICC.2017.7997249
10.1109/comst.2023.3244674
10.1109/JIOT.2017.2685596
10.1109/ICCWorkshops50388.2021.9473709
10.1109/INFOCOMWKSHPS50562.2020.9162669
10.1109/NCA.2019.8935066
10.1007/978-3-030-91738-8_54
10.3390/s23020890
10.1016/j.jnca.2020.102595
10.3390/systems11060296
10.1016/j.iot.2023.100715
10.1007/978-3-030-30149-1_22
10.1007/s11277-023-10402-7
10.12928/telkomnika.v17i6.13119
10.1109/ICCCN.2019.8846954
10.1109/JPROC.2014.2371999
10.3390/fi16050168
10.1109/ISCC47284.2019.8969780
10.1109/ICSSS54381.2022.9782292
10.1016/j.cose.2019.101629
10.3390/electronics10151787
10.1587/transinf.2021BCP0013
10.1016/j.jksuci.2023.02.001
10.1109/CSNET.2018.8602680
10.1109/COMST.2018.2839348
10.1109/CCST.2019.8888369
ContentType Journal Article
Copyright The Author(s) 2025
Copyright_xml – notice: The Author(s) 2025
DBID C6C
AAYXX
CITATION
DOI 10.1007/s44227-024-00055-8
DatabaseName Springer Nature OA Free Journals
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: C6C
  name: Springer Nature OA Free Journals
  url: http://www.springeropen.com/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2211-7946
ExternalDocumentID 10_1007_s44227_024_00055_8
GrantInformation_xml – fundername: Prince Sultan University
  grantid: Prince Sultan University
  funderid: http://dx.doi.org/10.13039/501100012639
GroupedDBID 0R~
AAFWJ
AAJSJ
AAKKN
AASML
ABEEZ
ACACY
ACULB
ADBBV
AFGXO
AFPKN
ALMA_UNASSIGNED_HOLDINGS
BCNDV
C24
C6C
EBLON
EBS
GROUPED_DOAJ
OK1
SOJ
AAYXX
CITATION
ID FETCH-LOGICAL-c286t-d5f6fb9e3ddcc3579100d6d8fabde912328801ec24ecee6f6842790cd37d6d953
IEDL.DBID C6C
ISSN 2211-7938
IngestDate Thu Sep 11 00:31:37 EDT 2025
Tue Jul 15 01:10:17 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Software defined networks
SDN security
Artificial intelligence
Blockchain
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c286t-d5f6fb9e3ddcc3579100d6d8fabde912328801ec24ecee6f6842790cd37d6d953
ORCID 0000-0002-1610-9612
OpenAccessLink https://doi.org/10.1007/s44227-024-00055-8
ParticipantIDs crossref_primary_10_1007_s44227_024_00055_8
springer_journals_10_1007_s44227_024_00055_8
PublicationCentury 2000
PublicationDate 2025-06-01
PublicationDateYYYYMMDD 2025-06-01
PublicationDate_xml – month: 06
  year: 2025
  text: 2025-06-01
  day: 01
PublicationDecade 2020
PublicationPlace Dordrecht
PublicationPlace_xml – name: Dordrecht
PublicationTitle The International journal of networked and distributed computing (Online)
PublicationTitleAbbrev Int J Netw Distrib Comput
PublicationYear 2025
Publisher Springer Netherlands
Publisher_xml – name: Springer Netherlands
References 55_CR5
55_CR46
T Alharbi (55_CR4) 2020; 8
55_CR49
R Sahay (55_CR2) 2019; 131
55_CR48
IM Varma (55_CR95) 2023; 44
P Ohri (55_CR47) 2022; 12
E Barka (55_CR69) 2021; 10
P Hadem (55_CR56) 2021; 191
55_CR6
55_CR81
55_CR80
55_CR43
A Muthanna (55_CR7) 2019; 8
55_CR42
55_CR45
S Schaller (55_CR17) 2017; 54
55_CR44
55_CR88
A Altaf (55_CR11) 2023; 41
55_CR82
55_CR41
55_CR85
55_CR40
N Ahmed (55_CR61) 2022; 22
55_CR84
55_CR39
AA Alashhab (55_CR64) 2022; 14
C Li (55_CR33) 2017; 4
NN Tuan (55_CR50) 2020; 9
EM Onyema (55_CR30) 2022; 14
55_CR36
55_CR35
55_CR38
X Guo (55_CR86) 2022; 19
H Nam Nguyen (55_CR9) 2021; 11
55_CR37
G Ali (55_CR77) 2023; 18
W Meng (55_CR83) 2021; 70
SH Haji (55_CR1) 2021; 9
55_CR32
55_CR76
W Li (55_CR75) 2022; 105
55_CR34
M Imran (55_CR58) 2024; 16
AS Rajasekaran (55_CR3) 2022; 52
NM Yungaicela-Naula (55_CR25) 2021; 9
R Shashidhara (55_CR72) 2021; 4
55_CR73
55_CR29
J Hu (55_CR8) 2020; 8
55_CR28
AO Alzahrani (55_CR51) 2021; 13
55_CR24
55_CR68
55_CR27
OS Al-Heety (55_CR12) 2020; 8
AE Houda (55_CR71) 2019; 7
BAA Nunes (55_CR14) 2014; 16
S Jiang (55_CR79) 2023; 12
A Yazdinejad (55_CR74) 2020; 88
B Mao (55_CR93) 2023; 25
AS Almasoud (55_CR10) 2020; 170
D Kreutz (55_CR13) 2014; 103
55_CR21
H Alshahrani (55_CR89) 2023; 16
55_CR20
J Wang (55_CR87) 2023; 74
55_CR23
55_CR67
PT Duy (55_CR70) 2022; 64
A Mansoor (55_CR65) 2023; 11
55_CR66
JCC Chica (55_CR31) 2020; 159
55_CR63
55_CR62
A Rahman (55_CR78) 2022; 30
55_CR18
SHA Kazmi (55_CR92) 2023; 130
S Algarni (55_CR15) 2022; 11
55_CR57
55_CR16
N Khan (55_CR26) 2023; 35
TE Ali (55_CR60) 2023; 13
TA Assegie (55_CR22) 2019; 17
M Yue (55_CR54) 2020; 8
A Henry (55_CR52) 2023; 23
55_CR90
55_CR91
A Abdou (55_CR19) 2018; 20
55_CR53
AH Janabi (55_CR55) 2022; 10
A Alotaibi (55_CR94) 2023; 22
J Xie (55_CR59) 2018; 21
References_xml – ident: 55_CR40
  doi: 10.1109/WAINA.2017.100
– volume: 19
  start-page: 523
  issue: 2
  year: 2022
  ident: 55_CR86
  publication-title: Comput Sci Inform Syst
  doi: 10.2298/CSIS210222001G
– volume: 16
  start-page: 1617
  issue: 3
  year: 2014
  ident: 55_CR14
  publication-title: IEEE Commun Surv Tutorials
  doi: 10.1109/SURV.2014.012214.00180
– ident: 55_CR81
  doi: 10.1155/2023/6013270
– volume: 12
  start-page: 400
  issue: 1
  year: 2022
  ident: 55_CR47
  publication-title: Int J Comput Digit Syst
– ident: 55_CR28
  doi: 10.1109/TDSC.2022.3158690
– volume: 8
  start-page: 91028
  year: 2020
  ident: 55_CR12
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2992580
– ident: 55_CR20
  doi: 10.21203/rs.3.rs-1648186/v1
– volume: 44
  start-page: 100663
  year: 2023
  ident: 55_CR95
  publication-title: Veh Commun
  doi: 10.1016/j.vehcom.2023.100663
– volume: 30
  start-page: 73
  issue: 4
  year: 2022
  ident: 55_CR78
  publication-title: J Netw Syst Manage
  doi: 10.1007/s10922-022-09682-4
– ident: 55_CR39
  doi: 10.1109/WPMC.2017.8301788
– ident: 55_CR41
  doi: 10.1145/2491185.2491212
– volume: 13
  start-page: 3183
  issue: 5
  year: 2023
  ident: 55_CR60
  publication-title: Appl Sci
  doi: 10.3390/app13053183
– ident: 55_CR91
– volume: 14
  start-page: 11950
  issue: 19
  year: 2022
  ident: 55_CR30
  publication-title: Sustainability
  doi: 10.3390/su141911950
– ident: 55_CR84
  doi: 10.1007/s10207-023-00687-x
– ident: 55_CR57
  doi: 10.32604/cmes.2022.020724
– volume: 16
  start-page: 1510
  issue: 3
  year: 2023
  ident: 55_CR89
  publication-title: Energies
  doi: 10.3390/en16031510
– ident: 55_CR24
  doi: 10.1109/ICUFN55119.2022.9829621
– volume: 70
  start-page: 60
  year: 2021
  ident: 55_CR83
  publication-title: Inform Fusion
  doi: 10.1016/j.inffus.2020.12.006
– ident: 55_CR85
– volume: 74
  start-page: 103452
  year: 2023
  ident: 55_CR87
  publication-title: J Inform Secur Appl
– volume: 131
  start-page: 89
  year: 2019
  ident: 55_CR2
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2019.01.019
– volume: 13
  start-page: 111
  issue: 5
  year: 2021
  ident: 55_CR51
  publication-title: Future Internet
  doi: 10.3390/fi13050111
– ident: 55_CR45
  doi: 10.1109/ICUFN.2015.7182679
– ident: 55_CR82
– volume: 8
  start-page: 9146
  year: 2020
  ident: 55_CR4
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2964751
– volume: 7
  start-page: 98893
  year: 2019
  ident: 55_CR71
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2930715
– ident: 55_CR90
  doi: 10.1007/978-3-030-36625-4_3
– volume: 170
  start-page: 102814
  year: 2020
  ident: 55_CR10
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2020.102814
– ident: 55_CR21
  doi: 10.1016/j.comnet.2022.108802
– ident: 55_CR36
  doi: 10.1109/Trustcom.2015.454
– volume: 8
  start-page: 2102
  issue: 4
  year: 2020
  ident: 55_CR8
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2020.3017354
– ident: 55_CR43
  doi: 10.1109/PDCAT.2016.064
– volume: 9
  start-page: 413
  issue: 3
  year: 2020
  ident: 55_CR50
  publication-title: Electronics
  doi: 10.3390/electronics9030413
– volume: 18
  start-page: e0291596
  issue: 9
  year: 2023
  ident: 55_CR77
  publication-title: PLoS ONE
  doi: 10.1371/journal.pone.0291596
– volume: 8
  start-page: 15
  issue: 1
  year: 2019
  ident: 55_CR7
  publication-title: J Sens Actuator Networks
  doi: 10.3390/jsan8010015
– ident: 55_CR23
  doi: 10.1007/978-981-16-4244-9_3
– volume: 8
  start-page: 104688
  year: 2020
  ident: 55_CR54
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2999668
– volume: 41
  start-page: 1941
  issue: 5
  year: 2023
  ident: 55_CR11
  publication-title: Social Sci Comput Rev
  doi: 10.1177/08944393221110148
– ident: 55_CR88
  doi: 10.1016/j.comnet.2023.109905
– volume: 11
  start-page: 233
  issue: 6
  year: 2021
  ident: 55_CR9
  publication-title: IET Wirel Sens Syst
  doi: 10.1049/wss2.12031
– volume: 21
  start-page: 393
  issue: 1
  year: 2018
  ident: 55_CR59
  publication-title: IEEE Commun Surv Tutorials
  doi: 10.1109/COMST.2018.2866942
– ident: 55_CR67
  doi: 10.1109/IPTCOMM.2017.8169748
– ident: 55_CR27
– ident: 55_CR68
  doi: 10.1145/3368926.3369709
– ident: 55_CR5
  doi: 10.1016/j.future.2022.01.017
– ident: 55_CR34
  doi: 10.1007/978-3-319-64653-4_1
– volume: 9
  start-page: 108495
  year: 2021
  ident: 55_CR25
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3101650
– ident: 55_CR6
  doi: 10.1109/SmartIoT.2019.00044
– ident: 55_CR44
  doi: 10.1109/ICC.2018.8422405
– volume: 10
  start-page: 14301
  year: 2022
  ident: 55_CR55
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3148134
– volume: 9
  start-page: 1
  issue: 2
  year: 2021
  ident: 55_CR1
  publication-title: Asian J Res Comput Sci
  doi: 10.9734/ajrcos/2021/v9i230216
– ident: 55_CR29
  doi: 10.1109/ACCAI53970.2022.9752574
– volume: 22
  start-page: 7896
  issue: 20
  year: 2022
  ident: 55_CR61
  publication-title: Sensors
  doi: 10.3390/s22207896
– volume: 54
  start-page: 197
  year: 2017
  ident: 55_CR17
  publication-title: Comput Stand Interfaces
  doi: 10.1016/j.csi.2017.01.005
– volume: 191
  start-page: 108015
  year: 2021
  ident: 55_CR56
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2021.108015
– ident: 55_CR49
  doi: 10.1109/ACCESS.2023.3260777
– ident: 55_CR35
  doi: 10.1002/9781119857921.ch10
– volume: 14
  start-page: 1563
  issue: 8
  year: 2022
  ident: 55_CR64
  publication-title: Symmetry
  doi: 10.3390/sym14081563
– volume: 4
  start-page: e178
  issue: 6
  year: 2021
  ident: 55_CR72
  publication-title: Secur Priv
  doi: 10.1002/spy2.178
– ident: 55_CR32
  doi: 10.14569/IJACSA.2016.070817
– volume: 11
  start-page: 996
  issue: 7
  year: 2022
  ident: 55_CR15
  publication-title: Electronics
  doi: 10.3390/electronics11070996
– ident: 55_CR18
  doi: 10.1007/978-3-030-22277-2_14
– ident: 55_CR42
  doi: 10.1109/ICC.2017.7997249
– volume: 12
  start-page: 121
  issue: 12
  year: 2023
  ident: 55_CR79
  publication-title: Int J Cybernetics Inf (IJCI)
– volume: 25
  start-page: 1095
  year: 2023
  ident: 55_CR93
  publication-title: IEEE Commun Surv Tutor Secondquarter
  doi: 10.1109/comst.2023.3244674
– volume: 4
  start-page: 1156
  issue: 5
  year: 2017
  ident: 55_CR33
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2017.2685596
– ident: 55_CR16
  doi: 10.1109/ICCWorkshops50388.2021.9473709
– ident: 55_CR80
  doi: 10.1109/INFOCOMWKSHPS50562.2020.9162669
– ident: 55_CR66
  doi: 10.1109/NCA.2019.8935066
– ident: 55_CR48
  doi: 10.1007/978-3-030-91738-8_54
– volume: 23
  start-page: 890
  issue: 2
  year: 2023
  ident: 55_CR52
  publication-title: Sensors
  doi: 10.3390/s23020890
– volume: 159
  start-page: 102595
  year: 2020
  ident: 55_CR31
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2020.102595
– volume: 11
  start-page: 296
  issue: 6
  year: 2023
  ident: 55_CR65
  publication-title: Systems
  doi: 10.3390/systems11060296
– volume: 22
  start-page: 100715
  year: 2023
  ident: 55_CR94
  publication-title: Internet Things
  doi: 10.1016/j.iot.2023.100715
– ident: 55_CR38
  doi: 10.1007/978-3-030-30149-1_22
– volume: 64
  start-page: 103080
  year: 2022
  ident: 55_CR70
  publication-title: J Inform Secur Appl
– volume: 130
  start-page: 2753
  year: 2023
  ident: 55_CR92
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-023-10402-7
– volume: 17
  start-page: 3168
  issue: 6
  year: 2019
  ident: 55_CR22
  publication-title: TELKOMNIKA (Telecommunication Comput Electron Control)
  doi: 10.12928/telkomnika.v17i6.13119
– ident: 55_CR37
  doi: 10.1109/ICCCN.2019.8846954
– volume: 52
  start-page: 102039
  year: 2022
  ident: 55_CR3
  publication-title: Sustain Energy Technol Assess
– volume: 103
  start-page: 14
  issue: 1
  year: 2014
  ident: 55_CR13
  publication-title: Proc IEEE
  doi: 10.1109/JPROC.2014.2371999
– volume: 16
  start-page: 168
  issue: 5
  year: 2024
  ident: 55_CR58
  publication-title: Future Internet
  doi: 10.3390/fi16050168
– ident: 55_CR73
  doi: 10.1109/ISCC47284.2019.8969780
– ident: 55_CR76
  doi: 10.1109/ICSSS54381.2022.9782292
– volume: 88
  start-page: 101629
  year: 2020
  ident: 55_CR74
  publication-title: Computers Secur
  doi: 10.1016/j.cose.2019.101629
– volume: 10
  start-page: 1787
  issue: 15
  year: 2021
  ident: 55_CR69
  publication-title: Electronics
  doi: 10.3390/electronics10151787
– volume: 105
  start-page: 272
  issue: 2
  year: 2022
  ident: 55_CR75
  publication-title: IEICE Trans Inf Syst
  doi: 10.1587/transinf.2021BCP0013
– volume: 35
  start-page: 176
  issue: 3
  year: 2023
  ident: 55_CR26
  publication-title: J King Saud University-Computer Inform Sci
  doi: 10.1016/j.jksuci.2023.02.001
– ident: 55_CR62
  doi: 10.1109/CSNET.2018.8602680
– volume: 20
  start-page: 3542
  issue: 4
  year: 2018
  ident: 55_CR19
  publication-title: IEEE Commun Surv Tutorials
  doi: 10.1109/COMST.2018.2839348
– ident: 55_CR46
– ident: 55_CR53
  doi: 10.1109/CCST.2019.8888369
– ident: 55_CR63
SSID ssib051085785
ssib053800439
ssj0002140107
Score 2.3234894
SecondaryResourceType review_article
Snippet Technology has revolutionized various aspects of human life, and networking plays an important role in this revolution. Networks have gained significant...
SourceID crossref
springer
SourceType Index Database
Publisher
SubjectTerms Computer Science
Review Article
Title An Exhaustive Parametric Analysis for Securing SDN Through Traditional, AI/ML, and Blockchain Approaches: A Systematic Review
URI https://link.springer.com/article/10.1007/s44227-024-00055-8
Volume 13
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF60Xrz4FuujzMGbXZpuspvEW6yVKrYIbaG3sNnd2CJEsRW86G93No9iRQQvOS0EZufxzczON4ScY8qRKCVcmgipqSeNplK5DhqeTISSXtLOH4_3B6I39u4mfFLS5NhZmB_9-9bc8xjzKUYSO__MOQ3WyQZHx2u1uSM6le5w-4r-G28L2rFtcoXLeguzmUQ-Pc0w56GolkE5Q_P7b1bj1GqTNI89NztkqwSNEBW3vEvWTLZHtquFDFDa5z75iDLovk8tlQ86MXiQ9uWVpeCHinsEEKNCWWN_hOH1AEbFoh7AoKVnRWGwCdFtq3_fBJlpuMJo96SmcpZBVPKPm_klRDBcckBD0WA4IOOb7qjTo-V-BapYIBZU81SkSWhcrZVyuY_IwdFCB6lMtAkt1kLjbhvFPIOhVKS2ZeeHjtKuj8dC7h6SWvacmSMCXGNqY1LEUgYhghei17RM_Sxh2vF1IOrkopJm_FLQaMRLwuRc9jHKPs5lHwd10qwEHpcmNf_j-PH_jp-QTWaX-OallFNSW7y-mTNEFoukgSrFvEauWPjtf3a_AHJywpQ
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF60HvTiW6zPOXizS9NNskm8xdrSaluEttBb2OxubBGi2Ape_O_O5lGsiOB9IDCZ2fnm9Q0hV5hyxFJym8ZcKOoIraiQtoWOJ2IuhRM3suHx_oB3xs79xJ0UNDlmF-ZH_74-dxzGPIqRxOw_uy7118mG6Vwanvwmb5a245op-m-8LejHpskVLOstzGQS2fY0w5yHoln6xQ7N759ZjVOrTdIs9rR3yXYBGiHM__IeWdPpPtkpDzJA4Z8H5DNMofUxNVQ--IjBozCTV4aCH0ruEUCMCkWN_QmGdwMY5Yd6AIOWmuWFwRqE3Xq_VwORKrjFaPcsp2KWQljwj-v5DYQwXHJAQ95gOCTjdmvU7NDivgKVzOcLqtyEJ3GgbaWktF0PkYOluPITESsdGKyFzt3QkjkaQylPTMvOCyypbA_FAtc-IpX0JdXHBFyFqY1OEEtphAhOgK-mYepnMVOWp3xeJdelNqPXnEYjWhImZ7qPUPdRpvvIr5JaqfCocKn5H-In_xO_JJudUb8X9bqDh1OyxcxB36ysckYqi7d3fY4oYxFfZOb1BZd5w4g
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF60gnjxLdbnHLzZpXWTbBJvsQ9abUuhLfQWNrsbW4RYbAUv_ndn8ygtiOB9IDCZ2fnm9Q0hd5hyRFJyi0ZcKGoLraiQVg0dT0RcCjt6SIfHe33eHtvPE2eytsWfTrsXLclsp8GwNCXL6lzF1dXim20z5lKML2Yr2nGot012DFeXGeqr83phUY6ZrV9jc0HvNq0vf1WFYSa_SHeqGWZCFI3Vyzdrfv_MZvTabJ2mEal1SPZzKAlB9u-PyJZOjslBcaYBcq89Id9BAs2vqSH4wacNBsLMYxlifigYSQCRK-SV91cYNvowys73AIYyNcvKhRUIOtVetwIiUfCEMfBNTsUsgSBnJdeLRwhguGKGhqztcErGreao3qb51QUqmceXVDkxjyNfW0pJaTku4oma4sqLRaS0bxAYuvyDlszWGGB5bBp5rl-TynJRzHesM1JK3hN9TsBRmPDoGBGWRuBg-_iWGv5-FjFVc5XHy-S-0GY4z8g1whWNcqr7EHUfproPvTKpFAoPc0db_CF-8T_xW7I7aLTCbqf_ckn2mLnym9Zarkhp-fGprxF6LKOb1Lp-AL8Sy9g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Exhaustive+Parametric+Analysis+for+Securing+SDN+Through+Traditional%2C+AI%2FML%2C+and+Blockchain+Approaches%3A+A+Systematic+Review&rft.jtitle=The+International+journal+of+networked+and+distributed+computing+%28Online%29&rft.au=Shahzad%2C+Muhammad&rft.au=Rizvi%2C+Safdar&rft.au=Khan%2C+Talha+Ahmed&rft.au=Ahmad%2C+Sadique&rft.date=2025-06-01&rft.issn=2211-7938&rft.eissn=2211-7946&rft.volume=13&rft.issue=1&rft_id=info:doi/10.1007%2Fs44227-024-00055-8&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s44227_024_00055_8
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2211-7938&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2211-7938&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2211-7938&client=summon