An Exhaustive Parametric Analysis for Securing SDN Through Traditional, AI/ML, and Blockchain Approaches: A Systematic Review
Technology has revolutionized various aspects of human life, and networking plays an important role in this revolution. Networks have gained significant importance with the evolution of technology. Traditional networks have served human life for decades but cannot provide future networking requireme...
Saved in:
Published in | The International journal of networked and distributed computing (Online) Vol. 13; no. 1 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Dordrecht
Springer Netherlands
01.06.2025
|
Subjects | |
Online Access | Get full text |
ISSN | 2211-7938 2211-7946 |
DOI | 10.1007/s44227-024-00055-8 |
Cover
Abstract | Technology has revolutionized various aspects of human life, and networking plays an important role in this revolution. Networks have gained significant importance with the evolution of technology. Traditional networks have served human life for decades but cannot provide future networking requirements. Software-defined networking (SDN) is a major paradigm shift in the networking field; it provides an efficient way of managing and controlling networks by separating the control layer from the data layer. SDN has gained significant attention from researchers and industry experts in recent years. However, to accept SDN as a replacement for traditional networking, several areas need to be improved, and security is one of them. This exhaustive literature survey presents a detailed analysis of security solutions proposed by researchers for SDN security. This literature review can be classified into three main categories of SDN security solutions: conventional network security solutions, machine learning (ML)-based, and blockchain-based security solutions. A detailed domain analysis has been performed, and the proposed strategies and their results have been evaluated. Moreover, the shortcomings and contributions of previous approaches toward scientific society have been analyzed to facilitate the new research. This research has completed a detailed and diversified literature review to have wide concrete knowledge regarding the future trends for designing and developing innovative SDN security solutions. An exhaustive literature review revealed that various ML-based SDN security approaches have been proposed, including convolutional neural network (CNN), support vector machine (SVM), and k-nearest neighbors (KNN). Among these ML algorithms, CNN and SVM were found to be more effective and state-of-the-art in securing the SDN. Parametric analysis of different researchers demonstrated that blockchain-based flow rules, blockchain-based packet parsers, and controller authentication outperformed while securing the SDN networks. The paper covered all the aspects of previous research that have been experimented with to determine the robust and concrete techniques for the security of SDN networks. |
---|---|
AbstractList | Technology has revolutionized various aspects of human life, and networking plays an important role in this revolution. Networks have gained significant importance with the evolution of technology. Traditional networks have served human life for decades but cannot provide future networking requirements. Software-defined networking (SDN) is a major paradigm shift in the networking field; it provides an efficient way of managing and controlling networks by separating the control layer from the data layer. SDN has gained significant attention from researchers and industry experts in recent years. However, to accept SDN as a replacement for traditional networking, several areas need to be improved, and security is one of them. This exhaustive literature survey presents a detailed analysis of security solutions proposed by researchers for SDN security. This literature review can be classified into three main categories of SDN security solutions: conventional network security solutions, machine learning (ML)-based, and blockchain-based security solutions. A detailed domain analysis has been performed, and the proposed strategies and their results have been evaluated. Moreover, the shortcomings and contributions of previous approaches toward scientific society have been analyzed to facilitate the new research. This research has completed a detailed and diversified literature review to have wide concrete knowledge regarding the future trends for designing and developing innovative SDN security solutions. An exhaustive literature review revealed that various ML-based SDN security approaches have been proposed, including convolutional neural network (CNN), support vector machine (SVM), and k-nearest neighbors (KNN). Among these ML algorithms, CNN and SVM were found to be more effective and state-of-the-art in securing the SDN. Parametric analysis of different researchers demonstrated that blockchain-based flow rules, blockchain-based packet parsers, and controller authentication outperformed while securing the SDN networks. The paper covered all the aspects of previous research that have been experimented with to determine the robust and concrete techniques for the security of SDN networks. |
ArticleNumber | 12 |
Author | Shahzad, Muhammad Khan, Talha Ahmed Ateya, Abdelhamied A. Ahmad, Sadique Rizvi, Safdar |
Author_xml | – sequence: 1 givenname: Muhammad surname: Shahzad fullname: Shahzad, Muhammad organization: Department of Computer Science, Bahria University – sequence: 2 givenname: Safdar surname: Rizvi fullname: Rizvi, Safdar organization: Department of Computer Science, Bahria University – sequence: 3 givenname: Talha Ahmed surname: Khan fullname: Khan, Talha Ahmed organization: Department of Computer Science, Bahria University – sequence: 4 givenname: Sadique surname: Ahmad fullname: Ahmad, Sadique organization: EIAS Data Science and BlockChain Lab, CCIS, Prince Sultan University – sequence: 5 givenname: Abdelhamied A. orcidid: 0000-0002-1610-9612 surname: Ateya fullname: Ateya, Abdelhamied A. email: aateya@psu.edu.sa organization: EIAS Data Science and BlockChain Lab, CCIS, Prince Sultan University, Department of Electronics and Communications Engineering, Zagazig University |
BookMark | eNp9kL1OwzAUhS0EEqX0BZj8AA11nDhx2EIpUKn8iJbZcu2bxtDGkZ0UOvDupBQxMt07nO9I5ztDx5WtAKGLkFyGhKQjH8eUpgGhcUAIYSzgR6hHaRgGaRYnx39_xE_RwHuzJCwknKWc9dBXXuHJZylb35gt4Gfp5AYaZxTOK7neeeNxYR2eg2qdqVZ4fvOIF6Wz7arECye1aYztgkOcT0cPsyGWlcbXa6veVSlNhfO6dlaqEvwVzvF85xvYyKZrf4GtgY9zdFLItYfB7-2j19vJYnwfzJ7upuN8FijKkybQrEiKZQaR1kpFLM262TrRvJBLDVlII8o5CUHRGBRAUiQ8pmlGlI7SLpaxqI_ooVc5672DQtTObKTbiZCIvUNxcCg6h-LHoeAdFB0gX--ngxNvtnXdWP8f9Q0v3HdU |
Cites_doi | 10.1109/WAINA.2017.100 10.2298/CSIS210222001G 10.1109/SURV.2014.012214.00180 10.1155/2023/6013270 10.1109/TDSC.2022.3158690 10.1109/ACCESS.2020.2992580 10.21203/rs.3.rs-1648186/v1 10.1016/j.vehcom.2023.100663 10.1007/s10922-022-09682-4 10.1109/WPMC.2017.8301788 10.1145/2491185.2491212 10.3390/app13053183 10.3390/su141911950 10.1007/s10207-023-00687-x 10.32604/cmes.2022.020724 10.3390/en16031510 10.1109/ICUFN55119.2022.9829621 10.1016/j.inffus.2020.12.006 10.1016/j.jnca.2019.01.019 10.3390/fi13050111 10.1109/ICUFN.2015.7182679 10.1109/ACCESS.2020.2964751 10.1109/ACCESS.2019.2930715 10.1007/978-3-030-36625-4_3 10.1016/j.jnca.2020.102814 10.1016/j.comnet.2022.108802 10.1109/Trustcom.2015.454 10.1109/JIOT.2020.3017354 10.1109/PDCAT.2016.064 10.3390/electronics9030413 10.1371/journal.pone.0291596 10.3390/jsan8010015 10.1007/978-981-16-4244-9_3 10.1109/ACCESS.2020.2999668 10.1177/08944393221110148 10.1016/j.comnet.2023.109905 10.1049/wss2.12031 10.1109/COMST.2018.2866942 10.1109/IPTCOMM.2017.8169748 10.1145/3368926.3369709 10.1016/j.future.2022.01.017 10.1007/978-3-319-64653-4_1 10.1109/ACCESS.2021.3101650 10.1109/SmartIoT.2019.00044 10.1109/ICC.2018.8422405 10.1109/ACCESS.2022.3148134 10.9734/ajrcos/2021/v9i230216 10.1109/ACCAI53970.2022.9752574 10.3390/s22207896 10.1016/j.csi.2017.01.005 10.1016/j.comnet.2021.108015 10.1109/ACCESS.2023.3260777 10.1002/9781119857921.ch10 10.3390/sym14081563 10.1002/spy2.178 10.14569/IJACSA.2016.070817 10.3390/electronics11070996 10.1007/978-3-030-22277-2_14 10.1109/ICC.2017.7997249 10.1109/comst.2023.3244674 10.1109/JIOT.2017.2685596 10.1109/ICCWorkshops50388.2021.9473709 10.1109/INFOCOMWKSHPS50562.2020.9162669 10.1109/NCA.2019.8935066 10.1007/978-3-030-91738-8_54 10.3390/s23020890 10.1016/j.jnca.2020.102595 10.3390/systems11060296 10.1016/j.iot.2023.100715 10.1007/978-3-030-30149-1_22 10.1007/s11277-023-10402-7 10.12928/telkomnika.v17i6.13119 10.1109/ICCCN.2019.8846954 10.1109/JPROC.2014.2371999 10.3390/fi16050168 10.1109/ISCC47284.2019.8969780 10.1109/ICSSS54381.2022.9782292 10.1016/j.cose.2019.101629 10.3390/electronics10151787 10.1587/transinf.2021BCP0013 10.1016/j.jksuci.2023.02.001 10.1109/CSNET.2018.8602680 10.1109/COMST.2018.2839348 10.1109/CCST.2019.8888369 |
ContentType | Journal Article |
Copyright | The Author(s) 2025 |
Copyright_xml | – notice: The Author(s) 2025 |
DBID | C6C AAYXX CITATION |
DOI | 10.1007/s44227-024-00055-8 |
DatabaseName | Springer Nature OA Free Journals CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: C6C name: Springer Nature OA Free Journals url: http://www.springeropen.com/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2211-7946 |
ExternalDocumentID | 10_1007_s44227_024_00055_8 |
GrantInformation_xml | – fundername: Prince Sultan University grantid: Prince Sultan University funderid: http://dx.doi.org/10.13039/501100012639 |
GroupedDBID | 0R~ AAFWJ AAJSJ AAKKN AASML ABEEZ ACACY ACULB ADBBV AFGXO AFPKN ALMA_UNASSIGNED_HOLDINGS BCNDV C24 C6C EBLON EBS GROUPED_DOAJ OK1 SOJ AAYXX CITATION |
ID | FETCH-LOGICAL-c286t-d5f6fb9e3ddcc3579100d6d8fabde912328801ec24ecee6f6842790cd37d6d953 |
IEDL.DBID | C6C |
ISSN | 2211-7938 |
IngestDate | Thu Sep 11 00:31:37 EDT 2025 Tue Jul 15 01:10:17 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | Software defined networks SDN security Artificial intelligence Blockchain |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c286t-d5f6fb9e3ddcc3579100d6d8fabde912328801ec24ecee6f6842790cd37d6d953 |
ORCID | 0000-0002-1610-9612 |
OpenAccessLink | https://doi.org/10.1007/s44227-024-00055-8 |
ParticipantIDs | crossref_primary_10_1007_s44227_024_00055_8 springer_journals_10_1007_s44227_024_00055_8 |
PublicationCentury | 2000 |
PublicationDate | 2025-06-01 |
PublicationDateYYYYMMDD | 2025-06-01 |
PublicationDate_xml | – month: 06 year: 2025 text: 2025-06-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Dordrecht |
PublicationPlace_xml | – name: Dordrecht |
PublicationTitle | The International journal of networked and distributed computing (Online) |
PublicationTitleAbbrev | Int J Netw Distrib Comput |
PublicationYear | 2025 |
Publisher | Springer Netherlands |
Publisher_xml | – name: Springer Netherlands |
References | 55_CR5 55_CR46 T Alharbi (55_CR4) 2020; 8 55_CR49 R Sahay (55_CR2) 2019; 131 55_CR48 IM Varma (55_CR95) 2023; 44 P Ohri (55_CR47) 2022; 12 E Barka (55_CR69) 2021; 10 P Hadem (55_CR56) 2021; 191 55_CR6 55_CR81 55_CR80 55_CR43 A Muthanna (55_CR7) 2019; 8 55_CR42 55_CR45 S Schaller (55_CR17) 2017; 54 55_CR44 55_CR88 A Altaf (55_CR11) 2023; 41 55_CR82 55_CR41 55_CR85 55_CR40 N Ahmed (55_CR61) 2022; 22 55_CR84 55_CR39 AA Alashhab (55_CR64) 2022; 14 C Li (55_CR33) 2017; 4 NN Tuan (55_CR50) 2020; 9 EM Onyema (55_CR30) 2022; 14 55_CR36 55_CR35 55_CR38 X Guo (55_CR86) 2022; 19 H Nam Nguyen (55_CR9) 2021; 11 55_CR37 G Ali (55_CR77) 2023; 18 W Meng (55_CR83) 2021; 70 SH Haji (55_CR1) 2021; 9 55_CR32 55_CR76 W Li (55_CR75) 2022; 105 55_CR34 M Imran (55_CR58) 2024; 16 AS Rajasekaran (55_CR3) 2022; 52 NM Yungaicela-Naula (55_CR25) 2021; 9 R Shashidhara (55_CR72) 2021; 4 55_CR73 55_CR29 J Hu (55_CR8) 2020; 8 55_CR28 AO Alzahrani (55_CR51) 2021; 13 55_CR24 55_CR68 55_CR27 OS Al-Heety (55_CR12) 2020; 8 AE Houda (55_CR71) 2019; 7 BAA Nunes (55_CR14) 2014; 16 S Jiang (55_CR79) 2023; 12 A Yazdinejad (55_CR74) 2020; 88 B Mao (55_CR93) 2023; 25 AS Almasoud (55_CR10) 2020; 170 D Kreutz (55_CR13) 2014; 103 55_CR21 H Alshahrani (55_CR89) 2023; 16 55_CR20 J Wang (55_CR87) 2023; 74 55_CR23 55_CR67 PT Duy (55_CR70) 2022; 64 A Mansoor (55_CR65) 2023; 11 55_CR66 JCC Chica (55_CR31) 2020; 159 55_CR63 55_CR62 A Rahman (55_CR78) 2022; 30 55_CR18 SHA Kazmi (55_CR92) 2023; 130 S Algarni (55_CR15) 2022; 11 55_CR57 55_CR16 N Khan (55_CR26) 2023; 35 TE Ali (55_CR60) 2023; 13 TA Assegie (55_CR22) 2019; 17 M Yue (55_CR54) 2020; 8 A Henry (55_CR52) 2023; 23 55_CR90 55_CR91 A Abdou (55_CR19) 2018; 20 55_CR53 AH Janabi (55_CR55) 2022; 10 A Alotaibi (55_CR94) 2023; 22 J Xie (55_CR59) 2018; 21 |
References_xml | – ident: 55_CR40 doi: 10.1109/WAINA.2017.100 – volume: 19 start-page: 523 issue: 2 year: 2022 ident: 55_CR86 publication-title: Comput Sci Inform Syst doi: 10.2298/CSIS210222001G – volume: 16 start-page: 1617 issue: 3 year: 2014 ident: 55_CR14 publication-title: IEEE Commun Surv Tutorials doi: 10.1109/SURV.2014.012214.00180 – ident: 55_CR81 doi: 10.1155/2023/6013270 – volume: 12 start-page: 400 issue: 1 year: 2022 ident: 55_CR47 publication-title: Int J Comput Digit Syst – ident: 55_CR28 doi: 10.1109/TDSC.2022.3158690 – volume: 8 start-page: 91028 year: 2020 ident: 55_CR12 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2992580 – ident: 55_CR20 doi: 10.21203/rs.3.rs-1648186/v1 – volume: 44 start-page: 100663 year: 2023 ident: 55_CR95 publication-title: Veh Commun doi: 10.1016/j.vehcom.2023.100663 – volume: 30 start-page: 73 issue: 4 year: 2022 ident: 55_CR78 publication-title: J Netw Syst Manage doi: 10.1007/s10922-022-09682-4 – ident: 55_CR39 doi: 10.1109/WPMC.2017.8301788 – ident: 55_CR41 doi: 10.1145/2491185.2491212 – volume: 13 start-page: 3183 issue: 5 year: 2023 ident: 55_CR60 publication-title: Appl Sci doi: 10.3390/app13053183 – ident: 55_CR91 – volume: 14 start-page: 11950 issue: 19 year: 2022 ident: 55_CR30 publication-title: Sustainability doi: 10.3390/su141911950 – ident: 55_CR84 doi: 10.1007/s10207-023-00687-x – ident: 55_CR57 doi: 10.32604/cmes.2022.020724 – volume: 16 start-page: 1510 issue: 3 year: 2023 ident: 55_CR89 publication-title: Energies doi: 10.3390/en16031510 – ident: 55_CR24 doi: 10.1109/ICUFN55119.2022.9829621 – volume: 70 start-page: 60 year: 2021 ident: 55_CR83 publication-title: Inform Fusion doi: 10.1016/j.inffus.2020.12.006 – ident: 55_CR85 – volume: 74 start-page: 103452 year: 2023 ident: 55_CR87 publication-title: J Inform Secur Appl – volume: 131 start-page: 89 year: 2019 ident: 55_CR2 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2019.01.019 – volume: 13 start-page: 111 issue: 5 year: 2021 ident: 55_CR51 publication-title: Future Internet doi: 10.3390/fi13050111 – ident: 55_CR45 doi: 10.1109/ICUFN.2015.7182679 – ident: 55_CR82 – volume: 8 start-page: 9146 year: 2020 ident: 55_CR4 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2964751 – volume: 7 start-page: 98893 year: 2019 ident: 55_CR71 publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2930715 – ident: 55_CR90 doi: 10.1007/978-3-030-36625-4_3 – volume: 170 start-page: 102814 year: 2020 ident: 55_CR10 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2020.102814 – ident: 55_CR21 doi: 10.1016/j.comnet.2022.108802 – ident: 55_CR36 doi: 10.1109/Trustcom.2015.454 – volume: 8 start-page: 2102 issue: 4 year: 2020 ident: 55_CR8 publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2020.3017354 – ident: 55_CR43 doi: 10.1109/PDCAT.2016.064 – volume: 9 start-page: 413 issue: 3 year: 2020 ident: 55_CR50 publication-title: Electronics doi: 10.3390/electronics9030413 – volume: 18 start-page: e0291596 issue: 9 year: 2023 ident: 55_CR77 publication-title: PLoS ONE doi: 10.1371/journal.pone.0291596 – volume: 8 start-page: 15 issue: 1 year: 2019 ident: 55_CR7 publication-title: J Sens Actuator Networks doi: 10.3390/jsan8010015 – ident: 55_CR23 doi: 10.1007/978-981-16-4244-9_3 – volume: 8 start-page: 104688 year: 2020 ident: 55_CR54 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2999668 – volume: 41 start-page: 1941 issue: 5 year: 2023 ident: 55_CR11 publication-title: Social Sci Comput Rev doi: 10.1177/08944393221110148 – ident: 55_CR88 doi: 10.1016/j.comnet.2023.109905 – volume: 11 start-page: 233 issue: 6 year: 2021 ident: 55_CR9 publication-title: IET Wirel Sens Syst doi: 10.1049/wss2.12031 – volume: 21 start-page: 393 issue: 1 year: 2018 ident: 55_CR59 publication-title: IEEE Commun Surv Tutorials doi: 10.1109/COMST.2018.2866942 – ident: 55_CR67 doi: 10.1109/IPTCOMM.2017.8169748 – ident: 55_CR27 – ident: 55_CR68 doi: 10.1145/3368926.3369709 – ident: 55_CR5 doi: 10.1016/j.future.2022.01.017 – ident: 55_CR34 doi: 10.1007/978-3-319-64653-4_1 – volume: 9 start-page: 108495 year: 2021 ident: 55_CR25 publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3101650 – ident: 55_CR6 doi: 10.1109/SmartIoT.2019.00044 – ident: 55_CR44 doi: 10.1109/ICC.2018.8422405 – volume: 10 start-page: 14301 year: 2022 ident: 55_CR55 publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3148134 – volume: 9 start-page: 1 issue: 2 year: 2021 ident: 55_CR1 publication-title: Asian J Res Comput Sci doi: 10.9734/ajrcos/2021/v9i230216 – ident: 55_CR29 doi: 10.1109/ACCAI53970.2022.9752574 – volume: 22 start-page: 7896 issue: 20 year: 2022 ident: 55_CR61 publication-title: Sensors doi: 10.3390/s22207896 – volume: 54 start-page: 197 year: 2017 ident: 55_CR17 publication-title: Comput Stand Interfaces doi: 10.1016/j.csi.2017.01.005 – volume: 191 start-page: 108015 year: 2021 ident: 55_CR56 publication-title: Comput Netw doi: 10.1016/j.comnet.2021.108015 – ident: 55_CR49 doi: 10.1109/ACCESS.2023.3260777 – ident: 55_CR35 doi: 10.1002/9781119857921.ch10 – volume: 14 start-page: 1563 issue: 8 year: 2022 ident: 55_CR64 publication-title: Symmetry doi: 10.3390/sym14081563 – volume: 4 start-page: e178 issue: 6 year: 2021 ident: 55_CR72 publication-title: Secur Priv doi: 10.1002/spy2.178 – ident: 55_CR32 doi: 10.14569/IJACSA.2016.070817 – volume: 11 start-page: 996 issue: 7 year: 2022 ident: 55_CR15 publication-title: Electronics doi: 10.3390/electronics11070996 – ident: 55_CR18 doi: 10.1007/978-3-030-22277-2_14 – ident: 55_CR42 doi: 10.1109/ICC.2017.7997249 – volume: 12 start-page: 121 issue: 12 year: 2023 ident: 55_CR79 publication-title: Int J Cybernetics Inf (IJCI) – volume: 25 start-page: 1095 year: 2023 ident: 55_CR93 publication-title: IEEE Commun Surv Tutor Secondquarter doi: 10.1109/comst.2023.3244674 – volume: 4 start-page: 1156 issue: 5 year: 2017 ident: 55_CR33 publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2017.2685596 – ident: 55_CR16 doi: 10.1109/ICCWorkshops50388.2021.9473709 – ident: 55_CR80 doi: 10.1109/INFOCOMWKSHPS50562.2020.9162669 – ident: 55_CR66 doi: 10.1109/NCA.2019.8935066 – ident: 55_CR48 doi: 10.1007/978-3-030-91738-8_54 – volume: 23 start-page: 890 issue: 2 year: 2023 ident: 55_CR52 publication-title: Sensors doi: 10.3390/s23020890 – volume: 159 start-page: 102595 year: 2020 ident: 55_CR31 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2020.102595 – volume: 11 start-page: 296 issue: 6 year: 2023 ident: 55_CR65 publication-title: Systems doi: 10.3390/systems11060296 – volume: 22 start-page: 100715 year: 2023 ident: 55_CR94 publication-title: Internet Things doi: 10.1016/j.iot.2023.100715 – ident: 55_CR38 doi: 10.1007/978-3-030-30149-1_22 – volume: 64 start-page: 103080 year: 2022 ident: 55_CR70 publication-title: J Inform Secur Appl – volume: 130 start-page: 2753 year: 2023 ident: 55_CR92 publication-title: Wirel Pers Commun doi: 10.1007/s11277-023-10402-7 – volume: 17 start-page: 3168 issue: 6 year: 2019 ident: 55_CR22 publication-title: TELKOMNIKA (Telecommunication Comput Electron Control) doi: 10.12928/telkomnika.v17i6.13119 – ident: 55_CR37 doi: 10.1109/ICCCN.2019.8846954 – volume: 52 start-page: 102039 year: 2022 ident: 55_CR3 publication-title: Sustain Energy Technol Assess – volume: 103 start-page: 14 issue: 1 year: 2014 ident: 55_CR13 publication-title: Proc IEEE doi: 10.1109/JPROC.2014.2371999 – volume: 16 start-page: 168 issue: 5 year: 2024 ident: 55_CR58 publication-title: Future Internet doi: 10.3390/fi16050168 – ident: 55_CR73 doi: 10.1109/ISCC47284.2019.8969780 – ident: 55_CR76 doi: 10.1109/ICSSS54381.2022.9782292 – volume: 88 start-page: 101629 year: 2020 ident: 55_CR74 publication-title: Computers Secur doi: 10.1016/j.cose.2019.101629 – volume: 10 start-page: 1787 issue: 15 year: 2021 ident: 55_CR69 publication-title: Electronics doi: 10.3390/electronics10151787 – volume: 105 start-page: 272 issue: 2 year: 2022 ident: 55_CR75 publication-title: IEICE Trans Inf Syst doi: 10.1587/transinf.2021BCP0013 – volume: 35 start-page: 176 issue: 3 year: 2023 ident: 55_CR26 publication-title: J King Saud University-Computer Inform Sci doi: 10.1016/j.jksuci.2023.02.001 – ident: 55_CR62 doi: 10.1109/CSNET.2018.8602680 – volume: 20 start-page: 3542 issue: 4 year: 2018 ident: 55_CR19 publication-title: IEEE Commun Surv Tutorials doi: 10.1109/COMST.2018.2839348 – ident: 55_CR46 – ident: 55_CR53 doi: 10.1109/CCST.2019.8888369 – ident: 55_CR63 |
SSID | ssib051085785 ssib053800439 ssj0002140107 |
Score | 2.3234894 |
SecondaryResourceType | review_article |
Snippet | Technology has revolutionized various aspects of human life, and networking plays an important role in this revolution. Networks have gained significant... |
SourceID | crossref springer |
SourceType | Index Database Publisher |
SubjectTerms | Computer Science Review Article |
Title | An Exhaustive Parametric Analysis for Securing SDN Through Traditional, AI/ML, and Blockchain Approaches: A Systematic Review |
URI | https://link.springer.com/article/10.1007/s44227-024-00055-8 |
Volume | 13 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF60Xrz4FuujzMGbXZpuspvEW6yVKrYIbaG3sNnd2CJEsRW86G93No9iRQQvOS0EZufxzczON4ScY8qRKCVcmgipqSeNplK5DhqeTISSXtLOH4_3B6I39u4mfFLS5NhZmB_9-9bc8xjzKUYSO__MOQ3WyQZHx2u1uSM6le5w-4r-G28L2rFtcoXLeguzmUQ-Pc0w56GolkE5Q_P7b1bj1GqTNI89NztkqwSNEBW3vEvWTLZHtquFDFDa5z75iDLovk8tlQ86MXiQ9uWVpeCHinsEEKNCWWN_hOH1AEbFoh7AoKVnRWGwCdFtq3_fBJlpuMJo96SmcpZBVPKPm_klRDBcckBD0WA4IOOb7qjTo-V-BapYIBZU81SkSWhcrZVyuY_IwdFCB6lMtAkt1kLjbhvFPIOhVKS2ZeeHjtKuj8dC7h6SWvacmSMCXGNqY1LEUgYhghei17RM_Sxh2vF1IOrkopJm_FLQaMRLwuRc9jHKPs5lHwd10qwEHpcmNf_j-PH_jp-QTWaX-OallFNSW7y-mTNEFoukgSrFvEauWPjtf3a_AHJywpQ |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF60HvTiW6zPOXizS9NNskm8xdrSaluEttBb2OxubBGi2Ape_O_O5lGsiOB9IDCZ2fnm9Q0hV5hyxFJym8ZcKOoIraiQtoWOJ2IuhRM3suHx_oB3xs79xJ0UNDlmF-ZH_74-dxzGPIqRxOw_uy7118mG6Vwanvwmb5a245op-m-8LejHpskVLOstzGQS2fY0w5yHoln6xQ7N759ZjVOrTdIs9rR3yXYBGiHM__IeWdPpPtkpDzJA4Z8H5DNMofUxNVQ--IjBozCTV4aCH0ruEUCMCkWN_QmGdwMY5Yd6AIOWmuWFwRqE3Xq_VwORKrjFaPcsp2KWQljwj-v5DYQwXHJAQ95gOCTjdmvU7NDivgKVzOcLqtyEJ3GgbaWktF0PkYOluPITESsdGKyFzt3QkjkaQylPTMvOCyypbA_FAtc-IpX0JdXHBFyFqY1OEEtphAhOgK-mYepnMVOWp3xeJdelNqPXnEYjWhImZ7qPUPdRpvvIr5JaqfCocKn5H-In_xO_JJudUb8X9bqDh1OyxcxB36ysckYqi7d3fY4oYxFfZOb1BZd5w4g |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF60gnjxLdbnHLzZpXWTbBJvsQ9abUuhLfQWNrsbW4RYbAUv_ndn8ygtiOB9IDCZ2fnm9Q0hd5hyRFJyi0ZcKGoLraiQVg0dT0RcCjt6SIfHe33eHtvPE2eytsWfTrsXLclsp8GwNCXL6lzF1dXim20z5lKML2Yr2nGot012DFeXGeqr83phUY6ZrV9jc0HvNq0vf1WFYSa_SHeqGWZCFI3Vyzdrfv_MZvTabJ2mEal1SPZzKAlB9u-PyJZOjslBcaYBcq89Id9BAs2vqSH4wacNBsLMYxlifigYSQCRK-SV91cYNvowys73AIYyNcvKhRUIOtVetwIiUfCEMfBNTsUsgSBnJdeLRwhguGKGhqztcErGreao3qb51QUqmceXVDkxjyNfW0pJaTku4oma4sqLRaS0bxAYuvyDlszWGGB5bBp5rl-TynJRzHesM1JK3hN9TsBRmPDoGBGWRuBg-_iWGv5-FjFVc5XHy-S-0GY4z8g1whWNcqr7EHUfproPvTKpFAoPc0db_CF-8T_xW7I7aLTCbqf_ckn2mLnym9Zarkhp-fGprxF6LKOb1Lp-AL8Sy9g |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Exhaustive+Parametric+Analysis+for+Securing+SDN+Through+Traditional%2C+AI%2FML%2C+and+Blockchain+Approaches%3A+A+Systematic+Review&rft.jtitle=The+International+journal+of+networked+and+distributed+computing+%28Online%29&rft.au=Shahzad%2C+Muhammad&rft.au=Rizvi%2C+Safdar&rft.au=Khan%2C+Talha+Ahmed&rft.au=Ahmad%2C+Sadique&rft.date=2025-06-01&rft.issn=2211-7938&rft.eissn=2211-7946&rft.volume=13&rft.issue=1&rft_id=info:doi/10.1007%2Fs44227-024-00055-8&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s44227_024_00055_8 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2211-7938&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2211-7938&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2211-7938&client=summon |