1.
Bhunia, S. S., & Gurusamy, “Dynamic attack detection and mitigation in IoT using SDN,” In 27th International telecommunication networks and applications conference (ITNAC), 2017,pp. 1-6.
2.
Moustafa, N., Turnbull, B., & Choo, K. K. R, “An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things,” in IEEE Internet of Things Journal, vol. 6(3), 2018, pp.4815-4830.
3.
Sarica, A. K., & Angin, “Explainable security in SDN-based IoT networks,” in Sensors, vol. 20(24), 2020, pp. 7326.
4.
Al-Akhras, M., Alawairdhi, M., Alkoudari, A., & Atawneh, S, “Using machine learning to build a classification model for iot networks to detect attack signatures,” in Int. J. Comput. Netw. Commun.(IJCNC), vol. 12, 2020, pp. 99-116.
5.
Amangele, P., Reed, M. J., Al-Naday, M., Thomos, N., & Nowak, M, “Hierarchical machine learning for IoT anomaly detection in SDN,” In 2019 International Conference on Information Technologies (InfoTech), 2019-September, pp. 1-4.
6.
Sangodoyin, A. O., Akinsolu, M. O., Pillai, P., & Grout, “Detection and Classification of DDoS Flooding Attacks on Software-Defined Networks: A Case Study for the Application of Machine Learning,” in IEEE Access, vol. 9, 2021, pp. 122495-122508.
7.
Tsogbaatar, E., Bhuyan, M. H., Taenaka, Y., Fall, D., Gonchigsumlaa, K., Elmroth, E., & Kadobayashi, Y, “Sdn-enabled iot anomaly detection using ensemble learning,” In IFIP International Conference on Artificial Intelligence Applications and Innovations, Springer, Cham, 2020, June, pp. 268-280.
8.
Cheng, H., Liu, J., Xu, T., Ren, B., Mao, J., & Zhang, “Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks,” in International Journal of Sensor Networks, vol. 34(1), 2020, pp. 56-69.
9.
Amangele, P., Reed, M. J., Al-Naday, M., Thomos, N., & Nowak, “Hierarchical machine learning for IoT anomaly detection in SDN,” In International Conference on Information Technologies (InfoTech), IEEE, 2019-September, pp. 1-4.
10.
Sugi, S. S. S., & Ratna, S. R, “Investigation of machine learning techniques in intrusion detection system for IoT network,” In 3rd International Conference on Intelligent Sustainable Systems (ICISS), IEEE, 2020-December, pp. 1164-1167.
11.
Bhunia, S. S., & Gurusamy, “Dynamic attack detection and mitigation in IoT using SDN,” In 27th International telecommunication networks and applications conference (ITNAC), 2017,pp. 1-6.
12.
Sarica, A. K., & Angin, “Explainable security in SDN-based IoT networks,” in Sensors, vol. 20(24), 2020, pp. 7326.
13.
Moustafa, N., Turnbull, B., & Choo, K. K. R, “An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things,” in IEEE Internet of Things Journal, vol. 6(3), 2018, pp.4815-4830.
14.
Al-Akhras, M., Alawairdhi, M., Alkoudari, A., & Atawneh, S, “Using machine learning to build a classification model for iot networks to detect attack signatures,” in Int. J. Comput. Netw. Commun.(IJCNC), vol. 12, 2020, pp. 99-116.
15.
Tsogbaatar, E., Bhuyan, M. H., Taenaka, Y., Fall, D., Gonchigsumlaa, K., Elmroth, E., & Kadobayashi, Y, “Sdn-enabled iot anomaly detection using ensemble learning,” In IFIP International Conference on Artificial Intelligence Applications and Innovations, Springer, Cham,, 2020, June, pp. 268-280.
16.
Sangodoyin, A. O., Akinsolu, M. O., Pillai, P., & Grout, “Detection and Classification of DDoS Flooding Attacks on Software-Defined Networks: A Case Study for the Application of Machine Learning,” in IEEE Access, vol. 9, 2021, pp. 122495-122508.
17.
Cheng, H., Liu, J., Xu, T., Ren, B., Mao, J., & Zhang, “Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks,” in International Journal of Sensor Networks, vol. 34(1), 2020, pp. 56-69.
18.
Polat, H., Polat, O., & Cetin, “Detecting DDoS attacks in software-defined networks through feature selection methods and machine learning models,” in Sustainability, vol. 12(3), 2020, pp. 1035.
19.
Amangele, P., Reed, M. J., Al-Naday, M., Thomos, N., & Nowak, “Hierarchical machine learning for IoT anomaly detection in SDN,” In International Conference on Information Technologies (InfoTech), IEEE, 2019-September, pp. 1-4.
20.
Sugi, S. S. S., & Ratna, S. R, “Investigation of machine learning techniques in intrusion detection system for IoT network,” In 3rd International Conference on Intelligent Sustainable Systems (ICISS), IEEE, 2020-December, pp. 1164-1167.
21.
Zeleke, E. M., Melaku, H. M., & Mengistu, F. G, “Efficient Intrusion Detection System for SDN Orchestrated Internet of Things,” in Journal of Computer Networks and Communications, vol.2021, pp. 14.
22.
Bagui, S., Wang, X., & Bagui, S, “Machine Learning Based Intrusion Detection for IoT Botnet,” in International Journal of Machine Learning and Computing, vol. 11(6), 2021, pp. 399-406.
23.
Satheesh, N., Rathnamma, M. V., Rajeshkumar, G., Sagar, P. V., Dadheech, P., Dogiwal, S. R., ... & Sengan, S, “Flow-based anomaly intrusion detection using machine learning model with software defined networking for OpenFlow network,” in Microprocessors and Microsystems, vol. 79, 2020, pp.103285.
24.
Jafarian, T., Masdari, M., Ghaffari, A., & Majidzadeh, K, “Security anomaly detection in software?defined networking based on a prediction technique,” in International Journal of Communication Systems, vol. 33(14), 2020, pp. e4524.
25.
Dey, S. K., & Rahman, M, “Effects of machine learning approach in flow-based anomaly detection on software-defined networking,” in Symmetry, vol. 12(1), 2020, pp. 7.
26.
Moustafa, N, “A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets,” in Sustainable Cities and Society, vol. 72, 2021, pp. 102994.
27.
Moustafa, Nour, “New Generations of Internet of Things Datasets for Cybersecurity Applications based Machine Learning: TON_IoT Datasets,” in Proceedings of the eResearch Australasia Conference, Brisbane, Australia, 2019.
28.
https://research.unsw.edu.au/projects/toniot-datasets.
29.
Gad, A. R., Nashat, A. A., & Barkat, T. M, “Intrusion Detection System Using Machine Learning for Vehicular Ad Hoc Networks Based on ToN-IoT Dataset,” in IEEE Access, vol. 9, 2021, pp. 142206-142217.
30.
Sarhan, M., Layeghy, S., Moustafa, N., Gallagher, M., & Portmann, M, “Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks,” in arXiv:2018.12722 v1, N1, 2021.
31.
Binbusayyis, A., & Vaiyapuri, T, “Identifying and benchmarking key features for cyber intrusion detection: An ensemble approach,” in IEEE Access, vol. 7, 2019, pp. 106495-106513.
32.
Chen, P., Li, F., Wu, C, "Research on intrusion detection method based on Pearson correlation coefficient feature selection algorithm," J. Phys. Conf. Ser, vol. 1757(1), 012054, 2021, pp.10.
33.
Precision and recall definition | deepai, https://deepai.org/machine-learning-glossary-and-terms/precision-andrecal
34.
Negandhi, P., Trivedi, Y., & Mangrulkar, R, “Intrusion detection system using random forest on the NSL-KDD dataset,” In Emerging Research in Computing, Information, Communication and Applications, Springer, vol. , 2019, pp. 519-531.
35.
Almseidin, M., Alzubi, M., Kovacs, S., & Alkasassbeh, M, “Evaluation of machine learning algorithms for intrusion detection system,” In 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), 2017-September, pp. 000277-000282.
36.
B. Ingre, A. Yadav, and A. K. Soni, “Decision tree based intrusion detection system for NSL-KDD dataset,” in Information and Communication Technology for Intelligent Systems (ICTIS), vol. 2. Cham, Switzerland:Springer, 2018, pp. 207–218.
37.
C. Ioannou and V. Vassiliou, ‘‘An intrusion detection system for constrained WSN and IoT nodes based on binary logistic regression,’’ in Proc. 21st ACM Int. Conf. Modeling, Anal. Simulation Wireless Mobile Syst. Oct. 2018, pp. 259–263.
38.
Mohammadi, M., Rashid, T. A., Karim, S. H. T., Aldalwie, A. H. M., Tho, Q. T., Bidaki, M., ... & Hosseinzadeh, M, “A comprehensive survey and taxonomy of the SVM-based intrusion detection systems,” in Journal of Network and Computer Applications, vol. 178, 2021, pp. 102983.