Keyphrases
Anomaly Detection
25%
Attack Detection
25%
Barnyard
25%
Centralized Controller
25%
Collaborative Technique
100%
Control Plane
25%
Controller Unit
25%
Cooperative Detection
50%
Deep Neural Network
100%
Detection Mechanism
25%
Detection Method
50%
Detection Monitoring
25%
False Alarm
25%
Global View
25%
High Detection Rate
25%
ICMP Attack
25%
Intruder
25%
Intrusion Detection System
100%
Log Files
25%
Malicious Activity Detection
25%
Malicious Traffic Detection
25%
Network Architecture
25%
Open vSwitch
25%
OpenFlow
25%
Programmability
50%
Proposed Work
25%
Signature-based
50%
Signature-based Intrusion Detection
25%
Single Point of Failure
25%
Snort
100%
Software-defined Networking
100%
Switch Configuration
25%
System Integration
25%
System Limitations
25%
System's Sensors
25%
Traditional Network
25%
Traffic Detection
100%
Traffic Management
25%
Traffic Monitoring
25%
True Positive Rate
25%
Vulnerability
25%
Computer Science
Anomaly Detection
25%
Control Plane
25%
Deep Neural Network
100%
Detection Mechanism
25%
Detection Method
25%
Detection Rate
25%
False Positive
25%
Intrusion Detection System
100%
Malicious Activity
25%
Network Architecture
25%
OpenFlow
25%
Programmability
50%
Snort Intrusion Detection
25%
Software-Defined Network
100%
System Analysis
25%
Testbed
25%
Traffic Management
25%
Traffic Monitoring
25%
True Positive Rate
25%