Research Article

A Systematic Review for Misuses Attack Detection based on Data Mining in NFV

Volume: 6 Number: 3 December 31, 2023
EN

A Systematic Review for Misuses Attack Detection based on Data Mining in NFV

Abstract

Network Function Virtualization could be a quickly advancing innovation that guarantees to revolutionize the way networks are planned, sent, and overseen. However, as with any modern innovation, there are potential security risk that must be tended to guarantee the security of the network. Misuses attacks are one such risk that can compromise the security and integrity of NFV frameworks. In recently years , data mining has risen as a promising approach for recognizing misuses attacks in NFV systems. This systematic mapping ponders points to supply an overview of the existing research on misuses attack detection based on data mining in NFV. Particularly, the study will recognize and analyze the research conducted in this region, counting the sorts of data mining methods utilized, the types of misuses attacks identified, and the assessment strategies utilized. The results of this study will give experiences into the current state of investigate on misuses attack detection based on data mining in NFV, as well as recognize gaps and openings for future research in this range. Also, the study will serve as an important asset for analysts and professionals looking for to create successful and effective methods for recognizing misuses attacks in NFV frameworks

Keywords

References

  1. [1] Firoozjaei, et al (2017). Security challenges with network functions virtualization. Future Generation Computer Systems, 67, 315-324. ‏ [2] Alnaim, A. K., Alwakeel, A. M., & Fernandez, E. B. (2022). Towards a security reference architecture for NFV. Sensors, 22(10), 3750.
  2. [3] Guleria, P., & Sood, M. (2014). Data mining in education: A review on the knowledge discovery perspective. International Journal of Data Mining & Knowledge Management Process, 4(5), 47.‏
  3. [4] Saeed, M. M. (2022). A real-time adaptive network intrusion detection for streaming data: a hybrid approach. Neural Computing and Applications, 34(8), 6227-6240.‏
  4. [5] Abbas, A. K., Fleh, S. Q., & Safi, H. H. (2015). Systematic Mapping Study On Managing Variability In Software Product Line Engineering: Communication. Diyala Journal of Engineering Sciences, 511-520.
  5. [6] Fleh, S. Q., Abbas, A. K., & Saffer, K. M. (2015, December). A systematic mapping study on runtime monitoring of services. In The Iraqi Journal For Mechanical And Material Engineering, Special for Babylon First International Engineering Conference, Issue (A).
  6. [7] Hameed, S. S., Hassan, W. H., Latiff, L. A., & Ghabban, F. (2021). A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches. PeerJ Computer Science, 7, e414.‏
  7. [8] Zhao, Y., Li, Y., Zhang, X., Geng, G., Zhang, W., & Sun, Y. (2019). A survey of networking applications applying the software defined networking concept based on machine learning. IEEE Access, 7, 95397-95417.‏
  8. [9] Ferrag, M. A., Shu, L., Djallel, H., & Choo, K. K. R. (2021). Deep learning-based intrusion detection for distributed denial of service attack in agriculture 4.0. Electronics, 10(11), 1257.‏

Details

Primary Language

English

Subjects

Computer Software

Journal Section

Research Article

Early Pub Date

December 27, 2023

Publication Date

December 31, 2023

Submission Date

October 20, 2023

Acceptance Date

December 20, 2023

Published in Issue

Year 2023 Volume: 6 Number: 3

APA
Ibrahim, N., Abbas, A., & Khorsheed, F. (2023). A Systematic Review for Misuses Attack Detection based on Data Mining in NFV. Sakarya University Journal of Computer and Information Sciences, 6(3), 239-252. https://doi.org/10.35377/saucis...1379047
AMA
1.Ibrahim N, Abbas A, Khorsheed F. A Systematic Review for Misuses Attack Detection based on Data Mining in NFV. SAUCIS. 2023;6(3):239-252. doi:10.35377/saucis.1379047
Chicago
Ibrahim, Nebras, Ahmed Abbas, and Farah Khorsheed. 2023. “A Systematic Review for Misuses Attack Detection Based on Data Mining in NFV”. Sakarya University Journal of Computer and Information Sciences 6 (3): 239-52. https://doi.org/10.35377/saucis. 1379047.
EndNote
Ibrahim N, Abbas A, Khorsheed F (December 1, 2023) A Systematic Review for Misuses Attack Detection based on Data Mining in NFV. Sakarya University Journal of Computer and Information Sciences 6 3 239–252.
IEEE
[1]N. Ibrahim, A. Abbas, and F. Khorsheed, “A Systematic Review for Misuses Attack Detection based on Data Mining in NFV”, SAUCIS, vol. 6, no. 3, pp. 239–252, Dec. 2023, doi: 10.35377/saucis...1379047.
ISNAD
Ibrahim, Nebras - Abbas, Ahmed - Khorsheed, Farah. “A Systematic Review for Misuses Attack Detection Based on Data Mining in NFV”. Sakarya University Journal of Computer and Information Sciences 6/3 (December 1, 2023): 239-252. https://doi.org/10.35377/saucis. 1379047.
JAMA
1.Ibrahim N, Abbas A, Khorsheed F. A Systematic Review for Misuses Attack Detection based on Data Mining in NFV. SAUCIS. 2023;6:239–252.
MLA
Ibrahim, Nebras, et al. “A Systematic Review for Misuses Attack Detection Based on Data Mining in NFV”. Sakarya University Journal of Computer and Information Sciences, vol. 6, no. 3, Dec. 2023, pp. 239-52, doi:10.35377/saucis. 1379047.
Vancouver
1.Nebras Ibrahim, Ahmed Abbas, Farah Khorsheed. A Systematic Review for Misuses Attack Detection based on Data Mining in NFV. SAUCIS. 2023 Dec. 1;6(3):239-52. doi:10.35377/saucis. 1379047

Cited By

 

INDEXING & ABSTRACTING & ARCHIVING

 

31045 31044   ResimLink - Resim Yükle  31047 

31043 28939 28938 34240
 

 

29070    The papers in this journal are licensed under a Creative Commons Attribution-NonCommercial 4.0 International License