<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="review-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2023-9-6-42-57</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-528</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ЭЛЕКТРОНИКА, ФОТОНИКА, ПРИБОРОСТРОЕНИЕ И СВЯЗЬ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>ELECTRONICS, PHOTONICS, INSTRUMENTATION AND COMMUNICATIONS</subject></subj-group></article-categories><title-group><article-title>Анализ методов идентификации трафика для управления ресурсами в SDN</article-title><trans-title-group xml:lang="en"><trans-title>Analyzing Traffic Identification Methods for Resource Management in SDN</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-7736-7121</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Дмитриева</surname><given-names>Ю. С.</given-names></name><name name-style="western" xml:lang="en"><surname>Dmitrieva</surname><given-names>J.</given-names></name></name-alternatives><bio xml:lang="ru"><p>ассистент кафедры инфокоммуникационных сетей и систем Санкт-Петербургского государственного университета телекоммуникаций им. проф. М.А. Бонч-Бруевича</p></bio><email xlink:type="simple">dmitrieva@sut.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0009-0005-4241-8784</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Окунева</surname><given-names>Д. В.</given-names></name><name name-style="western" xml:lang="en"><surname>Okuneva</surname><given-names>D.</given-names></name></name-alternatives><bio xml:lang="ru"><p>кандидат технических наук, декан факультета инфокоммуникационных сетей и систем Санкт-Петербургского государственного университета телекоммуникаций им. проф. М.А. Бонч-Бруевича</p></bio><email xlink:type="simple">okuneva.dv@sut.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-4077-6869</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Елагин</surname><given-names>В. С.</given-names></name><name name-style="western" xml:lang="en"><surname>Elagin</surname><given-names>V.</given-names></name></name-alternatives><bio xml:lang="ru"><p>кандидат технических наук, доцент, доцент кафедры инфокоммуникационных систем Санкт-Петербургского государственного университета телекоммуникаций им. проф. М.А. Бонч-Бруевича</p></bio><email xlink:type="simple">v.elagin@sut.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича<country>Россия</country></aff><aff xml:lang="en">The Bonch-Bruevich Saint-Petersburg State University of Telecommunications<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2023</year></pub-date><pub-date pub-type="epub"><day>25</day><month>12</month><year>2023</year></pub-date><volume>9</volume><issue>6</issue><fpage>42</fpage><lpage>57</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Дмитриева Ю.С., Окунева Д.В., Елагин В.С., 2023</copyright-statement><copyright-year>2023</copyright-year><copyright-holder xml:lang="ru">Дмитриева Ю.С., Окунева Д.В., Елагин В.С.</copyright-holder><copyright-holder xml:lang="en">Dmitrieva J., Okuneva D., Elagin V.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/528">https://tuzs.sut.ru/jour/article/view/528</self-uri><abstract><p>Статья посвящена анализу методов классификации трафика в сети SDN. Выполнен обзор аналитических подходов идентификации трафика для выявления применяемых в них решений, а также оценки их применимости в сети SDN. Рассмотрены виды машинного обучения и выполнен анализ входных параметров. Методы интеллектуального анализа, освещенные в научных статьях, систематизированы по следующим критериям: параметры идентификации трафика, модель нейронной сети, точность идентификации. На основании анализа результатов обзора сделан вывод о возможности применения рассмотренных решений, а также о необходимости формирования схемы сети SDN с модулем элементов искусственного интеллекта для балансировки нагрузки.</p></abstract><trans-abstract xml:lang="en"><p>The article is devoted to the analysis of traffic classification methods in SDN network. The review of analytical approaches of traffic identification to identify the solutions used in them, as well as assessing their applicability in the SDN network. Types of machine learning are considered and input parameters are analyzed. The methods of intelligent analysis covered in the scientific articles are systematized according to the following criteria: traffic identification parameters, neural network model, identification accuracy. Based on the analysis of the review results, the conclusion is made about the possibility of applying the considered solutions, as well as the need to form a scheme of SDN network with a module of artificial intelligence elements for load balancing.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>Software-Defined Networking (SDN)</kwd><kwd>Программно-конфигурируемая сеть (ПКС)</kwd><kwd>Deep packet inspection (DPI)</kwd><kwd>Machine learning (ML)</kwd><kwd>Deep learning (DL)</kwd><kwd>Convolutional Neural Network (CNN)</kwd><kwd>искусственный интеллект (ИИ)</kwd></kwd-group><kwd-group xml:lang="en"><kwd>Software-Defined Networking (SDN)</kwd><kwd>Deep packet inspection (DPI)</kwd><kwd>Machine learning (ML)</kwd><kwd>Deep learning (DL)</kwd><kwd>Convolutional Neural Network (CNN)</kwd><kwd>Artificial Intelligence (AI)</kwd></kwd-group><funding-group xml:lang="ru"><funding-statement>Публикация подготовлена в рамках прикладных научных исследований СПбГУТ, регистрационный номер 123060900012-6 в ЕГИСУ НИОКТР</funding-statement></funding-group><funding-group xml:lang="en"><funding-statement>The scientific article was prepared in the framework of applied scientific research of SPBSUT, registration number 123060900012-6 in EGISU R&amp;D.</funding-statement></funding-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Дмитриева Ю.С. Сравнительный анализ методов управления сетевыми ресурсами в сетях SDN // Труды учебных заведений связи. 2022. Т. 8. № 1. С. 78‒83. DOI:10.31854/1813-324X-2022-8-1-73-83</mixed-citation><mixed-citation xml:lang="en">Dmitrieva J. Comparative Analysis of Network Resource Management Methods in SDN. Proceedings of Telecommun. Univ. 2022;8(1):73‒83. DOI:10.31854/1813-324X-2022-8-1-73-83</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Kirichek R., Vladyko A., Zakharov M, Koucheryavy A. Model networks for Internet of Things and SDN // Proceedings of the 18th International Conference on Advanced Communication Technology (ICACT, PyeongChang, Korea (South), 31 January 2016 ‒ 03 February 2016). IEEE, 2016. PP. 76‒79. DOI:10.1109/ICACT.2016.7423280</mixed-citation><mixed-citation xml:lang="en">Kirichek R., Vladyko A., Zakharov M, Koucheryavy A. Model networks for Internet of Things and SDN. Proceedings of the 18th International Conference on Advanced Communication Technology, ICACT, 31 January 2016 ‒ 03 February 2016, PyeongChang, Korea (South). IEEE; 2016. p.76‒79. DOI:10.1109/ICACT.2016.7423280</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Muhizi S., Shamshin G., Muthanna A., Kirichek R., Vladyko A., Koucheryavy A. Analysis and Performance Evaluation of SDN Queue Model // Proceedings of the 15th IFIP WG 6.2 International Conference on Wired/Wireless Internet Communications (WWIC, St. Petersburg, Russian Federation, 21–23 June 2017. Lecture Notes in Computer Science. Cham: Springer, 2017. Vol. 10372. PP. 26–37. DOI:10.1007/978-3-319-61382-6_3</mixed-citation><mixed-citation xml:lang="en">Muhizi S., Shamshin G., Muthanna A., Kirichek R., Vladyko A., Koucheryavy A. Analysis and Performance Evaluation of SDN Queue Model. Proceedings of the15th IFIP WG 6.2 International Conference on Wired/Wireless Internet Communications, WWIC, 21–23 June 2017, St. Petersburg, Russian Federation. Lecture Notes in Computer Science, vol.10372. Cham: Springer; 2017. p.26–37. DOI:10.1007/978-3-319-61382-6_3</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Гетьман А.И., Иконникова М.К. Обзор методов классификации сетевого трафика с использованием машинного обучения // Труды института системного программирования РАН. 2020. Т. 32. № 6. С. 137‒154. DOI:10.15514/ISPRAS-2020-32(6)-11</mixed-citation><mixed-citation xml:lang="en">Getman A.I., Ikonnikov M.K. A survey of network traffic classification methods using machine learning. Proceedings of ISP RAS. 2020;32(6):137‒154. DOI:10.15514/ISPRAS–2020–32(6)–11</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Черниговский А.В., Кривов М.В. Нейронные сети как инструмент анализа сетевого трафика // Вестник Ангарского государственного технического университета. 2019. № 13. С. 151‒157. DOI:10.36629/2686-777x-2019-1-13-151-157</mixed-citation><mixed-citation xml:lang="en">Chernigovskiy A.V., Krivov M.V. Neural networks as an instrument of analysis of network traffic. Bulletin of the Angarsk State Technical University. 2019;13:151‒157. DOI:10.36629/2686-777x-2019-1-13-151-157</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Гетьман А.И., Евстропов Е.Ф., Маркин Ю.В. Анализ сетевого трафика в режиме реального времени: обзор прикладных задач, подходов и решений // Препринт ИСП РАН. 2015. Т. 28. С. 1‒52.</mixed-citation><mixed-citation xml:lang="en">Getman A.I., Evstropov E.F., Markin Y.V. Wirespeed network traffic analysis: survey of applied problems, approaches and solutions. ISP RAS preprints. 2015;28:1‒52.</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Ghosh A., Senthilrajan A. Classifying Network Traffic Using DPI And DFI // International Journal of Scientific &amp; Technology Research. Lecture Notes on Data Engineering and Communications Technologies. 2019. Vol. 8. Iss. 11. PP. 3983‒3988.</mixed-citation><mixed-citation xml:lang="en">Ghosh A., Senthilrajan A. Classifying Network Traffic Using DPI And DFI. International Journal of Scientific &amp; Technology Research. 2019;8(11):3983‒3988.</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Процкая Е.П., Гай В.Е. Программная система анализа сетевого трафика // XXV Международная научно-техническая конференция «Информационные системы и технологии ‒ 2019 (Нижний Новгород, Российская Федерация, 19 апреля 2019). Нижний Новгород: Нижегородский государственный технический университет им. Р.Е. Алексеева, 2019. С. 876‒881.</mixed-citation><mixed-citation xml:lang="en">Prockaya E.P., Gai V.E. Software system analysis of network traffic. Proceedings of the XXV International Scientific and Technical Conference on Information Systems and Technologies ‒ 2019, 19 April 2019, Nizhny Novgorod, Russian Federation. Nizhny Novgorod: Nizhny Novgorod State Technical University Publ.; 2019. p.876‒881.</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Hu L., Zhang L. Real-time internet traffic identification based on decision tree // Proceedings of the World Automation Congress (Puerto Vallarta, Mexico, 24‒28 June 2012). IEEE, 2012.</mixed-citation><mixed-citation xml:lang="en">Hu L., Zhang L. Real-time internet traffic identification based on decision tree. Proceedings of the World Automation Congress, 24‒28 June 2012, Puerto Vallarta, Mexico. IEEE; 2012.</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Deebalakshmi R., Jyothi V.L. A survey of classification algorithms for network traffic // Proceedings of the Second International Conference on Science Technology Engineering and Management (ICONSTEM, Chennai, India, 30‒31 March 2016). IEEE, 2016. PP. 151‒156. DOI:10.1109/ICONSTEM.2016.7560941</mixed-citation><mixed-citation xml:lang="en">Deebalakshmi R., Jyothi V.L. A survey of classification algorithms for network traffic. Proceedings of the Second International Conference on Science Technology Engineering and Management, ICONSTEM, 30‒31 March 2016, Chennai, India. IEEE; 2016. p.151‒156. DOI:10.1109/ICONSTEM.2016.7560941</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Karagiannis T., Broido A., Brownlee N., Claffy K.C., Faloutsos M. Is P2P dying or just hiding [P2P traffic measurement] // Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM, Dallas, USA, 29 November 2004 ‒ 03 December 2004. IEEE, 2005. DOI:10.1109/GLOCOM.2004.1378239</mixed-citation><mixed-citation xml:lang="en">Karagiannis T., Broido A., Brownlee N., Claffy K.C., Faloutsos M. Is P2P dying or just hiding [P2P traffic measurement]. Proceedings of the IEEE Global Telecommunications Conference, GLOBECOM, 29 November 2004 ‒ 03 December 2004, Dallas, USA. IEEE; 2005. DOI:10.1109/GLOCOM.2004.1378239</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Kohout J., Pevny T. Network Traffic Fingerprinting Based on Approximated Kernel Two-Sample Test // IEEE Transactions on Information Forensics and Security. 2018. Vol. 13. Iss. 3. PP. 788‒801. DOI:10.1109/TIFS.2017.2768018</mixed-citation><mixed-citation xml:lang="en">Kohout J., Pevny T. Network Traffic Fingerprinting Based on Approximated Kernel Two-Sample Test. IEEE Transactions on Information Forensics and Security. 2018;13(3). DOI:10.1109/TIFS.2017.2768018</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Perera P., Tian Y.C., Fidge C., Kelly W. A Comparison of Supervised Machine Learning Algorithms for Classification of Communications Network Traffic // Proceedings of the 24th International Conference on International Conference on Neural Information Processing (ICONIP, Guangzhou, China, 14‒18 November 2017). Lecture Notes in Computer Science. Cham: Springer, 2017. Vol. 10634. PP. 445–454. DOI:10.1007/978-3-319-70087-8_47</mixed-citation><mixed-citation xml:lang="en">Perera P., Tian Y.C., Fidge C., Kelly W. A Comparison of Supervised Machine Learning Algorithms for Classification of Communications Network Traffic. Proceedings of the 24th International Conference on International Conference on Neural Information Processing, ICONIP, 14‒18 November 2017, Guangzhou, China. Lecture Notes in Computer Science, vol.10634. Cham: Springer; 2017. p. 445–454. DOI:10.1007/978-3-319-70087-8_47</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Shi H., Li H., Zhang D., Cheng C., Wu W. Efficient and robust feature extraction and selection for traffic classification // Computer Networks. 2017. Vol. 119. PP. 1‒16. DOI:10.1016/j.comnet.2017.03.011</mixed-citation><mixed-citation xml:lang="en">Shi H., Li H., Zhang D., Cheng C., Wu W. Efficient and robust feature extraction and selection for traffic classification. Computer Networks. 2017.119:1‒16. DOI:10.1016/j.comnet.2017.03.011</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Han J., Kamber M., Pie J. Data Mining: Concept and Techniques. Elsever, 2006.</mixed-citation><mixed-citation xml:lang="en">Han J., Kamber M., Pie J. Data Mining: Concept and Techniques. Elsever: 2006.</mixed-citation></citation-alternatives></ref><ref id="cit16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">Kalyan G., Lakshmi A.J. Performance Assessment of Different Classification Techniques for Intrusion Detection // JORS Journal of Computer Engineering. 2012. Vol. 7. Iss. 5. PP. 2278‒8727.</mixed-citation><mixed-citation xml:lang="en">Kalyan G., Lakshmi A.J. Performance Assessment of Different Classification Techniques for Intrusion Detection. JORS Journal of Computer Engineering. 2012;7(5):2278‒8727.</mixed-citation></citation-alternatives></ref><ref id="cit17"><label>17</label><citation-alternatives><mixed-citation xml:lang="ru">Protić D. Review of KDD CUP ‘99, NSL-KDD and Kyoto 2006+ datasets // Vojnotehnicki glasnik. 2018. Vol. 66. Iss. 3. PP. 580‒596 DOI:10.5937/vojtehg66-16670</mixed-citation><mixed-citation xml:lang="en">Protic D. Review of KDD CUP ‘99, NSL-KDD and Kyoto 2006+ datasets. Vojnotehnicki glasnik. 2018;66(3):580‒596 DOI:10.5937/vojtehg66-16670</mixed-citation></citation-alternatives></ref><ref id="cit18"><label>18</label><citation-alternatives><mixed-citation xml:lang="ru">Lotfollahi M., Zade R.S.H., Siavoshani M.J., Saberian M. Deep packet: a novel approach for encrypted traffic classification using deeplearning // Soft Computing. 2020. Vol. 24. PP. 1999–2012. DOI:10.1007/s00500-019-04030-2</mixed-citation><mixed-citation xml:lang="en">Lotfollahi M., Zade R.S.H., Siavoshani M.J., Saberian M. Deep packet: a novel approach for encrypted traffic classification using deeplearning. Soft Computing. 2020;24:1999–2012. DOI:10.1007/s00500-019-04030-2</mixed-citation></citation-alternatives></ref><ref id="cit19"><label>19</label><citation-alternatives><mixed-citation xml:lang="ru">Катасёв А.С., Катасёва Д.В., Кирпичников А.П. Нейросетевая диагностика аномальной сетевой активности // Вестник технологического университета. 2015. Т. 18. № 6. C. 163‒167.</mixed-citation><mixed-citation xml:lang="en">Katasev A.S., Kataseva D.V., Kirpichnikov A.P. Neural network diagnosis of abnormal network activity. Herald of Tekhnological Universite. 2015;18(6):163‒167.</mixed-citation></citation-alternatives></ref><ref id="cit20"><label>20</label><citation-alternatives><mixed-citation xml:lang="ru">Singh K., Agrawal S. Performance Analysis of Back Propagation Neural Network for Internet Traffic Classification // Proceedings of the National Conference on Recent Advances in Electronics and Communication Technologies (RAECT ‒ 2011). 2011.</mixed-citation><mixed-citation xml:lang="en">Singh K., Agrawal S. Performance Analysis of Back Propagation Neural Network for Internet Traffic Classification. Proceedings of the National Conference on Recent Advances in Electronics and Communication Technologies, RAECT ‒ 2011. 2011</mixed-citation></citation-alternatives></ref><ref id="cit21"><label>21</label><citation-alternatives><mixed-citation xml:lang="ru">Manju N. Multilayer Feedforward Neural Network for Internet Traffic Classification // Special Issue on Soft Computing. 2023. DOI:10.9781/ijimai.2019.11.002</mixed-citation><mixed-citation xml:lang="en">Manju N. Multilayer Feedforward Neural Network for Internet Traffic Classification. Special Issue on Soft Computing. 2023. DOI:10.9781/ijimai.2019.11.002</mixed-citation></citation-alternatives></ref><ref id="cit22"><label>22</label><citation-alternatives><mixed-citation xml:lang="ru">Абдурахманов Р.П., Тожиева Ф.К. Исследование систем управления трафиком на базе моделей нейронных сетей // Наука и мир. 2020. № 4-1;(80):26‒32.</mixed-citation><mixed-citation xml:lang="en">Abdurakhmanov R.P., Tojieva F.Q. The research of traffic management systems based on neural network models. Science and world. 2020;4-1(80):26‒32.</mixed-citation></citation-alternatives></ref><ref id="cit23"><label>23</label><citation-alternatives><mixed-citation xml:lang="ru">Ganowicz A., Starosta B., Knapińska A., Walkowiak K. Short-Term Network Traffic Prediction with Multilayer Perceptron // Proceedings of the 6th SLAAI International Conference on Artificial Intelligence (SLAAI-ICAI, Colombo, Sri Lanka, 01‒02 December 2022). IEEE, 2022. DOI:10.1109/SLAAI-ICAI56923.2022.10002431</mixed-citation><mixed-citation xml:lang="en">Ganowicz A., Starosta B., Knapińska A., Walkowiak K. Short-Term Network Traffic Prediction with Multilayer Perceptron. Proceedings of the 6th SLAAI International Conference on Artificial Intelligence, SLAAI-ICAI, 01‒02 December 2022, Colombo, Sri Lanka. IEEE: 2022. DOI:10.1109/SLAAI-ICAI56923.2022.10002431</mixed-citation></citation-alternatives></ref><ref id="cit24"><label>24</label><citation-alternatives><mixed-citation xml:lang="ru">Bikmukhamedov R.F., Nadeev A.F. Multi-Class Network Traffic Generators and Classifiers Based on Neural Networks // Systems of Signals Generating and Processing in the Field of on Board Communications (Moscow, Russian Federation, 16‒18 March 2021). IEEE, 2021. DOI:10.1109/IEEECONF51389.2021.9416067</mixed-citation><mixed-citation xml:lang="en">Bikmukhamedov R.F., Nadeev A.F. Multi-Class Network Traffic Generators and Classifiers Based on Neural Networks. Systems of Signals Generating and Processing in the Field of on Board Communications, 16‒18 March 2021, Moscow, Russian Federation. IEEE; 2021. DOI:10.1109/IEEECONF51389.2021.9416067</mixed-citation></citation-alternatives></ref><ref id="cit25"><label>25</label><citation-alternatives><mixed-citation xml:lang="ru">Azari A., Papapetrou P., Denic S., Peters G. Cellular Traffic Prediction and Classification: A Comparative Evaluation of LSTM and ARIMA // Proceedings of the 22nd International Conference on Discovery Science (DS, Split, Croatia, 28–30 October 2019). Lecture Notes in Computer Science. Cham: Springer, 2019. Vol. 11828. PP. 129–144. DOI:10.1007/978-3-030-33778-0_11</mixed-citation><mixed-citation xml:lang="en">Azari A., Papapetrou P., Denic S., Peters G. Cellular Traffic Prediction and Classification: A Comparative Evaluation of LSTM and ARIMA. Proceedings of the 22nd International Conference on Discovery Science, DS, 28–30 October 2019, Split, Croatia. Lecture Notes in Computer Science, vol.11828. Cham: Springer; 2019. p.129–144. DOI:10.1007/978-3-030-33778-0_11</mixed-citation></citation-alternatives></ref><ref id="cit26"><label>26</label><citation-alternatives><mixed-citation xml:lang="ru">Yang L., Wang Z., Feng Y., Yan H. An Effective Real-time Traffic Classification Method Using Convolutional Neural Network // Research Square. 2023. DOI:10.21203/rs.3.rs-3224251/v1</mixed-citation><mixed-citation xml:lang="en">Yang L., Wang Z., Feng Y., Yan H. An Effective Real-time Traffic Classification Method Using Convolutional Neural Network. Research Square. 2023. DOI:10.21203/rs.3.rs-3224251/v1</mixed-citation></citation-alternatives></ref><ref id="cit27"><label>27</label><citation-alternatives><mixed-citation xml:lang="ru">Chen X., Wang P., Yu J. CNN based entrypted traffic identification method // Journal of Nanjing University of Posts and Telecommunications (Natural Science). 2018. Vol. 38. PP. 36‒41. DOI:10.14132/j.cnki.1673-5439.2018.06.006</mixed-citation><mixed-citation xml:lang="en">Chen X., Wang P., Yu J. CNN based entrypted traffic identification method. Journal of Nanjing University of Posts and Telecommunications (Natural Science). 2018;38:36‒41. DOI:10.14132/j.cnki.1673-5439.2018.06.006</mixed-citation></citation-alternatives></ref><ref id="cit28"><label>28</label><citation-alternatives><mixed-citation xml:lang="ru">Guo L., Wu Q., Liu S., Duan M., Li H., Sun J. Deep learning‑based real‑time VPN encrypted trafc identifcation methods // Journal of Real-Time Image Processing. 2020. Vol. 17. PP. 103‒114. DOI:10.1007/s11554-019-00930-6</mixed-citation><mixed-citation xml:lang="en">Guo L., Wu Q., Liu S., Duan M., Li H., Sun J. Deep learning‑based real‑time VPN encrypted trafc identifcation methods. Journal of Real-Time Image Processing. 2020;17:103‒114. DOI:10.1007/s11554-019-00930-6</mixed-citation></citation-alternatives></ref><ref id="cit29"><label>29</label><citation-alternatives><mixed-citation xml:lang="ru">Yang J., Narantuya J., Lim H. Bayesian Neural Network based Encrypted Traffic Classification using Initial Handshake Packets // Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Supplemental Volume (DSN-S, Portland, USA, 24‒27 June 2019). IEEE, 2019. DOI:10.1109/DSN-S.2019.00015</mixed-citation><mixed-citation xml:lang="en">Yang J., Narantuya J., Lim H. Bayesian Neural Network based Encrypted Traffic Classification using Initial Handshake Packets. Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Supplemental Volume, DSN-S, 24‒27 June 2019, Portland, USA. IEEE; 2019. DOI:10.1109/DSN-S.2019.00015</mixed-citation></citation-alternatives></ref><ref id="cit30"><label>30</label><citation-alternatives><mixed-citation xml:lang="ru">Izadi S., Ahmadi M., Nikbazm R. Analysis of Feature Selection Methods for Network Traffic Classification // Proceedings of the 8th International Conference on on Advanced Intelligent Systems and Informatics (AISI, Cairo, Egypt, 20‒22 November 2022). Lecture Notes on Data Engineering and Communications Technologies. Cham: Springer, 2023. Vol. 152. PP. 65–77. DOI:10.1007/978-3-031-20601-6_6</mixed-citation><mixed-citation xml:lang="en">Izadi S., Ahmadi M., Nikbazm R. Analysis of Feature Selection Methods for Network Traffic Classificatio. Proceedings of the 8th International Conference on on Advanced Intelligent Systems and Informatics, AISI, 20‒22 November 2022, Cairo, Egypt.</mixed-citation></citation-alternatives></ref><ref id="cit31"><label>31</label><citation-alternatives><mixed-citation xml:lang="ru">Yamansavascilar B., Guvensan M.A., Yavuz A.G., Karsligil M.E. Application identification via network traffic classification // Proceedings of the International Conference on Computing, Networking and Communications (ICNC, Silicon Valley, USA, 26‒29 January 2017). IEEE, 2017. DOI:10.1109/ICCNC.2017.7876241</mixed-citation><mixed-citation xml:lang="en">Yamansavascilar B., Guvensan M.A., Yavuz A.G., Karsligil M.E. Application identification via network traffic classification. Proceedings of the International Conference on Computing, Networking and Communications, ICNC, 26‒29 January 2017, Silicon Valley, USA. IEEE; 2017. DOI:10.1109/ICCNC.2017.7876241</mixed-citation></citation-alternatives></ref><ref id="cit32"><label>32</label><citation-alternatives><mixed-citation xml:lang="ru">Kwon J., Lee J., Yu M., Park H. Automatic Classification of Network Traffic Data based on Deep Learning in ONOS Platform // Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC, Jeju, Korea (South), 21‒23 October 2020). IEEE, 2020. DOI:10.1109/ICTC49870.2020.9289257</mixed-citation><mixed-citation xml:lang="en">Kwon J., Lee J., Yu M., Park H. Automatic Classification of Network Traffic Data based on Deep Learning in ONOS Platform. Proceedings of the International Conference on Information and Communication Technology Convergence, ICTC, 21‒23 October 2020, Jeju, Korea (South). IEEE; 2020. DOI:10.1109/ICTC49870.2020.9289257</mixed-citation></citation-alternatives></ref><ref id="cit33"><label>33</label><citation-alternatives><mixed-citation xml:lang="ru">Wang W., Zeng X., Jinlin W. End-to-end encrypted traffic classification with one-dimensional convolution neural networks // Proceedings of the International Conference on Intelligence and Security Informatics (ISI, Beijing, China, 22−24 July 2017). IEEE, 2018. DOI:10.1109/ISI.2017.8004872</mixed-citation><mixed-citation xml:lang="en">Wang W., Zeng X., Jinlin W. End-to-end encrypted traffic classification with one-dimensional convolution neural networks. Proceedings of the International Conference on Intelligence and Security Informatics, ISI, 22−24 July 2017, Beijing, China. IEEE; 2018. DOI:10.1109/ISI.2017.8004872</mixed-citation></citation-alternatives></ref><ref id="cit34"><label>34</label><citation-alternatives><mixed-citation xml:lang="ru">Tooke J., Chavula J. Resource-Constrained Real-Time Network Traffic Classification Using One-Dimensional Convolutional Neural Networks // Proceedings of the 13th EAI International Conference on e-Infrastructure and e-Services for Developing Countries (AFRICOMM, Zanzibar, Tanzania, 1‒3 December 2021). Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Cham: Springer, 2022. Vol. 443. PP. 107–127. DOI:10.1007/978-3-031-06374-9_8</mixed-citation><mixed-citation xml:lang="en">Tooke J., Chavula J. Resource-Constrained Real-Time Network Traffic Classification Using One-Dimensional Convolutional Neural Networks. Proceedings of the 13th EAI International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM, 1‒3 December 2021, Zanzibar, Tanzania. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol.443. Cham: Springer; 2022. p.107–127. DOI:10.1007/978-3-031-06374-9_8</mixed-citation></citation-alternatives></ref><ref id="cit35"><label>35</label><citation-alternatives><mixed-citation xml:lang="ru">Izadi S., Ahmadi M., Nikbazm R. Network traffic classification using convolutional neural network and ant-lion optimization // Computers &amp; Electrical Engineering. 2022. Vol. 101. P. 108024. DOI:10.1016/j.compeleceng.2022.108024</mixed-citation><mixed-citation xml:lang="en">Izadi S., Ahmadi M., Nikbazm R. Network traffic classification using convolutional neural network and ant-lion optimization. Computers &amp; Electrical Engineering. 2022;101:108024. DOI:10.1016/j.compeleceng.2022.108024</mixed-citation></citation-alternatives></ref><ref id="cit36"><label>36</label><citation-alternatives><mixed-citation xml:lang="ru">Wijesekara P.A.D.S.N., Gunawardena S.A. Comprehensive Survey on Knowledge-Defined Networking // Telecom. 2023. Vol. 4. Iss. 43. PP. 477–596. DOI:10.3390/telecom4030025</mixed-citation><mixed-citation xml:lang="en">Wijesekara P.A.D.S.N., Gunawardena S.A. Comprehensive Survey on Knowledge-Defined Networking. Telecom. 2023; 4(43):477–596. DOI:10.3390/telecom4030025</mixed-citation></citation-alternatives></ref><ref id="cit37"><label>37</label><citation-alternatives><mixed-citation xml:lang="ru">Jarvis M.P., Nuzzo-Jones G., Heffernan N.T. Applying Machine Learning Techniques to Rule Generation in Intelligent Tutoring Systems // Proceedings of the 7th International Conference on Intelligent Tutoring Systems (ITS, Maceiò, Brazil, 30 August – 3 September 2004). Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2004. Vol. 3220. PP. 541–553. DOI:10.1007/978-3-540-30139-4_51</mixed-citation><mixed-citation xml:lang="en">Jarvis M.P., Nuzzo-Jones G., Heffernan N.T. Applying Machine Learning Techniques to Rule Generation in Intelligent Tutoring Systems. Proceedings of the 7th International Conference on Intelligent Tutoring Systems, ITS, 30 August – 3 September 2004, Maceiò, Brazil. Lecture Notes in Computer Science, vol.3220. Berlin, Heidelberg: Springer; 2004. p.541–553. DOI:10.1007/978-3-540-30139-4_51</mixed-citation></citation-alternatives></ref><ref id="cit38"><label>38</label><citation-alternatives><mixed-citation xml:lang="ru">Boley H., Tabet S., Wagner G. Design Rationale for RuleML: A Markup Language for Semantic Web Rules // Proceedings of the first Semantic Web Working Symposium (SWWS, Stanford, USA, 30 July ‒ 1 August 2001). Stanford University, 2001. Vol. 1. PP. 381–401.</mixed-citation><mixed-citation xml:lang="en">Boley H., Tabet S., Wagner G. Design Rationale for RuleML: A Markup Language for Semantic Web Rules. Proceedings of the first Semantic Web Working Symposium, SWWS, 30 July ‒ 1 August 2001, Stanford, USA, vol.1. Stanford University; 2001. p.381–401.</mixed-citation></citation-alternatives></ref><ref id="cit39"><label>39</label><citation-alternatives><mixed-citation xml:lang="ru">Kifer M. Rule Interchange Format: The Framework // Proceedings of the Second International Conference on Web Reasoning and Rule Systems (RR, Karlsruhe, Germany, 31 October ‒ 1 November 2008). Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2008. Vol. 5341. PP. 1–11. DOI:10.1007/978-3-540-88737-9_1</mixed-citation><mixed-citation xml:lang="en">Kifer M. Rule Interchange Format: The Framework. Proceedings of the Second International Conference on Web Reasoning and Rule Systems, RR, 31 October ‒ 1 November 2008, Karlsruhe, Germany. Lecture Notes in Computer Science, vol.5341. Berlin, Heidelberg: Springer; 2008. p.1–11. DOI:10.1007/978-3-540-88737-9_1</mixed-citation></citation-alternatives></ref><ref id="cit40"><label>40</label><citation-alternatives><mixed-citation xml:lang="ru">Horrocks I., Patel-Schneider P.F., Boley H., Tabet S., Grosof B., Dean M. SWRL: A Semantic Web Rule Language Combining OWL and RuleML // W3C Member Submission. 2004. PP. 1–31.</mixed-citation><mixed-citation xml:lang="en">Horrocks I., Patel-Schneider P.F., Boley H., Tabet S., Grosof B., Dean M. SWRL: A Semantic Web Rule Language Combining OWL and RuleML. W3C Member Submission. 2004:1–31.</mixed-citation></citation-alternatives></ref><ref id="cit41"><label>41</label><citation-alternatives><mixed-citation xml:lang="ru">Wu D., Li Z., Wang J., Zheng Y., Li M., Huang Q. Vision and Challenges for Knowledge Centric Networking // IEEE Wireless Communications. 2019. Vol. 26. Iss. 4. PP. 117–123. DOI:10.1109/MWC.2019.1800323</mixed-citation><mixed-citation xml:lang="en">Wu D., Li Z., Wang J., Zheng Y., Li M., Huang Q. Vision and Challenges for Knowledge Centric Networking. IEEE Wireless Communications. 2019;26(4):117–123. DOI:10.1109/MWC.2019.1800323</mixed-citation></citation-alternatives></ref><ref id="cit42"><label>42</label><citation-alternatives><mixed-citation xml:lang="ru">Narisetty R., Dane L., Malishevskiy A., Gurkan D., Bailey S., Narayan S., et al. OpenFlow Configuration Protocol: Implementation for the of Management Plane // Proceedings of the Second GENI Research and Educational Experiment Workshop (Salt Lake City, USA, 20–22 March 2013). IEEE, 2003. PP. 66–67. DOI:10.1109/GREE.2013.21</mixed-citation><mixed-citation xml:lang="en">Narisetty R., Dane L., Malishevskiy A., Gurkan D., Bailey S., Narayan S., et al. OpenFlow Configuration Protocol: Implementation for the of Management Plane. Proceedings of the Second GENI Research and Educational Experiment Workshop, 20–22 March 2013, Salt Lake City, USA. IEEE; 2003. p.66–67. DOI:10.1109/GREE.2013.21</mixed-citation></citation-alternatives></ref><ref id="cit43"><label>43</label><citation-alternatives><mixed-citation xml:lang="ru">Safrianti E., Sari L.O., Sari N.A. Real-Time Network Device Monitoring System with Simple Network Management Protocol (SNMP) Model // Proceedings of the 3rd International Conference on Research and Academic Community Services (ICRACOS, Surabaya, Indonesia, 9–10 October 2021). IEEE, 2021. PP. 122–127. DOI:10.1109/ICRACOS53680.2021.9701973</mixed-citation><mixed-citation xml:lang="en">Safrianti E., Sari L.O., Sari N.A. Real-Time Network Device Monitoring System with Simple Network Management Protocol (SNMP) Model. Proceedings of the 3rd International Conference on Research and Academic Community Services, ICRACOS, 9–10 October 2021, Surabaya, Indonesia. IEEE; 2021. p.122–127. DOI:10.1109/ICRACOS53680.2021.9701973</mixed-citation></citation-alternatives></ref><ref id="cit44"><label>44</label><citation-alternatives><mixed-citation xml:lang="ru">Wijesekara P.A.D.S.N., Sudheera K.L.K., Sandamali G.G.N., Chong P.H.J. An Optimization Framework for Data Collection in Software Defined Vehicular Networks // Sensors. 2023. Vol. 23. Iss. 3. P. 1600. DOI:10.3390/s23031600</mixed-citation><mixed-citation xml:lang="en">Wijesekara P.A.D.S.N., Sudheera K.L.K., Sandamali G.G.N., Chong P.H.J. An Optimization Framework for Data Collection in Software Defined Vehicular Networks. Sensors. 2023;23(3):1600. DOI:10.3390/s23031600</mixed-citation></citation-alternatives></ref><ref id="cit45"><label>45</label><citation-alternatives><mixed-citation xml:lang="ru">Wette P., Karl H. Which flows are hiding behind my wildcard rule? // Proceedings of the conference on SIGCOMM (Hong Kong, China, 12–16 August 2013). New York: ACM, 2013. PP. 541–542. DOI:10.1145/2486001.2491710</mixed-citation><mixed-citation xml:lang="en">Wette P., Karl H. Which flows are hiding behind my wildcard rule? Proceedings of the conference on SIGCOMM, 12–16 Au-gust 2013, Hong Kong, China. New York: ACM; 2013. p.541–542. DOI:10.1145/2486001.2491710</mixed-citation></citation-alternatives></ref><ref id="cit46"><label>46</label><citation-alternatives><mixed-citation xml:lang="ru">Zhou D., Yan Z., Liu G. Atiquzzaman, M. An Adaptive Network Data Collection System in SDN // IEEE Transactions on Cognitive Communications and Networking. 2020. Vol. 6. Iss. 2. PP. 562‒574. DOI:10.1109/TCCN.2019.2956141</mixed-citation><mixed-citation xml:lang="en">Zhou D., Yan Z., Liu G. Atiquzzaman, M. An Adaptive Network Data Collection System in SDN. IEEE Transactions on Cognitive Communications and Networking. 2020;6(2):562‒574. DOI:10.1109/TCCN.2019.2956141</mixed-citation></citation-alternatives></ref><ref id="cit47"><label>47</label><citation-alternatives><mixed-citation xml:lang="ru">Liao W.H., Kuai S.C. An Energy-Efficient SDN-Based Data Collection Strategy for Wireless Sensor Networks // Proceedings of the 7th International Symposium on Cloud and Service Computing (SC2, Kanazawa, Japan, 22–25 November 2017). IEEE, 2017. PP. 91–97. DOI:10.1109/SC2.2017.21</mixed-citation><mixed-citation xml:lang="en">Liao W.H., Kuai S.C. An Energy-Efficient SDN-Based Data Collection Strategy for Wireless Sensor Networks. Proceedings of the 7th International Symposium on Cloud and Service Computing, SC2, 22–25 November 2017, Kanazawa, Japan. IEEE; 2017. p.91–97. DOI:10.1109/SC2.2017.21</mixed-citation></citation-alternatives></ref><ref id="cit48"><label>48</label><citation-alternatives><mixed-citation xml:lang="ru">Bjorklund M. YANG ‒ A Data Modeling Language for the Network Configuration Protocol (NETCONF). URL: https://www.rfc-editor.org/rfc/rfc6020 (Accessed 19.10.2023)</mixed-citation><mixed-citation xml:lang="en">Bjorklund M. YANG ‒ A Data Modeling Language for the Network Configuration Protocol (NETCONF). URL: https://www.rfc-editor.org/rfc/rfc6020 [Accessed 19.10.2023]</mixed-citation></citation-alternatives></ref><ref id="cit49"><label>49</label><citation-alternatives><mixed-citation xml:lang="ru">Uslar M., Specht M., Rohjans S., Trefke J., González J.M. The Common Information Model CIM: IEC 61968/61970 and 62325 ‒ A Practical Introduction to the CIM. Berlin, Heidelberg: Springer, 2012. DOI:10.1007/978-3-642-25215-0</mixed-citation><mixed-citation xml:lang="en">Uslar M., Specht M., Rohjans S., Trefke J., González J.M. The Common Information Model CIM: IEC 61968/61970 and 62325 ‒ A Practical Introduction to the CIM. Berlin, Heidelberg: Springer, 2012. DOI:10.1007/978-3-642-25215-0</mixed-citation></citation-alternatives></ref><ref id="cit50"><label>50</label><citation-alternatives><mixed-citation xml:lang="ru">Gude N., Koponen, T., Pettit J., Pfaff B., Casado M., McKeown N., Shenker S. NOX: towards an operating system for networks // ACM SIGCOMM Computer Communication Review. 2008. Vol. 38. Iss. 3. PP. 105‒110. DOI:10.1145/1384609.1384625</mixed-citation><mixed-citation xml:lang="en">Gude N., Koponen, T., Pettit J., Pfaff B., Casado M., McKeown N., Shenker S. NOX: towards an operating system for networks. ACM SIGCOMM Computer Communication Review. 2008;38(3):105‒110. DOI:10.1145/1384609.1384625</mixed-citation></citation-alternatives></ref><ref id="cit51"><label>51</label><citation-alternatives><mixed-citation xml:lang="ru">Rowshanrad S., Abdi V., Keshtgari M. Performance evaluation of SDN controllers: Floodlight and OpenDaylight // IIUM Engineering Journal. 2016. Vol. 17. Iss. 2. PP. 47–57. DOI:10.31436/iiumej.v17i2.615</mixed-citation><mixed-citation xml:lang="en">Rowshanrad S., Abdi V., Keshtgari M. Performance evaluation of SDN controllers: Floodlight and OpenDaylight. IIUM Engineering Journal. 2016;17(2):47–57. DOI:10.31436/iiumej.v17i2.615</mixed-citation></citation-alternatives></ref><ref id="cit52"><label>52</label><citation-alternatives><mixed-citation xml:lang="ru">Sanvito D., Moro D., Gulli M., Filippini I., Capone A., Campanella A. ONOS Intent Monitor and Reroute service: Enabling plug&amp;play routing logic // Proceedings of the 4th Conference on Network Softwarization and Workshops (NetSoft, Montreal, Canada, 25–29 June 2018). IEEE, 2018. PP. 272–276. DOI:10.1109/NETSOFT.2018.8460064</mixed-citation><mixed-citation xml:lang="en">Sanvito D., Moro D., Gulli M., Filippini I., Capone A., Campanella A. ONOS Intent Monitor and Reroute service: Enabling plug&amp;play routing logic. Proceedings of the 4th Conference on Network Softwarization and Workshops, NetSoft, 25–29 June 2018, Montreal, Canada. IEEE; 2018. p.272–276. DOI:10.1109/NETSOFT.2018.8460064</mixed-citation></citation-alternatives></ref><ref id="cit53"><label>53</label><citation-alternatives><mixed-citation xml:lang="ru">Дмитриева Ю.С. Управление сетевыми ресурсами на основе намерений // Вестник связи. 2022. № 4. С. 20‒26.</mixed-citation><mixed-citation xml:lang="en">Dmitrieva J. Intent-Based Networking Management. Communication Bulletin. 2022;4:20‒26.</mixed-citation></citation-alternatives></ref><ref id="cit54"><label>54</label><citation-alternatives><mixed-citation xml:lang="ru">Rotsos C., King D., Farshad A., Bird J., Fawcett L., Georgalas N., et al. Network service orchestration standardization: A technology survey // Computer Standards &amp; Interfaces. 2017. Vol. 54. Part 4. PP. 203–215. DOI:10.1016/j.csi.2016.12.006</mixed-citation><mixed-citation xml:lang="en">Rotsos C., King D., Farshad A., Bird J., Fawcett L., Georgalas N., et al. Network service orchestration standardization: A technology survey. Computer Standards &amp; Interfaces. 2017;54:203–215. DOI:10.1016/j.csi.2016.12.006</mixed-citation></citation-alternatives></ref><ref id="cit55"><label>55</label><citation-alternatives><mixed-citation xml:lang="ru">Bannour F., Souihi S., Mellouk A. Distributed SDN Control: Survey, Taxonomy, and Challenges // IEEE Communications Surveys &amp; Tutorials. 2017. Vol. 20. Iss. 1. PP. 333–354. DOI:10.1109/COMST.2017.2782482</mixed-citation><mixed-citation xml:lang="en">Bannour F., Souihi S., Mellouk A. Distributed SDN Control: Survey, Taxonomy, and Challenges. IEEE Communications Surveys &amp; Tutorials. 2017;20(1):333–354. DOI:10.1109/COMST.2017.2782482</mixed-citation></citation-alternatives></ref><ref id="cit56"><label>56</label><citation-alternatives><mixed-citation xml:lang="ru">Sanvito D., Moro D., Gulli M., Filippini I., Capone A., Campanella A. ONOS Intent Monitor and Reroute service: Enabling plug&amp;play routing logic // Proceedings of the 4th Conference on Network Softwarization and Workshops (NetSoft, Montreal, Canada, 25–29 June 2018). IEEE, 2018. PP. 272–276. DOI:10.1109/NETSOFT.2018.8460064</mixed-citation><mixed-citation xml:lang="en">Sanvito D., Moro D., Gulli M., Filippini I., Capone A., Campanella A. ONOS Intent Monitor and Reroute service: Enabling plug&amp;play routing logic. Proceedings of the 4th Conference on Network Softwarization and Workshops, NetSoft, 25–29 June 2018, Montreal, Canada. IEEE; 2018. p.272–276. DOI:10.1109/NETSOFT.2018.8460064</mixed-citation></citation-alternatives></ref><ref id="cit57"><label>57</label><citation-alternatives><mixed-citation xml:lang="ru">Koponen T., Casado M., Gude N., Stribling J., Poutievski L., Zhu M., et al. Onix: A Distributed Control Platform for Large-Scale Production Networks // Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI, Vancouver, Canada, 4–6 October 2010). Berkeley: USENIX Association, 2010. PP. 351‒364.</mixed-citation><mixed-citation xml:lang="en">Koponen T., Casado M., Gude N., Stribling J., Poutievski L., Zhu M., et al. Onix: A Distributed Control Platform for Large-Scale Production Networks. Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI, 4–6 October 2010, Vancouver, Canada. Berkeley: USENIX Association; 2010. p.351‒364.</mixed-citation></citation-alternatives></ref><ref id="cit58"><label>58</label><citation-alternatives><mixed-citation xml:lang="ru">Zhu M., Cao J., Pang D., He Z., Xu M. SDN-Based Routing for Efficient Message Propagation in VANET // Proceedings of the 10th International Conference on Wireless Algorithms, Systems, and Applications (WASA, Qufu, China, 10–12 August 2015). Lecture Notes in Computer Science). Cham: Springer, 2015. Vol. 9204. PP. 788–797. DOI:10.1007/978-3-319-21837-3_77</mixed-citation><mixed-citation xml:lang="en">Zhu M., Cao J., Pang D., He Z., Xu M. SDN-Based Routing for Efficient Message Propagation in VANET. Proceedings of the 10th International Conference on Wireless Algorithms, Systems, and Applications, WASA, 10–12 August 2015, Qufu, China. Lecture Notes in Computer Science, vol.9204. Cham: Springer; 2015. p.788–797. DOI:10.1007/978-3-319-21837-3_77</mixed-citation></citation-alternatives></ref><ref id="cit59"><label>59</label><citation-alternatives><mixed-citation xml:lang="ru">Moghaddam F.F., Wieder P., Yahyapour R. Policy Engine as a Service (PEaaS): An approach to a Reliable Policy Management Framework in Cloud Computing Environments // Proceedings of the 4th International Conference on Future Internet of Things and Cloud (FiCloud, Vienna, Austria, 22–24 August 2016). IEEE, 2016. PP. 137–144. DOI:10.1109/FiCloud.2016.27</mixed-citation><mixed-citation xml:lang="en">Moghaddam F.F., Wieder P., Yahyapour R. Policy Engine as a Service (PEaaS): An approach to a Reliable Policy Manage-ment Framework in Cloud Computing Environments. Proceedings of the 4th International Conference on Future Internet of Things and Cloud, FiCloud, 22–24 August 2016, Vienna, Austria. IEEE; 2016. p.137–144. DOI:10.1109/FiCloud.2016.27</mixed-citation></citation-alternatives></ref><ref id="cit60"><label>60</label><citation-alternatives><mixed-citation xml:lang="ru">Chen Y.J., Wang L.C., Lin F.Y., Lin B.S.P. Deterministic Quality of Service Guarantee for Dynamic Service Chaining in Software Defined Networking // IEEE Transactions on Network and Service Management. 2017. Vol. 14. Iss. 4. PP. 991–1002. DOI:10.1109/TNSM.2017.2758328</mixed-citation><mixed-citation xml:lang="en">Chen Y.J., Wang L.C., Lin F.Y., Lin B.S.P. Deterministic Quality of Service Guarantee for Dynamic Service Chaining in Soft-ware Defined Networking. IEEE Transactions on Network and Service Management. 2017;14(4):991–1002. DOI:10.1109/TNSM.2017.2758328</mixed-citation></citation-alternatives></ref><ref id="cit61"><label>61</label><citation-alternatives><mixed-citation xml:lang="ru">Yang G., Jin H., Kang M., Moon G.J., Yoo C. Network Monitoring for SDN Virtual Networks // Proceedings of the Conference on Computer Communications (IEEE INFOCOM, Toronto, Canada, 06‒09 July 2020). 2020. PP. 1261–1270. DOI:10.1109/INFOCOM41043.2020.9155260</mixed-citation><mixed-citation xml:lang="en">Yang G., Jin H., Kang M., Moon G.J., Yoo C. Network Monitoring for SDN Virtual Networks. Proceedings of the Conference on Computer Communications, IEEE INFOCOM, 06‒09 July 2020, Toronto, Canada. IEEE; 2020. p.1261–1270. DOI:10.1109/INFOCOM41043.2020.9155260</mixed-citation></citation-alternatives></ref><ref id="cit62"><label>62</label><citation-alternatives><mixed-citation xml:lang="ru">Ahvar E., Ahvar S., Raza S.M., Vilchez J. M.S., Lee G.M. Next Generation of SDN in Cloud-Fog for 5G and Beyond-Enabled Applications: Opportunities and Challenges // Network. 2021. Vol. 1. Iss. 1. PP. 28–49. DOI:10.3390/network1010004</mixed-citation><mixed-citation xml:lang="en">Ahvar E., Ahvar S., Raza S.M., Vilchez J. M.S., Lee G.M. Next Generation of SDN in Cloud-Fog for 5G and Beyond-Enabled Ap-plications: Opportunities and Challenges. Network. 2021;1(1):28–49. DOI:10.3390/network1010004</mixed-citation></citation-alternatives></ref><ref id="cit63"><label>63</label><citation-alternatives><mixed-citation xml:lang="ru">Voellmy A., Kim H., Feamster N. Procera: a language for high-level reactive network control // Proceedings of the First Workshop on Hot Topics in Software Defined Networks (HotSDN, Helsinki, Finland, 13 August 2012). New York: ACM, 2012. PP. 43–48. DOI:10.1145/2342441.2342451</mixed-citation><mixed-citation xml:lang="en">Voellmy A., Kim H., Feamster N. Procera: a language for high-level reactive network control. Proceedings of the First Workshop on Hot Topics in Software Defined Networks, HotSDN, 13 August 2012, Helsinki, Finland. New York: ACM; 2012. p.43–48. DOI:10.1145/2342441.2342451</mixed-citation></citation-alternatives></ref><ref id="cit64"><label>64</label><citation-alternatives><mixed-citation xml:lang="ru">Voellmy A., Hudak P. Nettle: Functional Reactive Programming for OpenFlow Networks. URL: https://pages.cs.wisc.edu/~akella/CS838/F12/838-CloudPapers/Nettle.pdf (Accessed 20.12.2023)</mixed-citation><mixed-citation xml:lang="en">Voellmy A., Hudak P. Nettle: Functional Reactive Programming for Openflow Networks. URL: https://pages.cs.wisc.edu/</mixed-citation></citation-alternatives></ref><ref id="cit65"><label>65</label><citation-alternatives><mixed-citation xml:lang="ru">Foster N., Freedman M.J., Harrison R., Rexford J., Meola M.L., Walker D. Frenetic: a high-level language for OpenFlow networks // Proceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO, Philadelphia, USA, 30 November 2010). New York: ACM, 2010. PP. 1–6. DOI:10.1145/1921151.1921160</mixed-citation><mixed-citation xml:lang="en">~akella/CS838/F12/838-CloudPapers/Nettle.pdf [Accessed 20.12.2023]</mixed-citation></citation-alternatives></ref><ref id="cit66"><label>66</label><citation-alternatives><mixed-citation xml:lang="ru">Kim H., Reich J., Gupta A., Shahbaz M., Feamster N., Clark R. Kinetic: Verifiable Dynamic Network Control // Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI, Oakland, USA, 4–6 May 2015). Berkeley: USENIX Association, 2015. PP. 59–72.</mixed-citation><mixed-citation xml:lang="en">Foster N., Freedman M.J., Harrison R., Rexford J., Meola M.L., Walker D. Frenetic: a high-level language for OpenFlow net-works. Proceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow, PRESTO, 30 November 2010, Philadelphia, USA. New York: ACM; 2010. p.1–6. DOI:10.1145/1921151.1921160</mixed-citation></citation-alternatives></ref><ref id="cit67"><label>67</label><citation-alternatives><mixed-citation xml:lang="ru">Kim H., Reich J., Gupta A., Shahbaz M., Feamster N., Clark R. Kinetic: Verifiable Dynamic Network Control. Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, NSDI, 4–6 May 2015, Oakland, USA. Berkeley: USENIX Association; 2015. p.59–72.</mixed-citation><mixed-citation xml:lang="en">Kim H., Reich J., Gupta A., Shahbaz M., Feamster N., Clark R. Kinetic: Verifiable Dynamic Network Control. Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, NSDI, 4–6 May 2015, Oakland, USA. Berkeley: USENIX Association; 2015. p.59–72.</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
