Adaptive and intelligent security frameworks for sdn-nfv enabled next-generation networks: A Review
DOI:
https://doi.org/10.22399/ijcesen.5189Keywords:
Adaptive security, intelligent security, SDN-NFVAbstract
The rapid evolution of telecommunication technologies towards 5G and 6G has necessitated a paradigm shift from rigid hardware-based infrastructures to flexible, software-defined architectures. This transition is primarily driven by Software-Defined Networking (SDN) and Network Function Virtualization (NFV), which enable dynamic resource management and programmability. However, the centralization of control in SDN and the distributed nature of NFV introduce novel security vulnerabilities, particularly in Zero-Touch Networks (ZTN) and Cloud-Enabled IoT environments. This review paper critically analyzes the current state of adaptive networking protocols, focusing on the integration of Artificial Intelligence (AI) and Machine Learning (ML) for intrusion detection and threat mitigation. We examine recent methodologies, including Deep Learning (DL), Bio-inspired algorithms, and Blockchain-based trust mechanisms, evaluating their efficacy in addressing scalability, latency, and data integrity. The review identifies critical research gaps in real-time adaptivity and computational efficiency, proposing a unified, lightweight framework for intelligent orchestration in next-generation communication systems.
References
1. Lorincz, J., Kukuruzović, A., & Begušić, D. (2026). Mobile Network Softwarization: Technological Foundations and Impact on Improving Network Energy Efficiency. Sensors, 26(2), 503. DOI: https://doi.org/10.3390/s26020503
2. Qazi, E. U. H., Zia, T., Faheem, M. H., Shahzad, K., Imran, M., & Ahmed, Z. (2024). Zero-Touch Network Security (ZTNS): A Network Intrusion Detection System Based on Deep Learning. IEEE Access, 12, 141625-141638. DOI: https://doi.org/10.1109/ACCESS.2024.3466470
3. Nayak, N. K., & Bhattacharyya, B. (2024). An Intrusion Detection System for 5G SDN Network Utilizing Binarized Deep Spiking Capsule Fire Hawk Neural Networks and Blockchain Technology. Future Internet, 16(10), 359. DOI: https://doi.org/10.3390/fi16100359
4. Janabi, A. H., et al. (2024). Survey: Intrusion Detection System in Software-Defined Networking. IEEE Access, 12, 164103. DOI: https://doi.org/10.1109/ACCESS.2024.3493384
5. Kumar, R., Dutta, J., Vamsi, N., Varri, U. S., & Puthal, D. (2025). Next-Generation Security in the 6G Era: The Role of AI in Safeguarding Future Networks. IEEE Access. (Early Access). DOI: https://doi.org/10.1109/ACCESS.2025.3650208
6. Chatzimiltis, S., Shojafar, M., Mashhadi, M. B., & Tafazolli, R. (2024). A Collaborative Software Defined Network-Based Smart Grid Intrusion Detection System. IEEE Open Journal of the Communications Society, 5, 700-711. DOI: https://doi.org/10.1109/OJCOMS.2024.3351088
7. Attou, H., Mohy-Eddine, M., Guezzaz, A., Benkirane, S., Azrour, M., Alabdultif, A., & Almusallam, N. (2023). Towards an intelligent intrusion detection system to detect malicious activities in cloud computing. Applied Sciences, 13(17), 9588. DOI: https://doi.org/10.3390/app13179588
8. Awajan, A. (2023). A novel deep learning-based intrusion detection system for IoT networks. Computers, 12(2), 34. DOI: https://doi.org/10.3390/computers12020034
9. Al-Qatf, M., Lasheng, Y., Al-Habib, M., & Al-Sabahi, K. (2018). Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access, 6, 52843-52856. DOI: https://doi.org/10.1109/ACCESS.2018.2869577
10. Tang, T. A., Mhamdi, L., McLernon, D., Zaidi, S. A. R., & Ghogho, M. (2016). Deep learning approach for Network Intrusion Detection in Software Defined Networking. 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), 258-263. DOI: https://doi.org/10.1109/WINCOM.2016.7777224
11. Brik, B., et al. (2024). Federated Learning for 6G Security: A Comprehensive Survey. IEEE Communications Surveys & Tutorials.
12. Yang, Y., Gu, Y., & Yan, Y. (2023). Machine learning-based intrusion detection for rare-class network attacks. Electronics, 12(18), 3911. DOI: https://doi.org/10.3390/electronics12183911
13. Li, S., Cao, Y., Liu, S., Lai, Y., Zhu, Y., & Ahmad, N. (2024). HDA-IDS: A hybrid DoS attacks intrusion detection system for IoT by using semi-supervised CL-GAN. Expert Systems with Applications, 238, 122198. DOI: https://doi.org/10.1016/j.eswa.2023.122198
14. Kumar, R., Aljuhani, A., Javeed, D., Kumar, P., Islam, S., & Islam, A. K. M. N. (2024). Digital twins-enabled zero touch network: A smart contract and explainable AI integrated cybersecurity framework. Future Generation Computer Systems, 156, 191-205. DOI: https://doi.org/10.1016/j.future.2024.02.015
15. Smys, D. S., Basar, D. A., & Wang, D. H. (2020). Hybrid intrusion detection system for Internet of Things (IoT). Journal of ISMAC, 2(4), 190-199. DOI: https://doi.org/10.36548/jismac.2020.4.002
16. Kim, J., Kim, J., Kim, H., Shim, M., & Choi, E. (2020). CNN-based network intrusion detection against denial-of-service attacks. Electronics, 9(6), 916. DOI: https://doi.org/10.3390/electronics9060916
17. Asharf, J., Moustafa, N., Khurshid, H., Debie, E., Haider, W., & Wahab, A. (2020). A review of intrusion detection systems using machine and deep learning in Internet of Things: Challenges, solutions and future directions. Electronics, 9(7), 1177. DOI: https://doi.org/10.3390/electronics9071177
18. Verma, A., & Ranga, V. (2020). Machine learning based intrusion detection systems for IoT applications. Wireless Personal Communications, 111(4), 2287-2310. DOI: https://doi.org/10.1007/s11277-019-06986-8
19. Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), e4150. DOI: https://doi.org/10.1002/ett.4150
20. Tama, B. A., Nkenyereye, L., Islam, S. M. R., & Kwak, K.-S. (2020). An enhanced anomaly detection in web traffic using a stack of classifier ensemble. IEEE Access, 8, 24120-24134. DOI: https://doi.org/10.1109/ACCESS.2020.2969428
21. Souhail, M., Rachidi, T., & Assem, N. (2019). Network based intrusion detection using the UNSW-NB15 dataset. International Journal of Computing and Digital Systems, 8(5), 477-487. DOI: https://doi.org/10.12785/ijcds/080505
22. Leghris, C., Elaeraj, O., & Renault, E. (2019). Improved security intrusion detection using intelligent techniques. Proceedings of International Conference on Wireless Networks and Mobile Communications (WINCOM), 1-5. DOI: https://doi.org/10.1109/WINCOM47513.2019.8942553
23. Khater, B. S., Wahab, A. W. B. A., Idris, M. Y. I. B., Hussain, M. A., & Ibrahim, A. A. (2019). A lightweight perceptron-based intrusion detection system for fog computing. Applied Sciences, 9(1), 178. DOI: https://doi.org/10.3390/app9010178
24. Chafika, B., Taleb, T., Phan, C.-T., Tselios, C., & Tsolis, G. (2021). Distributed AI-based security for massive numbers of network slices in 5G & beyond mobile systems. Proceedings of Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 401-406. DOI: https://doi.org/10.1109/EuCNC/6GSummit51104.2021.9482418
25. Kumar, R., Kumar, P., Aloqaily, M., & Aljuhani, A. (2023). Deep-learning-based blockchain for secure zero touch networks. IEEE Communications Magazine, 61(2), 96-102. DOI: https://doi.org/10.1109/MCOM.001.2200294
26. Khan, N. W., Alshehri, M. S., Khan, M. A., Almakdi, S., Moradpoor, N., Alazeb, A., Ullah, S., Naz, N., & Ahmad, J. (2023). A hybrid deep learning-based intrusion detection system for IoT networks. Mathematical Biosciences and Engineering, 20(8), 13491-13520. DOI: https://doi.org/10.3934/mbe.2023602
27. Yang, X., Peng, G., Zhang, D., & Lv, Y. (2022). An enhanced intrusion detection system for IoT networks based on deep learning and knowledge graph. Security and Communication Networks, 2022, 1-21. DOI: https://doi.org/10.1155/2022/4748528
28. Gallego-Madrid, J., Sanchez-Iborra, R., Ruiz, P. M., & Skarmeta, A. F. (2022). Machine learning-based zero-touch network and service management: A survey. Digital Communications and Networks, 8(2), 105-123. DOI: https://doi.org/10.1016/j.dcan.2021.09.001
29. El Houda, Z. A., Brik, B., & Khoukhi, L. (2022). Ensemble learning for intrusion detection in SDN-based zero touch smart grid systems. Proceedings of IEEE 47th Conference on Local Computer Networks (LCN), 149-156. DOI: https://doi.org/10.1109/LCN53696.2022.9843645
30. Chanal, P. M., & Kakkasageri, M. S. (2020). Security and privacy in IoT: A survey. Wireless Personal Communications, 115(2), 1667-1693. DOI: https://doi.org/10.1007/s11277-020-07649-9
31. ElKashlan, M., Elsayed, M. S., Jurcut, A. D., & Azer, M. (2023). A machine learning-based intrusion detection system for IoT electric vehicle charging stations (EVCSs). Electronics, 12(4), 1044. DOI: https://doi.org/10.3390/electronics12041044
32. Bugshan, N., Khalil, I., Kalapaaking, A. P., & Atiquzzaman, M. (2023). Intrusion detection-based ensemble learning and microservices for zero touch networks. IEEE Communications Magazine, 61(6), 86-92. DOI: https://doi.org/10.1109/MCOM.001.2200535
33. Alkahtani, H., & Aldhyani, T. H. H. (2021). Botnet attack detection by using CNN-LSTM model for Internet of Things applications. Security and Communication Networks, 2021, 1-23. DOI: https://doi.org/10.1155/2021/3806459
34. Alkahtani, H., & Aldhyani, T. H. H. (2021). Intrusion detection system to advance Internet of Things infrastructure-based deep learning algorithms. Complexity, 2021(1), 1-18. DOI: https://doi.org/10.1155/2021/5579851
35. Potnurwar, A. V., Bongirwar, V. K., Ajani, S., Shelke, N., Dhone, M., & Parati, N. (2023). Deep learning-based rule-based feature selection for intrusion detection in industrial Internet of Things networks. International Journal of Intelligent Systems and Applications in Engineering, 11(10), 23-35.
36. Chawla, S. (2017). Deep learning based intrusion detection system for Internet of Things. M.S. thesis, University of Washington.
37. Hussain, J., & Hnamte, V. (2021). Deep learning based intrusion detection system: Software defined network. Proceedings of Asian Conference on Innovation in Technology (ASIANCON), 1-6. DOI: https://doi.org/10.1109/ASIANCON51346.2021.9544913
38. Rashid, M. M., Kamruzzaman, J., Hassan, M. M., Imam, T., & Gordon, S. (2020). Cyberattacks detection in IoT-based smart city applications using machine learning techniques. International Journal of Environmental Research and Public Health, 17(24), 9347. DOI: https://doi.org/10.3390/ijerph17249347
39. Gupta, S. K., Tripathi, M., & Grover, J. (2022). Hybrid optimization and deep learning based intrusion detection system. Computers and Electrical Engineering, 100, 107876. DOI: https://doi.org/10.1016/j.compeleceng.2022.107876
40. Elsaeidy, A. A., Jagannath, N., Sanchis, A. G., Jamalipour, A., & Munasinghe, K. S. (2020). Replay attack detection in smart cities using deep learning. IEEE Access, 8, 137825-137837. DOI: https://doi.org/10.1109/ACCESS.2020.3012411
41. Reddy, D. K., Behera, H. S., Nayak, J., Vijayakumar, P., Naik, B., & Singh, P. K. (2021). Deep neural network based anomaly detection in Internet of Things network traffic tracking for the applications of future smart cities. Transactions on Emerging Telecommunications Technologies, 32(7), e4121. DOI: https://doi.org/10.1002/ett.4121
42. Shafiq, M., Tian, Z., Sun, Y., Du, X., & Guizani, M. (2020). Selection of effective machine learning algorithm and bot-IoT attacks traffic identification for Internet of Things in smart city. Future Generation Computer Systems, 107, 433-442. DOI: https://doi.org/10.1016/j.future.2020.02.017
43. Vinayakumar, R., Alazab, M., Srinivasan, S., Pham, Q.-V., Padannayil, S. K., & Simran, K. (2020). A visualized botnet detection system based deep learning for the Internet of Things networks of smart cities. IEEE Transactions on Industry Applications, 56(4), 4436-4456. DOI: https://doi.org/10.1109/TIA.2020.2971952
44. Wang, M., et al. (2020). 6G Security: Challenges and Opportunities. IEEE Network.
45. Nguyen, V., et al. (2021). Security and Privacy for 6G: A Survey. IEEE Communications Surveys & Tutorials. DOI: https://doi.org/10.1109/COMST.2021.3108618
46. Porambage, P., et al. (2021). Roadmap to 6G Security and Privacy. IEEE Open Journal of the Communications Society. DOI: https://doi.org/10.1109/OJCOMS.2021.3078081
47. Mucchi, L., et al. (2021). Physical Layer Security in 6G Networks. IEEE Access. DOI: https://doi.org/10.1109/OJCOMS.2021.3103735
48. Mao, B., et al. (2023). AI for 6G Security: A Comprehensive Review. IEEE Internet of Things Journal.
49. Zuo, Y., et al. (2023). Blockchain for 6G Security. Future Generation Computer Systems.
50. Kazmi, S., et al. (2024). AI-Driven Security for 6G. IEEE Wireless Communications.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.