Adaptive and intelligent security frameworks for sdn-nfv enabled next-generation networks: A Review

Authors

  • Revathi. N
  • M.Elamparithi
  • V. Anuratha

DOI:

https://doi.org/10.22399/ijcesen.5189

Keywords:

Adaptive security, intelligent security, SDN-NFV

Abstract

The rapid evolution of telecommunication technologies towards 5G and 6G has necessitated a paradigm shift from rigid hardware-based infrastructures to flexible, software-defined architectures. This transition is primarily driven by Software-Defined Networking (SDN) and Network Function Virtualization (NFV), which enable dynamic resource management and programmability. However, the centralization of control in SDN and the distributed nature of NFV introduce novel security vulnerabilities, particularly in Zero-Touch Networks (ZTN) and Cloud-Enabled IoT environments. This review paper critically analyzes the current state of adaptive networking protocols, focusing on the integration of Artificial Intelligence (AI) and Machine Learning (ML) for intrusion detection and threat mitigation. We examine recent methodologies, including Deep Learning (DL), Bio-inspired algorithms, and Blockchain-based trust mechanisms, evaluating their efficacy in addressing scalability, latency, and data integrity. The review identifies critical research gaps in real-time adaptivity and computational efficiency, proposing a unified, lightweight framework for intelligent orchestration in next-generation communication systems.

References

1. Lorincz, J., Kukuruzović, A., & Begušić, D. (2026). Mobile Network Softwarization: Technological Foundations and Impact on Improving Network Energy Efficiency. Sensors, 26(2), 503. DOI: https://doi.org/10.3390/s26020503

2. Qazi, E. U. H., Zia, T., Faheem, M. H., Shahzad, K., Imran, M., & Ahmed, Z. (2024). Zero-Touch Network Security (ZTNS): A Network Intrusion Detection System Based on Deep Learning. IEEE Access, 12, 141625-141638. DOI: https://doi.org/10.1109/ACCESS.2024.3466470

3. Nayak, N. K., & Bhattacharyya, B. (2024). An Intrusion Detection System for 5G SDN Network Utilizing Binarized Deep Spiking Capsule Fire Hawk Neural Networks and Blockchain Technology. Future Internet, 16(10), 359. DOI: https://doi.org/10.3390/fi16100359

4. Janabi, A. H., et al. (2024). Survey: Intrusion Detection System in Software-Defined Networking. IEEE Access, 12, 164103. DOI: https://doi.org/10.1109/ACCESS.2024.3493384

5. Kumar, R., Dutta, J., Vamsi, N., Varri, U. S., & Puthal, D. (2025). Next-Generation Security in the 6G Era: The Role of AI in Safeguarding Future Networks. IEEE Access. (Early Access). DOI: https://doi.org/10.1109/ACCESS.2025.3650208

6. Chatzimiltis, S., Shojafar, M., Mashhadi, M. B., & Tafazolli, R. (2024). A Collaborative Software Defined Network-Based Smart Grid Intrusion Detection System. IEEE Open Journal of the Communications Society, 5, 700-711. DOI: https://doi.org/10.1109/OJCOMS.2024.3351088

7. Attou, H., Mohy-Eddine, M., Guezzaz, A., Benkirane, S., Azrour, M., Alabdultif, A., & Almusallam, N. (2023). Towards an intelligent intrusion detection system to detect malicious activities in cloud computing. Applied Sciences, 13(17), 9588. DOI: https://doi.org/10.3390/app13179588

8. Awajan, A. (2023). A novel deep learning-based intrusion detection system for IoT networks. Computers, 12(2), 34. DOI: https://doi.org/10.3390/computers12020034

9. Al-Qatf, M., Lasheng, Y., Al-Habib, M., & Al-Sabahi, K. (2018). Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access, 6, 52843-52856. DOI: https://doi.org/10.1109/ACCESS.2018.2869577

10. Tang, T. A., Mhamdi, L., McLernon, D., Zaidi, S. A. R., & Ghogho, M. (2016). Deep learning approach for Network Intrusion Detection in Software Defined Networking. 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), 258-263. DOI: https://doi.org/10.1109/WINCOM.2016.7777224

11. Brik, B., et al. (2024). Federated Learning for 6G Security: A Comprehensive Survey. IEEE Communications Surveys & Tutorials.

12. Yang, Y., Gu, Y., & Yan, Y. (2023). Machine learning-based intrusion detection for rare-class network attacks. Electronics, 12(18), 3911. DOI: https://doi.org/10.3390/electronics12183911

13. Li, S., Cao, Y., Liu, S., Lai, Y., Zhu, Y., & Ahmad, N. (2024). HDA-IDS: A hybrid DoS attacks intrusion detection system for IoT by using semi-supervised CL-GAN. Expert Systems with Applications, 238, 122198. DOI: https://doi.org/10.1016/j.eswa.2023.122198

14. Kumar, R., Aljuhani, A., Javeed, D., Kumar, P., Islam, S., & Islam, A. K. M. N. (2024). Digital twins-enabled zero touch network: A smart contract and explainable AI integrated cybersecurity framework. Future Generation Computer Systems, 156, 191-205. DOI: https://doi.org/10.1016/j.future.2024.02.015

15. Smys, D. S., Basar, D. A., & Wang, D. H. (2020). Hybrid intrusion detection system for Internet of Things (IoT). Journal of ISMAC, 2(4), 190-199. DOI: https://doi.org/10.36548/jismac.2020.4.002

16. Kim, J., Kim, J., Kim, H., Shim, M., & Choi, E. (2020). CNN-based network intrusion detection against denial-of-service attacks. Electronics, 9(6), 916. DOI: https://doi.org/10.3390/electronics9060916

17. Asharf, J., Moustafa, N., Khurshid, H., Debie, E., Haider, W., & Wahab, A. (2020). A review of intrusion detection systems using machine and deep learning in Internet of Things: Challenges, solutions and future directions. Electronics, 9(7), 1177. DOI: https://doi.org/10.3390/electronics9071177

18. Verma, A., & Ranga, V. (2020). Machine learning based intrusion detection systems for IoT applications. Wireless Personal Communications, 111(4), 2287-2310. DOI: https://doi.org/10.1007/s11277-019-06986-8

19. Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), e4150. DOI: https://doi.org/10.1002/ett.4150

20. Tama, B. A., Nkenyereye, L., Islam, S. M. R., & Kwak, K.-S. (2020). An enhanced anomaly detection in web traffic using a stack of classifier ensemble. IEEE Access, 8, 24120-24134. DOI: https://doi.org/10.1109/ACCESS.2020.2969428

21. Souhail, M., Rachidi, T., & Assem, N. (2019). Network based intrusion detection using the UNSW-NB15 dataset. International Journal of Computing and Digital Systems, 8(5), 477-487. DOI: https://doi.org/10.12785/ijcds/080505

22. Leghris, C., Elaeraj, O., & Renault, E. (2019). Improved security intrusion detection using intelligent techniques. Proceedings of International Conference on Wireless Networks and Mobile Communications (WINCOM), 1-5. DOI: https://doi.org/10.1109/WINCOM47513.2019.8942553

23. Khater, B. S., Wahab, A. W. B. A., Idris, M. Y. I. B., Hussain, M. A., & Ibrahim, A. A. (2019). A lightweight perceptron-based intrusion detection system for fog computing. Applied Sciences, 9(1), 178. DOI: https://doi.org/10.3390/app9010178

24. Chafika, B., Taleb, T., Phan, C.-T., Tselios, C., & Tsolis, G. (2021). Distributed AI-based security for massive numbers of network slices in 5G & beyond mobile systems. Proceedings of Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 401-406. DOI: https://doi.org/10.1109/EuCNC/6GSummit51104.2021.9482418

25. Kumar, R., Kumar, P., Aloqaily, M., & Aljuhani, A. (2023). Deep-learning-based blockchain for secure zero touch networks. IEEE Communications Magazine, 61(2), 96-102. DOI: https://doi.org/10.1109/MCOM.001.2200294

26. Khan, N. W., Alshehri, M. S., Khan, M. A., Almakdi, S., Moradpoor, N., Alazeb, A., Ullah, S., Naz, N., & Ahmad, J. (2023). A hybrid deep learning-based intrusion detection system for IoT networks. Mathematical Biosciences and Engineering, 20(8), 13491-13520. DOI: https://doi.org/10.3934/mbe.2023602

27. Yang, X., Peng, G., Zhang, D., & Lv, Y. (2022). An enhanced intrusion detection system for IoT networks based on deep learning and knowledge graph. Security and Communication Networks, 2022, 1-21. DOI: https://doi.org/10.1155/2022/4748528

28. Gallego-Madrid, J., Sanchez-Iborra, R., Ruiz, P. M., & Skarmeta, A. F. (2022). Machine learning-based zero-touch network and service management: A survey. Digital Communications and Networks, 8(2), 105-123. DOI: https://doi.org/10.1016/j.dcan.2021.09.001

29. El Houda, Z. A., Brik, B., & Khoukhi, L. (2022). Ensemble learning for intrusion detection in SDN-based zero touch smart grid systems. Proceedings of IEEE 47th Conference on Local Computer Networks (LCN), 149-156. DOI: https://doi.org/10.1109/LCN53696.2022.9843645

30. Chanal, P. M., & Kakkasageri, M. S. (2020). Security and privacy in IoT: A survey. Wireless Personal Communications, 115(2), 1667-1693. DOI: https://doi.org/10.1007/s11277-020-07649-9

31. ElKashlan, M., Elsayed, M. S., Jurcut, A. D., & Azer, M. (2023). A machine learning-based intrusion detection system for IoT electric vehicle charging stations (EVCSs). Electronics, 12(4), 1044. DOI: https://doi.org/10.3390/electronics12041044

32. Bugshan, N., Khalil, I., Kalapaaking, A. P., & Atiquzzaman, M. (2023). Intrusion detection-based ensemble learning and microservices for zero touch networks. IEEE Communications Magazine, 61(6), 86-92. DOI: https://doi.org/10.1109/MCOM.001.2200535

33. Alkahtani, H., & Aldhyani, T. H. H. (2021). Botnet attack detection by using CNN-LSTM model for Internet of Things applications. Security and Communication Networks, 2021, 1-23. DOI: https://doi.org/10.1155/2021/3806459

34. Alkahtani, H., & Aldhyani, T. H. H. (2021). Intrusion detection system to advance Internet of Things infrastructure-based deep learning algorithms. Complexity, 2021(1), 1-18. DOI: https://doi.org/10.1155/2021/5579851

35. Potnurwar, A. V., Bongirwar, V. K., Ajani, S., Shelke, N., Dhone, M., & Parati, N. (2023). Deep learning-based rule-based feature selection for intrusion detection in industrial Internet of Things networks. International Journal of Intelligent Systems and Applications in Engineering, 11(10), 23-35.

36. Chawla, S. (2017). Deep learning based intrusion detection system for Internet of Things. M.S. thesis, University of Washington.

37. Hussain, J., & Hnamte, V. (2021). Deep learning based intrusion detection system: Software defined network. Proceedings of Asian Conference on Innovation in Technology (ASIANCON), 1-6. DOI: https://doi.org/10.1109/ASIANCON51346.2021.9544913

38. Rashid, M. M., Kamruzzaman, J., Hassan, M. M., Imam, T., & Gordon, S. (2020). Cyberattacks detection in IoT-based smart city applications using machine learning techniques. International Journal of Environmental Research and Public Health, 17(24), 9347. DOI: https://doi.org/10.3390/ijerph17249347

39. Gupta, S. K., Tripathi, M., & Grover, J. (2022). Hybrid optimization and deep learning based intrusion detection system. Computers and Electrical Engineering, 100, 107876. DOI: https://doi.org/10.1016/j.compeleceng.2022.107876

40. Elsaeidy, A. A., Jagannath, N., Sanchis, A. G., Jamalipour, A., & Munasinghe, K. S. (2020). Replay attack detection in smart cities using deep learning. IEEE Access, 8, 137825-137837. DOI: https://doi.org/10.1109/ACCESS.2020.3012411

41. Reddy, D. K., Behera, H. S., Nayak, J., Vijayakumar, P., Naik, B., & Singh, P. K. (2021). Deep neural network based anomaly detection in Internet of Things network traffic tracking for the applications of future smart cities. Transactions on Emerging Telecommunications Technologies, 32(7), e4121. DOI: https://doi.org/10.1002/ett.4121

42. Shafiq, M., Tian, Z., Sun, Y., Du, X., & Guizani, M. (2020). Selection of effective machine learning algorithm and bot-IoT attacks traffic identification for Internet of Things in smart city. Future Generation Computer Systems, 107, 433-442. DOI: https://doi.org/10.1016/j.future.2020.02.017

43. Vinayakumar, R., Alazab, M., Srinivasan, S., Pham, Q.-V., Padannayil, S. K., & Simran, K. (2020). A visualized botnet detection system based deep learning for the Internet of Things networks of smart cities. IEEE Transactions on Industry Applications, 56(4), 4436-4456. DOI: https://doi.org/10.1109/TIA.2020.2971952

44. Wang, M., et al. (2020). 6G Security: Challenges and Opportunities. IEEE Network.

45. Nguyen, V., et al. (2021). Security and Privacy for 6G: A Survey. IEEE Communications Surveys & Tutorials. DOI: https://doi.org/10.1109/COMST.2021.3108618

46. Porambage, P., et al. (2021). Roadmap to 6G Security and Privacy. IEEE Open Journal of the Communications Society. DOI: https://doi.org/10.1109/OJCOMS.2021.3078081

47. Mucchi, L., et al. (2021). Physical Layer Security in 6G Networks. IEEE Access. DOI: https://doi.org/10.1109/OJCOMS.2021.3103735

48. Mao, B., et al. (2023). AI for 6G Security: A Comprehensive Review. IEEE Internet of Things Journal.

49. Zuo, Y., et al. (2023). Blockchain for 6G Security. Future Generation Computer Systems.

50. Kazmi, S., et al. (2024). AI-Driven Security for 6G. IEEE Wireless Communications.

Downloads

Published

2025-12-30

How to Cite

N, R., M.Elamparithi, & V. Anuratha. (2025). Adaptive and intelligent security frameworks for sdn-nfv enabled next-generation networks: A Review. International Journal of Computational and Experimental Science and Engineering, 11(4). https://doi.org/10.22399/ijcesen.5189

Issue

Section

Review Article