Ai And Machine Learning for Cyber Threat Intelligence Sharing in SD-WAN Networks
Keywords:
Artificial Intelligence, Cyber Threat Intelligence, SD-WAN, Machine LearningAbstract
The increasing use of Software-Defined Wide Area Networks (SD-WAN) in corporate settings has resulted in substantial advantages in terms of efficiency, adaptability, and scalability. Cybersecurity threats have emerged, however, due to the ever-changing and dispersed character of the network architecture. An essential method for proactively identifying, avoiding, and reacting to cyber assaults is the sharing of cyber threat intelligence (CTI). This paper explores the integration of AI and ML approaches into CTI sharing scenarios within the framework of software-defined wide area networks (SD-WAN). Organisations may automate threat information collecting, analysis, and dissemination across remote nodes in real time with the use of artificial intelligence and machine learning. This study explores supervised and unsupervised learning models for analysing behaviour, detecting threats, and identifying anomalies. Furthermore, we look at the potential of federated learning to keep data private across several SD-WAN locations. Along with this, the report delves into the challenges that come with intelligence sharing across several organisations, touching on topics like trust, data standards, and interoperability. Evidence from experiments and case studies shows that CTI sharing enhanced with AI and ML may reduce reaction times and increase danger detection rates. The results illuminate the potential of intelligent threat-sharing systems in terms of strengthening the cyber resilience of SD-WAN installations and allowing defensive mechanisms that are more adaptable, self-sufficient, and cooperative.
Downloads
References
Ahmad, I., Namal, S., Ylianttila, M., & Gurtov, A. (2022). Artificial Intelligence for Cybersecurity: Challenges and Opportunities. Future Internet, 14(1), 19.
Ali, M., Wang, G., & Li, K.-C. (2021). SD-WAN: A Comprehensive Security Survey. Journal of Network and Computer Applications, 188, 103110.
Buczak, A. L., & Guven, E. (2023). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176.
Capgemini Research Institute. (2019). Reinventing Cybersecurity with Artificial Intelligence.
Chen, X., Wu, J., Li, Y., & Xu, X. (2022). Machine Learning in Network Traffic Classification: Algorithms, Performance, and Challenges. IEEE Communications Surveys & Tutorials, 24(1), 1–38.
Doshi-Velez, F., & Kim, B. (2017). Towards A Rigorous Science of Interpretable Machine Learning. arXiv preprint arXiv:1702.08608.
ENISA. (2020). Threat Intelligence Sharing Guidelines. European Union Agency for Cybersecurity.
Fadlullah, Z. M., Tang, F., Mao, B., Kato, N., Akashi, O., Inoue, T., & Mizutani, K. (2017). State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow’s Intelligent Network Traffic Control Systems. IEEE Communications Surveys & Tutorials, 19(4), 2432–2455.
Gartner. (2023). Magic Quadrant for SD-WAN Infrastructure.
Li, T., Sahu, A. K., Talwalkar, A., & Smith, V. (2020). Federated Learning: Challenges, Methods, and Future Directions. IEEE Signal Processing Magazine, 37(3), 50–60.
Shokri, R., & Shmatikov, V. (2015). Privacy-Preserving Deep Learning. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 1310–1321.
Tang, T. A., Mhamdi, L., McLernon, D., Zaidi, S. A. R., & Ghogho, M. (2021). Deep Learning Approaches for Network Intrusion Detection: A Performance Comparison. IEEE Access, 6, 21954–21961.
A. Rohyans et. al., (2019, Jan. 6) Cisco SD-Wan Cloud Scale Architecture [Online]. Available: https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprisenetworks/sd-wan/nb-06-cisco-sd-wan-ebook-cte-en.pdf
A. Yassin, F. Yalcin (2019, Nov. 20) Enterprise transition to Softwaredefined networking in a Wide Area Network [Online]. Available: https://www.divaportal.org/smash/get/diva2:1322911/FULLTEXT01.pdf
IDC (2019, April. 20) IDC Technology Spotlight on SD-WAN: Security, Application Experience and Operational Simplicity Drive Market Growth [Online]. Available: https://www.cisco.com/c/dam/m/digital/elqcmcglobal/witb/2260887/English-IDC-Pdf.pdf
Aruba-Networks (2022, Dec. 15) What is SD-WAN? [Online]. Available: https://www.arubanetworks.com/en-gb/faq/what-is-sd-wan/
P. Jensen (2018, June 27) Cisco SD-WAN (Cisco Virtual Update) [Online].
Z. Yang, Y. Cui, B. Li, Y. Liu and Y. Xu, "Software-Defined Wide Area Network (SD-WAN): Architecture, Advances and Opportunities," 2019 28th International Conference on Computer Communication and Networks (ICCCN), 2019, pp. 1-9, doi: 10.1109/ICCCN.2019.8847124.
P. Segeč, M. Moravčik, J. Uratmová, J. Papán and O. Yeremenko, "SDWAN - architecture, functions and benefits," 2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA), 2020, pp. 593-599, doi: 10.1109/ICETA51985.2020.9379257.
B. Soewito and C. E. Andhika, “Next generation firewall for improving security in company and iot network,” in 2019 International Seminar on Intelligent Technology and Its Applications (ISITIA), 2019, pp. 205– 209.
F. Wei, Z. Wan, and H. He, “Cyber-attack recovery strategy for smart grid based on deep reinforcement learning,” IEEE Transactions on Smart Grid, vol. 11, no. 3, pp. 2476–2486, 2023.
T. Lubna, I. Mahmud and Y. -Z. Cho, "Dynamic Congestion Control Algorithm for Multipath Transport Protocols," 2018 International Conference on Information and Communication Technology Convergence (ICTC), 2018, pp. 672-674, doi: 10.1109/ICTC.2018.8539622.
S. A. Jyothi, A. Singla, P. B. Godfrey and A. Kolla, "Measuring and Understanding Throughput of Network Topologies," SC '16: Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, 2023, pp. 761-772, doi: 10.1109/SC.2023.64.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.