Preview

Bulletin of Shakarim University. Technical Sciences

Advanced search

MULTI-OBJECTIVE EVOLUTIONARY OPTIMIZATION OF SECURITY POLICIES IN SOFTWAREDEFINED NETWORKS (SDN) GIVEN TCAM AND LATENCY CONSTRAINTS

https://doi.org/10.53360/2788-7995-2025-4(20)-28

Abstract

This article examines the problem of optimizing security policies in software-defined networks (SDN). The authors propose solving this problem using NSGA-II, an efficient algorithm for evolutionary optimization of multiple objectives. The proposed approach aims to achieve a balance between the need to strictly enforce network security and the availability of limited computing resources. Particular attention is paid to factors such as data transmission latency and TCAM table size, which significantly affect the effectiveness of traffic filtering. Based on the model developed in the article, which includes threat probability assessments, objective function normalization methods, and the use of penalty coefficients for rule conflicts, optimization was performed across three key parameters: attack risk, network latency, and TCAM load. The simulation covered three network operation scenarios-normal, mixed, and attack-using Mininet and Ryu packets. A comparison of the proposed method with differential evolution (DE) and a greedy algorithm (Greedy) showed that NSGA-II achieves optimal solution distribution along the Pareto frontier, converges faster, and maintains filtering accuracy. The paper also presents visualization of generational transitions, tradeoff graphs, and load profiles. The conclusion discusses the potential for integrating the proposed model with ONOS and OpenDaylight controllers, and discusses the feasibility of using hybrid solutions based on Deep Reinforcement Learning, Federated Learning, and Explainable AI.

About the Authors

B. Shyryn
L.N. Gumilyov Eurasian National University
Kazakhstan

Bexultan Shyryn – PhD student of the Department of Computer and Software Engineering

0100000, Republic of Kazakhstan, Astana, Satpayev street, building 2



T. A. Ahanger
Prince Sattam Bin Abdulaziz University
Saudi Arabia

Tariq Ahamed Ahanger – Doctor of Philosophy, Professor (Associate)

Al Kharj, Saudi Arabia



A. Zhumadillayeva
L.N. Gumilyov Eurasian National University
Kazakhstan

Aynur Zhumadillayeva – Associate Professor of the Department of Computer and Software Engineering, IT Faculty 

0100000, Republic of Kazakhstan, Astana, Satpayev street, building 2



G. Bekeshova
L.N. Gumilyov Eurasian National University
Kazakhstan

Gulvira Bekeshova – Senior Lecturer at the Department of Information Security, IT Faculty 

0100000, Republic of Kazakhstan, Astana, Satpayev street, building 2



References

1. Optimal controller selection and migration in large scale software defined networks for next generation IoT / M. Shahzad et al // SN Applied Sciences. – 2023. – Vol. 5, Art. 309.

2. Adaptive population-based multi-objective optimization in SDN controllers for cost optimization / А.А. Qaffas et al // Physical Communication. – 2023. – Vol. 58, Art. 102006.

3. On the (in)security of the control plane of SDN architecture: A survey / Z.A. Bhuiyan et al // IEEE Access. – 2023. – Vol. 11. – P. 91550-91582.

4. Alzahrani A.O. ML-IDSDN: Machine learning based intrusion detection system for softwaredefined network / A.O. Alzahrani, M.J.F. Alenazi // Concurrency and Computation: Practice and Experience. – 2023. – Vol. 35, Art. e7438.

5. Towards robust SDN security: A comparative analysis of oversampling techniques with ML and DL classifiers / А. Bajenaid et al // Electronics. – 2025. – Vol. 14, № 5. – Р. 995.

6. Mahadik S.S. Edge-Federated Learning-Based Intelligent Intrusion Detection System for Heterogeneous Internet of Things / S.S. Mahadik, P.M. Pawar, R. Muthalagu // IEEE Access. – 2024. – Vol. 12. – P. 81736-81757.

7. Survey of federated learning in intrusion detection / H. Zhang et al // Journal of Parallel and Distributed Computing. – 2025. – Vol. 195, Art. 104976.

8. Reinforcement learning-based SDN routing scheme empowered by causality detection and GNN / Y. He et al // Frontiers in Computational Neuroscience. – 2024. – Vol. 18, Article 1393025.

9. Explainable intrusion detection for cyber defences in the Internet of Things: Opportunities and solutions / N. Moustafa et al // IEEE Communications Surveys & Tutorials. – 2023. – P(99) 1-1.

10. Arreche O. XAI-IDS: Toward proposing an explainable artificial intelligence framework for enhancing network intrusion detection systems / O. Arreche, T. Guntur, M. Abdallah // Applied Sciences. – 2024. – Vol. 14, № 10, Art. 4170.

11. Ataa M.S. Intrusion detection in software defined network using deep learning approaches / M.S. Ataa, E.E. Sanad, R.A. El-khoribi // Scientific Reports. – 2024. – Vol. 14, Art. 29159.

12. Network intrusion detection model using wrapper-based feature selection and multi-head attention transformers / М. Umer et al // Scientific Reports. – 2025. – Vol. 15, Art. 28718.


Review

For citations:


Shyryn B., Ahanger T.A., Zhumadillayeva A., Bekeshova G. MULTI-OBJECTIVE EVOLUTIONARY OPTIMIZATION OF SECURITY POLICIES IN SOFTWAREDEFINED NETWORKS (SDN) GIVEN TCAM AND LATENCY CONSTRAINTS. Bulletin of Shakarim University. Technical Sciences. 2025;1(4(20)):238-248. (In Russ.) https://doi.org/10.53360/2788-7995-2025-4(20)-28

Views: 10

JATS XML


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2788-7995 (Print)
ISSN 3006-0524 (Online)
X