A_computationally_intelligent_framework_for_traffi
A_computationally_intelligent_framework_for_traffi
https://doi.org/10.1186/s13638-024-02392-2
Communications and Networking
*Correspondence:
[email protected] Abstract
1
Department of Information Software-defined networking (SDN) revolutionizes network administration
Science and Technology, College by centralizing control and decoupling the data plane from the control plane. Despite
of Engineering Guindy, Anna
University, Chennai, India
its advantages, the escalating volume of network traffic induces congestion at nodes,
adversely affecting routing quality and overall performance. Addressing congestion
has become imperative due to its emergence as a fundamental challenge in network
management. Previous strategies often faced drawbacks in handling congestion,
with issues arising from the inability to efficiently manage heavy packet surges
in specific network regions. In response, this research introduces a novel approach
integrating a multiplicative gated recurrent neural network with a congestion-
aware hunter prey optimization (HPO) algorithm for effective traffic management
in SDN. The framework leverages machine learning and deep learning techniques,
acknowledged for their proficiency in processing traffic data. Comparative simulations
showcase the congestion-aware HPO algorithm’s superiority, achieving a normalized
throughput 3.4–7.6% higher than genetic algorithm (GA) and particle swarm
optimization (PSO) alternatives. Notably, the proposed framework significantly reduces
data transmission delays by 58–65% compared to the GA and PSO algorithms. This
research not only contributes a state-of-the-art solution but also addresses drawbacks
observed in existing methodologies, thereby advancing the field of traffic engineering
and congestion management in SDN. The proposed framework demonstrates notable
enhancements in both throughput and latency, providing a more robust foundation
for future SDN implementations.
Keywords: Software-defined network, Multiplicative gated recurrent neural network,
Hunter prey optimization, Traffic prediction, Congestion management
1 Introduction
Due to significant advancements in technology, the current network has become
increasingly complex, resulting in network traffic flow [1]. This massive network
traffic can lead to congestion. Consequently, network management and traffic
measurement issues have emerged [2]. Manual network administration is impractical,
© The Author(s) 2024. Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0
International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long
as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you
modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of
it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise
in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted
by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy
of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.
Zeng et al. [13] introduced a lightweight framework using DL for encrypted traffic
classification and demonstrated its superiority. The proposed framework classifies
network traffic based on the time features of the network traffic. Zhang et al. [14]
performed automatic feature extraction from network traffic and classification of
malicious traffic using CNN. In vehicular ad hoc networks, the SDN controller utilizes
CNN to learn the highest routing path trust value. The CNN-enabled SDN controller
provides trust-based optimized routing with a classification accuracy of 98.2%. CNN
is also used for optimized feature selection using the CNN algorithm [15]. Tang et al.
[16, 17] proposed a new DL algorithm to predict traffic and congestion in SDN. Deep
belief and deep CNN were used, and the prediction algorithm was coupled with a
DL-based channel assignment algorithm to route traffic. The gated recurrent unit
(GRU) network is a DL model widely used in speech and image processing [18] and
natural language processing [19]. It is well-suited for solving complex and nonlinear
forecasting problems [20], such as traffic flow prediction [21], energy consumption
prediction [22], and rainfall prediction. Tang et al. [16, 17] introduced a gated
recurrent unit-recurrent neural network (GRU-RNN)-based intrusion detection
system for SDN. The proposed system was tested with the NSL-KDD dataset and
achieved an accuracy of 89% with only six raw features. It was concluded that the
proposed GRU-RNN does not degrade network performance. Sun and Guan [23]
proposed a traffic situation prediction model based on the GRU network in SDN.
The Salp Swarm algorithm is used to optimize the hyperparameters of the GRU
automatically. However, the GRU possesses problems such as a low convergence rate
and low learning efficiency, resulting in excessively long training times, and even
under-fitting [9].
The main problem addressed in this research is the inefficiency and lack of
adaptability in current SDN routing algorithms, especially concerning dynamic traffic
patterns. While algorithms like shortest path first (SPF) and Dijkstra’s algorithm are
efficient, they may lack adaptability and scalability in handling the dynamic nature of
network traffic. Zhang et al. [24] introduced box-covering-based routing (BCR) for
large-scale SDN to reduce the time and space complexity of the Dijkstra algorithm
by decreasing the number of nodes and edges in the network. Although the BCR
algorithm decreases the network’s size, it still utilizes the Dijkstra algorithm in the
routing process. This prompts the use of meta-heuristic techniques for the SDN’s
routing process.
The incorporation of meta-heuristic algorithms becomes crucial due to several
shortcomings in traditional routing approaches. The proposed meta-heuristic approach
aims to overcome these limitations by considering real-time congestion levels during
routing, optimizing network performance, and ensuring a high Quality of Service (QoS).
In summary, the role of meta-heuristic algorithms, exemplified by the novel hunter prey
optimization (HPO) technique, becomes pivotal in optimizing routing decisions based
on real-time congestion awareness.
The subsequent sections will delve into the methodology and simulation outcomes,
showcasing the contributions of the proposed multiplicative gated recurrent neural
network (mGRNN) for traffic prediction and the congestion-aware hunter prey
optimization (CA-HPO) algorithm for dynamic traffic routing in SDN.
In this regard, the proposed research work develops two major units, namely, traffic
prediction and traffic-aware routing unit. The following are the novel contributions of
this research work.
The research paper is organized in a systematic structure with distinct sections at the
end of Sect. 1 as follows. Section 2, titled “Literature review,” incorporates case studies
to underscore the adaptability of software-defined networking (SDN) in addressing
diverse challenges. This section serves as a foundational exploration, providing context
and insights that contribute to the subsequent sections. Section 3, titled “Methods/
experimentation,” provides a comprehensive account of the experimental setup and
methodologies applied in the study. It details the data collection process, model
configurations, and experimental procedures conducted to ensure the reliability of the
results. Following this, Sect. 4, titled “Proposed methodology,” introduces the novel
framework developed for traffic engineering and congestion management in SDN. This
section delves into the specifics of the multiplicative gated recurrent neural network
(mGRNN) for traffic prediction and the congestion-aware hunter prey optimization
(CA-HPO) algorithm for dynamic traffic routing. Section 5, titled “Results and
discussion,” presents the outcomes of the experiments and provides an in-depth analysis.
This section critically evaluates the performance of the proposed methodologies,
drawing meaningful insights from the obtained data. Lastly, Sect. 6, titled “Conclusion,”
encapsulates the key findings and summarizes the contributions. This organized
structure guides the reader through a coherent progression from the foundational
literature to the experimental methods, results, and concluding insights.
2 Literature review
In the dynamic intersection of software-defined networking (SDN) and the Internet
of Things (IoT), researchers have made significant contributions addressing various
challenges. Keshari et al. [25] specifically concentrate on software-defined IoT networks,
proposing an intelligent and energy-efficient strategy to manage traffic flow. Their
study underscores the necessity of tailoring SDN solutions for IoT, emphasizing the
3 Methods/experimentation
The aim of this study is to address the issue of congestion in SDN caused by a high volume
of traffic in specific regions of the developed network topology. To achieve efficient traffic
management in SDN, this research proposes a novel mGRNN and a CA-HPO algorithm
as shown in Fig. 1. The SDN network is modeled with interconnected SDN controllers
using the OpenFlow protocol to exchange control information. The method employs a
simulation-based approach to evaluate the proposed SDN traffic prediction and routing
optimization scheme. The simulations are performed using MATLAB R2021a and the
image processing toolbox. The primary intervention in this research is the application
of the proposed mGRNN and CA-HPO algorithm for traffic management in SDN. The
mGRNN is used to predict traffic patterns and congestion-prone regions, while the
HPO algorithm optimizes the routing decisions in the SDN to alleviate congestion.
For comparison, two well-known optimization algorithms, namely genetic algorithm
(GA) and particle swarm optimization (PSO), are used as baselines. The GA and PSO
Fig. 1 Proposed congestion-aware SDN architecture. This figure illustrates the overall architecture of the
proposed SDN traffic prediction and routing optimization. This architecture consists of two units: the traffic
prediction unit and the traffic routing unit
algorithms are widely recognized in the literature for their effectiveness in optimization
tasks. The work is validated to provide efficient results in congestion-aware routing.
3.1 Improvements
In the dynamic landscape of software-defined networking (SDN), effective traffic
management is crucial for optimizing network performance. This study introduces
several key improvements to enhance the reliability and applicability of the mGRNN
(modified general regression neural network) and CA-HPO (combinatorial algorithm
with hyperparameter optimization) algorithms. The objective is to advance the
understanding and application of these algorithms in the context of SDN traffic
management.
3.1.1 Summary of improvements
Incorporating these improvements collectively aims to advance the field of SDN traffic
management, providing more nuanced insights into the capabilities and limitations of
the mGRNN and CA-HPO algorithms in real-world scenarios.
4 Proposed methodology
Traditional networks have limitations in terms of function expansion and configuration.
To enhance network management convenience, the development of software-defined
networking (SDN) has been initiated. SDN is a new network architecture that separates
network control and forwarding functions, simplifying network management and
improving network programmability and flexibility. SDN enables better utilization of
network resources, controls over network infrastructure expansion, and protects the
underlying network complexity for upper-level users. It is continuously evolving based
on traditional networks, significantly improving the utilization of network resources.
Network traffic exhibits variations in both time and space. In terms of time, network
traffic varies throughout the day, with higher traffic during daytime compared to
nighttime. SDN controllers are interconnected and exchange control information
through the OpenFlow protocol. The SDN network is divided into application, control,
and data layers. The control layer consists of one or more controllers that connect
the data forwarding layer to the application layer through an interface. The control
layer has centralized control over the network topology and can design approaches to
manage data transmission paths. The data forwarding layer consists of switches, hosts,
and other underlying network devices, which implement the data plane. The data layer
does not have the capability to choose forwarding paths but relies on the control layer’s
provided paths for communication. Network flows are dynamic variables that change
continuously in a fine-grained perspective but remain stable over time.
Although mitigation can improve network performance by supporting current burst
network data flows and reducing overall network delay, it cannot guarantee improvement
within a specific time frame. When the SDN network employs optimized routing
configurations, especially during burst flows, the load flow may exceed the network
capacity. To prevent congestion and achieve traffic control goals, suitable transmission
resources must be allocated for data traffic based on transmission requirements.
Additionally, restricting traffic flow from entering bottleneck links becomes essential. In
this context, a dynamic and efficient traffic engineering (TE) scheme, such as SDN-based
traffic prediction and routing optimization, has been developed. Figure 1 illustrates the
overall architecture of the proposed SDN traffic prediction and routing optimization.
This architecture consists of two units: the traffic prediction unit and the traffic routing
unit.
4.1 SDN controller
SDN separates the data plane and the control plane, transferring network intelligence
to the controller, where all calculations are performed, and various applications and
features can be added as required. In this regard, a lightweight carrier-grade controller
is proposed, focusing on essential modules. These modules include the link discovery
module, topology module, storage module, strategy-making module, flow table module,
and control data module. The topology manager and link discovery modules play a
crucial role in providing routing services. The link discovery module is responsible
for discovering and maintaining the state of the network’s physical links. There are
two methods of link discovery: link discovery between OpenFlow Nodes (OpenFlow
switches) using the standard link layer discovery protocol (LLDP) and link discovery
between edge OpenFlow Node and Host. When any unknown traffic enters the
OpenFlow domain, the controller initiates the link discovery process. The information
gathered by the link discovery module is used to build the neighbor database in the
controller, which captures all the OpenFlow neighbors. As a result, the topology
manager creates and maintains topology information in the controller, as well as
calculating network paths. Based on the information obtained from the link discovery
module, this module uses the neighbor database to construct network topologies. At the
controller, the Topology Manager creates the global Topology Database, which contains
information on the shortest (and alternate) paths to every OpenFlow node or host.
Our proposed methodology builds upon and extends prior work in traffic prediction,
particularly leveraging concepts from the multiplicative recurrent neural network
(mRNN) model [31]. Recognizing the strengths of both mRNN and gated recurrent
unit (GRU) architectures, our model, termed mGRNN, represents a hybrid approach
that combines these frameworks. This combination results in a novel architecture with
improved expressiveness and adaptability. It extends the work of Lohrasbinasab et al.
[32] by introducing a model that incorporates distinct recurrent transition functions and
memory cells, enhancing the model’s capability to capture intricate patterns in traffic
data.
Fig. 2 Proposed traffic prediction network. This figure illustrates the functioning of the proposed
mGRNN-based traffic prediction network
incorporates distinct recurrent transition functions for each possible input, enhancing
its expressiveness. Additionally, the model includes memory cells that utilize past
information during the learning process. The effectiveness of the prediction relies on the
quality of the learning process. These unique characteristics differentiate the proposed
mGRNN traffic prediction model and position it as superior to existing traffic prediction
models.
The employment of mGRNN for the traffic prediction involves two distinct phases:
(a) the training phase and (b) the testing phase. During the training phase, the mGRNN
is supervised and learns from the data by obtaining the training data at the input layer.
The mGRNN dynamically adjusts its parameters to attain the desired output value for
the given input set. The backpropagation algorithm is employed to train the mGRNN.
This algorithm propagates the error backward, from the output layer to the input layer,
uninterruptedly modifying the weights until the output error reaches a predefined
threshold. Consequently, the mGRNN learns to identify patterns between input sets
and their corresponding target values. On the other hand, the testing phase involves
testing the mGRNN. A new, unseen traffic matrix input is presented to the mGRNN,
and the output predicted next state traffic matrix is calculated, enabling the prediction of
outcomes for novel input data.
The concept of mGRNN is inspired by the multiplicative recurrent neural network
(mRNN) model [31]. The model combines the advantages of mRNN and gated recurrent
unit (GRU) cell model. The mRNN model is specifically developed to enable adaptable
transitions based on input changes. Recognizing the complementary characteristics
of the GRU and mRNN architectures, a hybrid model called mGRNN is introduce,
which combines the factorized hidden-to-hidden transition of mRNNs with the gating
framework of GRUs. By incorporating connections from the mRNN’s intermediate state
mt to each gating unit in the GRU, a system is created that merges the strengths of both
architectures as follows.
Fig. 3 Proposed traffic routing unit. This figure illustrates the functioning of the proposed CA-HPO-based
traffic routing unit
the search space are controlled and directed by a set of rules and strategies inspired by
the HPO algorithm. This process continues iteratively until maximum search iteration is
reached. In each iteration, the position of each population member is updated according
to the algorithm’s rules, and the newly determined position is evaluated using the
objective function. As a result, the solutions gradually improve with each iteration.
1 1
fi = Ai + + (6)
Ci |Ti+1 |
where Ai is the sum of availabilities of links of the route i (link availability 0 indicates that
the link is unavailable and 1 indicates that the link is available), Ci is the congestion rate
of the route, and Ti+1 is the traffic matrix predicted by the traffic prediction unit.
The search mechanism typically involves two major phases: exploration and exploitation.
Exploration refers to the algorithm’s inclination toward highly random behaviors, resulting
in significant changes in the solutions. These changes facilitate further exploration of the
search space, supporting in the process of discovering promising areas. Once promising
regions are determined, random behaviors are reduced to focus the algorithm’s search
around these favorable regions, which is called as exploitation. For the hunter search
mechanism, the equation governing the update of the hunter’s position is described as
follows.
xi (t + 1) = xi (t) + 0.5 2CZPpos(i) − xi (t) + 2(1 − C)Zµ(i) − xi (t) (7)
where x(t) represents the current hunter position, x(t + 1) represents the hunter next
position, Ppos represents the prey position, µ represents the mean of all positions, and Z
is an adaptive parameter computed using the following equation.
� 2 ⊗ (∼ idx)
Z = R1 ⊗ idx + R (8)
where R1 is a random number in the range [0,1] and R 2 is a random vector in the range
[0,1], idx is the index numbers of the random vector R 3 which is also in the range [0,1]
and satisfies the condition (P == 0). P is a random vector with values 0 and 1 equal to the
number of problem variables.
The balance parameter C computes the trade-off between exploration and exploitation.
Its value gradually decrements from 1 to 0.02 as the iterations progress. The value of C is
calculated using the Eq. (9).
0.98
C = 1 − it (9)
itmax
where it denotes the current iteration and itmax denotes the maximum number of
iterations.
Ppos is then calculated using the Euclidean distance D as follows.
Ppos = xi i is the index of Max(end)sort(D) (10)
where
1
d 2
(11)
�
2
D= (xi − µi )
j=1
n
1
µ= xi (12)
n
i=1
The update equation of the prey position for each iteration is given by,
Ppos = xi i is sorted D(kbest) (13)
where Gpos represents the optimal global position and R4 is a random number within
the range of − 1 to 1. Thus the final optimal dynamic route determined by the proposed
congestion-aware HPO-based traffic routing algorithm is Gpos.
5.1 SDN deployment
The data packets are captured using the hypertext transfer protocol in the Wireshark
platform. The transmission of packets from one node to another is captured using the
interface. The information on data transmission and traffic during routing was saved as
output csv file format. The traffic files of all the nodes in the network for a specific period
of time are also recorded and saved. These files are then utilized for further processing
of traffic prediction and optimal route selection in the framework. The set of the traffic
prediction was done during the data transmission and saved as shown in Fig. 4.
5.2 Performance measures
The performance of the proposed framework was assessed using various performance
metrics such as mean absolute error (MAE), mean square error (MSE), and root-mean-
square error (RMSE).
Fig. 4 SDN deployment. This figure shows the SDN deployment, where the data packets are captured using
the hypertext transfer protocol in the Wireshark platform. This shows the set of the traffic prediction done
during the data transmission
predictions and observations as a measurement of the magnitude of errors for the entire
group. The expression for MAE was given as follows;
n
x̂i − xi
MAE = i=1 (15)
n
2
n
i=1 (x̂i −xi )
n
RRMSE = 2 (18)
n
i=1 x̂i
where x̂i is the predicted observations; x̂i is the true or actual values; n is the total
number of observations.
5.3 Performance evaluation
5.3.1 Traffic prediction
The performance of the proposed traffic prediction model was compared with the
existing methods such as SVM, KNN, DT, ANN, and RNN. Table 1 presents the
comparisons of values of MAE, MSE, and RMSE of the proposed and existing method.
Figure 5 graphically shows the MAE value of the proposed and existing models. It was
seen that the MAE value of the proposed model was less as compared to the existing
model such as SVM, KNN, DT, ANN, and RNN. The MAE value of the proposed model
was 4.2–91% lesser than the existing models.
Figure 6 graphically shows the MSE value of the proposed and existing methods.
The proposed mGRNN model shows the least MSE value of 0.00905. The MSE value
0.035
0.03
0.025
0.02
MAE
0.015
0.01
0.005
0
Decision Tree KNN SVM ANN RNN Proposed
MG-RNN
Model
Methods
Fig. 5 MAE value of the proposed and existing methods. This figure graphically shows the MAE value of the
proposed and existing models. It was seen that the MAE value of the proposed model was less as compared
to the existing model such as SVM, KNN, DT, ANN, and RNN. The MAE value of the proposed model was
4.2–91% lesser than the existing models
0.07
0.06
0.05
0.04
MSE
0.03
0.02
0.01
0
Decision Tree KNN SVM ANN RNN Proposed MG-
RNN Model
Methods
Fig. 6 MSE value of the proposed and existing methods. This figure graphically shows the MSE value of the
proposed and existing methods. The proposed mGRNN model shows the least MSE value of 0.00905. The
MSE value of the proposed model was 9.6–85.3% lesser than the existing model such as SVM, KNN, DT, ANN,
and RNN
0.14
0.12
0.1
0.08
RMSE
0.06
0.04
0.02
0
Decision Tree KNN SVM ANN RNN Proposed MG-
RNN Model
Methods
Fig. 7 RMSE value of the proposed and existing methods. This figure graphically shows the RMSE value
of the proposed and existing models. It was seen that the RMSE value of the proposed model was less as
compared to the existing models. The RMSE value of the proposed model was found to be 26.5–77.4% lesser
than the existing models such as SVM, KNN, DT, ANN, and RNN
0.09
0.08
0.07
0.06
RRMSE
0.05
0.04
0.03
0.02
0.01
0
Decision Tree KNN SVM ANN RNN Proposed MG-
RNN Model
Methods
Fig. 8 RRMSE value of the proposed and existing methods. This figure graphically shows the RRMSE value
of the proposed and existing models. It was seen that the RRMSE value of the proposed model was less as
compared to the existing models. The RRMSE value of the proposed model was found to be 7.85–85.7%
lesser than the existing models such as SVM, KNN, DT, ANN, and RNN
of the proposed model was 9.6–85.3% lesser than the existing model such as SVM,
KNN, DT, ANN, and RNN.
Figure 7 graphically shows the RMSE value of the proposed and existing models.
It was seen that the RMSE value of the proposed model was less as compared to the
existing models. The RMSE value of the proposed model was found to be 26.5–77.4%
lesser than the existing models such as SVM, KNN, DT, ANN, and RNN.
Figure 8 graphically shows the RRMSE value of the proposed and existing models.
It was seen that the RRMSE value of the proposed model was less as compared to
the existing models. The RRMSE value of the proposed model was found to be 7.85–
85.7% lesser than the existing models such as SVM, KNN, DT, ANN, and RNN.
5.3.3 Traffic routing
The performance of the proposed traffic routing model was compared with the existing
GA and PSO models in terms of routing overhead (packets), Normal throughput, and
average delay.
The normalized throughput of the network can be defined as:
NC
Normalized throughput = (19)
NT
where NC is the number of data packets correctly received, and NT is the total number of
data packets sent.
The average delay can be defined as:
M×L
Average delay = mean (20)
Tr
where M , is the number of travelled links, L is the length of the data packet and Tr is the
rate of data transmission.
Figure 9 presents the routing overhead of the various methods such as CA-HPO,
GA, and PSO against various numbers of nodes. It was seen that the routing overhead
decreases with the increase in number of nodes. The routing overhead of the
proposed model was very less than the GA and PSO methods. The proposed CA-HPO
4000
3600
3400
3200
3000
2800
10 20 30 40 50
Number of Nodes
GA PSO Proposed CA-HPO
Fig. 9 Routing overhead of proposed and existing methods. This figure presents the routing overhead of
the various methods such as CA-HPO, GA, and PSO against various numbers of nodes. It was seen that the
routing overhead decreases with the increase in number of nodes. The routing overhead of the proposed
model was very less than the GA and PSO methods. The proposed CA-HPO accomplished a lower routing
overhead of 2854 at 50 nodes, were the routing overhead of the existing models such as GA and PSO,
achieved 3412 and 3260, respectively
1
Normalized Throughput
0.95
0.9
0.85
0.8
0.75
20 40 60 80 100 120
Time (s)
GA PSO Proposed CA-HPO
Fig. 10 Normalized throughout of the proposed and existing methods. This figure presents the normalized
throughout of the various methods such as CA-HPO, GA, and PSO against various simulation times. It was
observed that the normalized throughout of the proposed CAHPO algorithm was 3.4–7.6% higher than the
normalized throughout of GA and PSO algorithms. The proposed CA-HPO algorithm showed a high speed in
searching the optimized routing path with minimum RMSE
accomplished a lower routing overhead of 2854 at 50 nodes, where the routing overhead
of the existing models, such as GA and PSO, achieved 3412 and 3260, respectively.
5.3.4 System performance
Figure 10 presents the normalized throughout of the various methods such as CA-HPO,
GA, and PSO against various simulation times. The normalized throughput was
increased with the increase in simulation time, which demonstrates that the network
was enhanced. The normalized throughout of the proposed CA-HPO was 0.99 packets/
seconds, whereas the normalized throughout of the GA and PSO was 0.99 packets/
seconds and 0.99 packets/seconds. It was observed that the normalized throughout of
the proposed CA-HPO algorithm was 3.4–7.6% higher than the normalized throughout
of GA and PSO algorithms. The proposed CA-HPO algorithm showed a high speed in
searching the optimized routing path with minimum RMSE. In the HPO technique,
which includes prey and predator populations, a predator attacks the victim who
wanders far from their group. The animals can place themselves farther from danger
as the hunter moves closer to the distant target. It was assumed that the search agent’s
station has a great fitness value and was a secure area. With the inspiration of the animal
hunting behavior, the HPO algorithm can search the optimized routing path.
Figure 11 presents the variation of average delay against the variation in simulation
time of existing and proposed methods. The average delay of the proposed CA-HPO
method was 58–65% lesser than GA and PSO methods. It was observed that average
delay in data transmission was increased with increase in simulation time. This shows
that the QoS of the network was enhanced.
0.4
0.35
0.3
Average Delay (s)
0.25
0.2
0.15
0.1
0.05
0
20 40 60 80 100 120
Time (s)
GA PSO Proposed CA-HPO
Fig. 11 Average delay of the proposed and existing methods. This figure presents the variation of average
delay against the variation in simulation time of existing and proposed methods. The average delay of the
proposed CA-HPO method was 58–65% lesser than GA and PSO methods. It was observed that average delay
in data transmission was increased with increase in simulation time. This shows that the QoS of the network
was enhanced
In summary, the proposed mGRNN model stands out as a novel and effective approach
for traffic prediction in SDNs, offering unique features that contribute to its accuracy
and adaptability. The thorough comparison with other machine learning algorithms, as
well as PSO and GA, provides a comprehensive understanding of the model’s strengths
and advantages in the context of our research objectives.
6 Conclusions
The evolution of AI and ML in route optimization for the SDN can be viewed as a
decision-making policy that does not require a complex mathematical model when the
model has been trained. The high computation cost would be the shortcoming of using
meta-heuristic algorithms such as the ant colony optimization (ACO) algorithm, etc., for
optimal routing in SDN. In comparison with various research articles such as Albakri
et al. [35] and Thenmozhi et al. [36], the authors of this study have not conducted a
comprehensive comparison of performance measures, including mean absolute error
(MAE), mean squared error (MSE), root-mean-squared error (RMSE), and relative
root-mean-squared error (RRMSE). The model proposed in this article demonstrates a
significant enhancement in SDN traffic management with a lower error rate.
In this paper, a novel multiplicative gated recurrent neural network (mGRNN) and
congestion-aware hunter prey optimization (HPO) algorithm was utilized for effective
traffic prediction and routing for efficient traffic management in the SDN. It was seen
that the proposed mGRNN can effectively predict the traffic of the SDN. The MAE,
MSE, RMSE, and RRMSE of the proposed model were found to be 4.2–91%, 9.6–85.3%,
26.5–77.4%, and 7.85–85.7% lesser than the existing models like SVM, KNN, DT, ANN,
RNN. The performance of the CA-HPO algorithm is also better in searching for optimal
routing with improved QoS of the network.
Abbreviations
SDN Software-defined networking
ML Machine learning
DL Deep learning
mGRNN Multiplicative gated recurrent neural network
HPO Hunter prey optimization
CA-HPO Congestion-aware hunter prey optimization
GA Genetic algorithm
PSO Particle swarm optimization
TE Traffic engineering
SAE Sparse autoencoder
CNN Convolutional neural network
LSTM-RNN Long short-term memory-recurrent neural network
TM Traffic matrix
GRU Gated recurrent unit
SPF Shortest path first
BCR Box-covering-based routing
QoS Quality of Service
LLDP Link layer discovery protocol
RAM Random access memory
GPU Graphics processing unit
MAE Mean absolute error
MSE Mean square error
RMSE Root-mean-square error
RRMSE Relative root-mean-square error
Acknowledgements
The authors would like to acknowledge the anonymous reviewers for their thoughtful comments.
Author contributions
L. Leo Prasanth designed the algorithm, performed the simulation results, and drafted the manuscript under the
supervision of Dr. E. Uma. All authors read and approved the final manuscript.
Funding
This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.
Declarations
Competing interests
The authors declare that they have no competing interests.
References
1. B.A.A. Nunes, M. Mendonca, X.N. Nguyen, K. Obraczka, T. Turletti, A survey of software-defined networking: past,
present, and future of programmable networks. IEEE Commun. Surv. Tutor. 16(3), 1617–1634 (2014)
2. F. Hu, Q. Hao, K. Bao, A survey on software-defined network and openflow: from concept to implementation. IEEE
Commun. Surv. Tutor. 16(4), 2181–2206 (2014)
3. W. Xia, Y. Wen, C.H. Foh, D. Niyato, H. Xie, A survey on software-defined networking. IEEE Commun. Surv. Tutor. 17(1),
27–51 (2014)
4. N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, J. Turner, OpenFlow: enabling
innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69–74 (2008)
5. T. Mahboob, Y.R. Jung, M.Y. Chung, Optimized routing in software defined networks–a reinforcement learning
approach. In Proceedings of the 13th International Conference on Ubiquitous Information Management and
Communication (IMCOM) 2019 13 (Springer, 2019), pp. 267–278
6. M. Perera, K. Piamrat, S. Hamma, Network traffic classification using machine learning for software defined networks.
In Journées Non Thématiques GDR-RSD 2020 (2020)
7. R. Thupae, B. Isong, N. Gasela, A.M. Abu-Mahfouz, Machine learning techniques for traffic identification and
classifiacation in SDWSN: a survey. In IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society (IEEE,
2018), pp. 4645–4650
8. H.K. Lim, J.B. Kim, J.S. Heo, K. Kim, Y.G. Hong, Y.H. Han, Packet-based network traffic classification using deep learning.
In 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC). (IEEE, 2019), pp.
046–051
9. P. Wang, F. Ye, X. Chen, Y. Qian, Datanet: deep learning based encrypted network traffic classification in SDN home
gateway. IEEE Access 6, 55380–55391 (2018)
10. A. Azzouni, G. Pujolle, A long short-term memory recurrent neural network framework for network traffic matrix
prediction (2017). arXiv preprint https://arxiv.org/abs/1705.05690
11. A. Azzouni, R. Boutaba, G. Pujolle, NeuRoute: predictive dynamic routing for software-defined networks. In 2017 13th
International Conference on Network and Service Management (CNSM) (IEEE, 2017), pp. 1–6
12. A. Azzouni, G. Pujolle, NeuTM: a neural network-based framework for traffic matrix prediction in SDN. In NOMS
2018–2018 IEEE/IFIP Network Operations and Management Symposium (IEEE, 2018), pp. 1–5
13. Y. Zeng, H. Gu, W. Wei, Y. Guo, Deep-full-range: a deep learning based network encrypted traffic classification and
intrusion detection framework. IEEE Access 7, 45182–45190 (2019)
14. D. Zhang, F.R. Yu, R. Yang, A machine learning approach for software-defined vehicular ad hoc networks with trust
management. In 2018 IEEE Global Communications Conference (GLOBECOM) (IEEE, 2018), pp. 1–6
15. D. Arivudainambi, V.K. Ka, S. Sibi Chakkaravarthy, LION IDS: a meta-heuristics approach to detect DDoS attacks
against software-defined networks. Neural Comput. Appl. 31, 1491–1501 (2019)
16. F. Tang, Z.M. Fadlullah, B. Mao, N. Kato, An intelligent traffic load prediction-based adaptive channel assignment
algorithm in SDN-IoT: a deep learning approach. IEEE Internet Things J. 5(6), 5141–5154 (2018)
17. T.A. Tang, L. Mhamdi, D. McLernon, S.A.R. Zaidi, M. Ghogho, Deep recurrent neural network for intrusion detection in
SDN-based networks. In 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft) (IEEE, 2018), pp.
202–206
18. Y. Yuan, C. Tian, X. Lu, Auxiliary loss multimodal GRU model in audio-visual speech recognition. IEEE Access 6,
5573–5583 (2018)
19. L. Mou, P. Ghamisi, X.X. Zhu, Deep recurrent neural networks for hyperspectral image classification. IEEE Trans.
Geosci. Remote Sens. 55(7), 3639–3655 (2017)
20. W. Huang, Y. Li, Y. Huang, Deep hybrid neural network and improved differential neuroevolution for chaotic time
series prediction. IEEE Access 8, 159552–159565 (2020)
21. P. Sun, A. Boukerche, Y. Tao, SSGRU: a novel hybrid stacked GRU-based traffic volume prediction approach in a road
network. Comput. Commun. 160, 502–511 (2020)
22. T.Y. Kim, S.B. Cho, Predicting residential energy consumption using CNN-LSTM neural networks. Energy 182, 72–81
(2019)
23. W. Sun, S. Guan, A GRU-based traffic situation prediction method in multi-domain software defined network. PeerJ
Comput. Sci. 8, e1011 (2022)
24. L. Zhang, Q. Deng, Y. Su, Y. Hu, A box-covering-based routing algorithm for large-scale SDNs. IEEE Access 5,
4048–4056 (2017)
25. S.K. Keshari, V. Kansal, S. Kumar, P. Bansal, An intelligent energy efficient optimized approach to control the traffic
flow in software-defined IoT networks. Sustain. Energy Technol. Assess. 55, 102952 (2023)
26. A. Taurshia, G.J.W. Kathrine, A. Souri, S.E. Vinodh, S. Vimal, K.C. Li, S.S. Ilango, Software-defined network aided
lightweight group key management for resource-constrained Internet of Things devices. Sustain. Comput. Inform.
Syst. 36, 100807 (2022)
27. R. Mohammadi, S. Akleylek, A. Ghaffari, SDN-IoT: SDN-based efficient clustering scheme for IoT using improved
Sailfish optimization algorithm. PeerJ Comput. Sci. 9, e1424 (2023)
28. C. Xu, D. Qin, F. Song, A survey of SDN traffic management research. In 2022 11th International Conference on
Communications, Circuits and Systems (ICCCAS) (IEEE, 2022), pp. 231–236
29. G. Wassie, J. Ding, Y. Wondie, Traffic prediction in SDN for explainable QoS using deep learning approach. Sci. Rep.
13(1), 20607 (2023)
30. N. Ahuja, G. Singal, D. Mukhopadhyay, DDOS attack SDN dataset. Mendeley Data (2020). https://data.mendeley.
com/datasets/jxpfjc64kr/1
31. I. Sutskever, J. Martens, G.E. Hinton, Generating text with recurrent neural networks. In Proceedings of the 28th
International Conference on Machine Learning (ICML-11) (2011), pp. 1017–1024
32. I. Lohrasbinasab, A. Shahraki, A. Taherkordi, A.D. Jurcut, From statistical-to machine learning-based network traffic
prediction. Trans. Emerg. Telecommun. Technol. 33(4), e4394 (2022)
33. F. Hu, S. Zhang, X. Lin, Wu. Liu, N. Liao, Y. Song, Network traffic classification model based on attention mechanism
and spatiotemporal features. EURASIP J. Inf. Secur. 2023(1), 6 (2023)
34. S.A. Patil, L. Arun Raj, B.K. Singh, Prediction of IoT traffic using the gated recurrent unit neural network-(GRU-NN-)
based predictive model. Secur. Commun. Netw. 2021, 1–7 (2021)
35. A. Albakri, B. Alabdullah, F. Alhayan, Blockchain-assisted machine learning with hybrid metaheuristics-empowered
cyber attack detection and classification model. Sustainability 15(18), 13887 (2023)
36. R. Thenmozhi, P. Sakthivel, K. Kulothungan, Hybrid multi-objective-optimization algorithm for energy efficient
priority-based QoS routing in IoT networks. Wirel. Netw. (2022). https://doi.org/10.1007/s11276-021-02848-z
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
1. use such content for the purpose of providing other users with access on a regular or large scale basis or as a means to circumvent access
control;
2. use such content where to do so would be considered a criminal or statutory offence in any jurisdiction, or gives rise to civil liability, or is
otherwise unlawful;
3. falsely or misleadingly imply or suggest endorsement, approval , sponsorship, or association unless explicitly agreed to by Springer Nature in
writing;
4. use bots or other automated methods to access the content or redirect messages
5. override any security feature or exclusionary protocol; or
6. share the content in order to create substitute for Springer Nature products or services or a systematic database of Springer Nature journal
content.
In line with the restriction against commercial use, Springer Nature does not permit the creation of a product or service that creates revenue,
royalties, rent or income from our content or its inclusion as part of a paid for service or for other commercial gain. Springer Nature journal
content cannot be used for inter-library loans and librarians may not upload Springer Nature journal content on a large scale into their, or any
other, institutional repository.
These terms of use are reviewed regularly and may be amended at any time. Springer Nature is not obligated to publish any information or
content on this website and may remove it or features or functionality at our sole discretion, at any time with or without notice. Springer Nature
may revoke this licence to you at any time and remove access to any copies of the Springer Nature journal content which have been saved.
To the fullest extent permitted by law, Springer Nature makes no warranties, representations or guarantees to Users, either express or implied
with respect to the Springer nature journal content and all parties disclaim and waive any implied warranties or warranties imposed by law,
including merchantability or fitness for any particular purpose.
Please note that these rights do not automatically extend to content, data or other material published by Springer Nature that may be licensed
from third parties.
If you would like to use or distribute our Springer Nature journal content to a wider audience or on a regular basis or in any other manner not
expressly permitted by these Terms, please contact Springer Nature at