First is the network monitor in the SDN environment [9]; second, the IDS in SDN [10]; third, embedding software sensors in network infrastructure (e.g., switches, hosts) to detect abnormal behavior; and finally, the firewall developed as a security application on SDN controllers.