{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T19:00:42Z","timestamp":1771614042431,"version":"3.50.1"},"publisher-location":"Cham","reference-count":87,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030990039","type":"print"},{"value":"9783030990046","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99004-6_6","type":"book-chapter","created":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T16:04:39Z","timestamp":1649174679000},"page":"99-127","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A Survey of\u00a0Machine Learning Methods for\u00a0DDoS Threats Detection Against SDN"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8710-849X","authenticated-orcid":false,"given":"Ameni","family":"Chetouane","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2507-9571","authenticated-orcid":false,"given":"Kamel","family":"Karoui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,6]]},"reference":[{"issue":"1","key":"6_CR1","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2015","unstructured":"Kreutz, D., Ramos, F.M.V., Esteves Verissimo, P., Esteve Rothenberg, C., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14\u201376 (2015)","journal-title":"Proc. IEEE"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2016.03.016","volume":"67","author":"R Masoudi","year":"2016","unstructured":"Masoudi, R., Ghaffari, A.: Software defined networks: a survey. J. Netw. Comput. Appl. 67, 1\u201325 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"6_CR3","first-page":"389","volume":"8","author":"P Krishnan","year":"2019","unstructured":"Krishnan, P., Najeem, J.S.: A review of security, threats and mitigation approaches for SDN architecture. Int. J. Innov. Technol. Exp. Eng. 8, 389\u2013393 (2019)","journal-title":"Int. J. Innov. Technol. Exp. Eng."},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Lew, J., et al.: Analyzing machine learning workloads using a detailed GPU simulator. In: 2019 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), pp. 151\u2013152. IEEE (2019)","DOI":"10.1109\/ISPASS.2019.00028"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Khashab, F., Moubarak, J., Feghali, A., Bassil, C.: DDoS attack detection and mitigation in SDN using machine learning. In: 2021 IEEE 7th International Conference on Network Softwarization (NetSoft), pp. 395\u2013401. IEEE (2021)","DOI":"10.1109\/NetSoft51509.2021.9492558"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Ahmed, U., Lin, J.C.-W., Srivastava, G.: Network-aware SDN load balancer with deep active learning based intrusion detection model. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20136. IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9534424"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Ahmad, Z., Khan, A.S., Shiang, C.W., Abdullah, J., Ahmad, F.: Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 32(1), e4150 (2021)","DOI":"10.1002\/ett.4150"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Xie, J., et al.: A survey of machine learning techniques applied to software defined networking (SDN): research issues and challenges. IEEE Commun. Surv. Tut. 21(1), 393\u2013430 (2018)","DOI":"10.1109\/COMST.2018.2866942"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Gupta, S., Grover, D.: A comprehensive review on detection of DDoS attacks using ML in SDN environment. In: 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), pp. 1158\u20131163. IEEE (2021)","DOI":"10.1109\/ICAIS50930.2021.9395987"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"42236","DOI":"10.1109\/ACCESS.2021.3062909","volume":"9","author":"A Aljuhani","year":"2021","unstructured":"Aljuhani, A.: Machine learning approaches for combating distributed denial of service attacks in modern networking environments. IEEE Access 9, 42236\u201342264 (2021)","journal-title":"IEEE Access"},{"key":"6_CR11","unstructured":"Nadeau, T.D., Gray, K.: SDN: Software Defined Networks (2013)"},{"key":"6_CR12","unstructured":"Nadeau, T., Pan, P.: Software driven networks problem statement. Network Working Group Internet-Draft, 30 September 2011"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Latah, M., Toker, L.: Artificial intelligence enabled software-defined networking: a comprehensive overview. IET Netw. 8(2), 79\u201399 (2019)","DOI":"10.1049\/iet-net.2018.5082"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Nunes, B.A.A., Mendonca, M., Nguyen, X.-N., Obraczka, K., Turletti, T.: A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun. Surv. Tut. 16(3), 1617\u20131634 (2014)","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"6_CR15","unstructured":"Xu, L., Huang, J., Hong, S., Zhang, J., Gu, G.: Attacking the brain: races in the $$\\{$$SDN$$\\}$$ control plane. In: 26th $$\\{$$USENIX$$\\}$$ Security Symposium, $$\\{$$USENIX$$\\}$$ Security 2017, pp. 451\u2013468 (2017)"},{"key":"6_CR16","unstructured":"Bernardo, D.V.: Software-defined networking and network function virtualization security architecture. Internet Engineering Task Force, Fremont, CA, USA (2014). https:\/\/tools.ietf.org\/html\/draftbernardo-sec-arch-sdnnvf-architecture-00"},{"key":"6_CR17","doi-asserted-by":"publisher","unstructured":"Yang, M., Li, Y., Jin, D., Zeng, L., Wu, X., Vasilakos, A.V.: Software-defined and virtualized future mobile and wireless networks: a survey. Mob. Netw. Appl. 20(1), 4\u201318 (2015). https:\/\/doi.org\/10.1007\/s11036-014-0533-8","DOI":"10.1007\/s11036-014-0533-8"},{"issue":"6","key":"6_CR18","doi-asserted-by":"publisher","first-page":"1703","DOI":"10.1109\/TITS.2015.2498180","volume":"17","author":"W Yuan","year":"2015","unstructured":"Yuan, W., Deng, P., Taleb, T., Wan, J., Bi, C.: An unlicensed taxi identification model based on big data analysis. IEEE Trans. Intell. Transp. Syst. 17(6), 1703\u20131713 (2015)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the Internet of Things: perspectives and challenges. Wirel. Netw. 20(8), 2481\u20132501 (2014)","DOI":"10.1007\/s11276-014-0761-7"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Namal, S., Ahmad, I., Gurtov, A., Ylianttila, M.: SDN based inter-technology load balancing leveraged by flow admission control. In: 2013 IEEE SDN for Future Networks and Services (SDN4FNS), pp. 1\u20135. IEEE (2013)","DOI":"10.1109\/SDN4FNS.2013.6702551"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Lara, A., Kolasani, A., Ramamurthy, B.: Network innovation using OpenFlow: a survey. IEEE Commun. Surv. Tut. 16(1), 493\u2013512 (2013)","DOI":"10.1109\/SURV.2013.081313.00105"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Iqbal, M., Iqbal, F., Mohsin, F., Rizwan, M., Ahmad, F.: Security issues in software defined networking (SDN): risks, challenges and potential solutions. Int. J. Adv. Comput. Sci. Appl. 10(10), 298\u2013303 (2019)","DOI":"10.14569\/IJACSA.2019.0101042"},{"key":"6_CR23","unstructured":"Lotlikar, T., Shah, D.: A survey of potential security threats and counter-measures in SDN: an IoT enabling technology. OSR J. Comput. Eng., 67\u201374 (2017)"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Akba\u015f, M.F., Karaarslan, E., G\u00fcng\u00f6r, C.: A preliminary survey on the security of software-defined networks. Int. J. Appl. Math. Electron. Comput. 4(Special Issue-1), 184\u2013189 (2016)","DOI":"10.18100\/ijamec.270088"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Mostafa, N., Elazim, A., Sobh, M.A., Bahaa-Eldin, A.M.: Software defined networking: attacks and countermeasures. In: 2018 13th International Conference on Computer Engineering and Systems (ICCES), pp. 555\u2013567. IEEE (2018)","DOI":"10.1109\/ICCES.2018.8639429"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Pradhan, A., Mathew, R.: Solutions to vulnerabilities and threats in software defined networking (SDN). Procedia Comput. Sci. 171, 2581\u20132589 (2020)","DOI":"10.1016\/j.procs.2020.04.280"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Revathi, S., Geetha, A., et al.: A survey of applications and security issues in software defined networking. Int. J. Comput. Netw. Inf. Secur. 9(3), 21 (2017)","DOI":"10.5815\/ijcnis.2017.03.03"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Gao, S., Li, Z., Xiao, B., Wei, G.: Security threats in the data plane of software-defined networks. IEEE Netw. 32(4), 108\u2013113 (2018)","DOI":"10.1109\/MNET.2018.1700283"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Scott-Hayward, S., Natarajan, S., Sezer, S.: A survey of security in software defined networks. IEEE Commun. Surv. Tut. 18(1), 623\u2013654 (2015)","DOI":"10.1109\/COMST.2015.2453114"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Karan, B.V., Narayan, D.G., Hiremath, P.S.: Detection of DDoS attacks in software defined networks. In: 2018 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS), pp. 265\u2013270 (2018)","DOI":"10.1109\/CSITSS.2018.8768551"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Tayfour, O.E., Marsono, M.N.: Collaborative detection and mitigation of distributed denial-of-service attacks on software-defined network. Mob. Netw. Appl. 25(4), 1338\u20131347 (2020)","DOI":"10.1007\/s11036-020-01552-0"},{"issue":"3","key":"6_CR32","first-page":"13","volume":"15","author":"X Xu","year":"2017","unstructured":"Xu, X., Yu, H., Yang, K.: DDoS attack in software defined networks: a survey. ZTE Commun. 15(3), 13\u201319 (2017)","journal-title":"ZTE Commun."},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Lin, B., Zhu, X., Ding, Z.: Research on the vulnerability of software defined network. In: 3rd Workshop on Advanced Research and Technology in Industry, WARTIA 2017, pp. 253\u2013260. Atlantis Press (2017)","DOI":"10.2991\/wartia-17.2017.49"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Mousavi, S.M., St-Hilaire, M.: Early detection of DDoS attacks against SDN controllers. In: 2015 International Conference on Computing, Networking and Communications (ICNC), pp. 77\u201381. IEEE (2015)","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"6_CR35","unstructured":"Mitrocotsa, A., Douligeris, C.: DDoS attack and defence mechanism: a classification. In: 3rd IEEE International Symposium on Signal Processing and Information Technology, pp. 190\u2013193 (2003)"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Karoui, K.: Risk analysis linked to network attacks. In: Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT, pp. 105\u2013140 (2019)","DOI":"10.1002\/9781119618393.ch3"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Furdek, M., Natalino, C.: Machine learning for optical network security management. In: 2020 Optical Fiber Communications Conference and Exhibition (OFC), pp. 1\u20133. IEEE (2020)","DOI":"10.1364\/OFC.2020.M4E.4"},{"key":"6_CR38","doi-asserted-by":"crossref","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","DOI":"10.1007\/BF00994018"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Li, D., Yu, C., Zhou, Q., Yu, J.: Using SVM to detect DDoS attack in SDN network. IOP Conf. Ser. Mater. Sci. Eng. 466, 012003 (2018)","DOI":"10.1088\/1757-899X\/466\/1\/012003"},{"key":"6_CR40","doi-asserted-by":"crossref","unstructured":"Deepa, V., Sudar, K.M., Deepalakshmi, P.: Detection of DDoS attack on SDN control plane using hybrid machine learning techniques. In: 2018 International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 299\u2013303. IEEE (2018)","DOI":"10.1109\/ICSSIT.2018.8748836"},{"key":"6_CR41","doi-asserted-by":"crossref","unstructured":"Van Hulle, M.M.: Self-organizing maps (2012)","DOI":"10.1007\/978-3-540-92910-9_19"},{"key":"6_CR42","doi-asserted-by":"crossref","unstructured":"Meti, N., Narayan, D.G., Baligar, V.P.: Detection of distributed denial of service attacks using machine learning algorithms in software defined networks. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1366\u20131371. IEEE (2017)","DOI":"10.1109\/ICACCI.2017.8126031"},{"key":"6_CR43","unstructured":"Swinburne, R.: Bayes\u2019 theorem. Revue Philosophique de la France Et de l 194(2) (2004)"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Webb, G.I., Keogh, E., Miikkulainen, R.: Na\u00efve Bayes. Encycl. Mach. Learn. 15, 713\u2013714 (2010)","DOI":"10.1007\/978-0-387-30164-8_576"},{"key":"6_CR45","doi-asserted-by":"crossref","unstructured":"Mohammed, S.S., et al.: A new machine learning-based collaborative DDoS mitigation mechanism in software-defined network. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 1\u20138. IEEE (2018)","DOI":"10.1109\/WiMOB.2018.8589104"},{"key":"6_CR46","doi-asserted-by":"crossref","unstructured":"Barki, L., Shidling, A., Meti, N., Narayan, D.G., Mulla, M.M.: Detection of distributed denial of service attacks in software defined networks. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2576\u20132581. IEEE (2016)","DOI":"10.1109\/ICACCI.2016.7732445"},{"key":"6_CR47","unstructured":"M\u00fcnz, G., Li, S., Carle, G.: Traffic anomaly detection using k-means clustering. In: GI\/ITG Workshop MMBnet, pp. 13\u201314 (2007)"},{"key":"6_CR48","doi-asserted-by":"crossref","unstructured":"Rustam, Z., Talita, A.S.: Fuzzy kernel k-medoids algorithm for anomaly detection problems. In: AIP Conference Proceedings, vol. 1862, pp. 030154. AIP Publishing LLC. (2017)","DOI":"10.1063\/1.4991258"},{"key":"6_CR49","doi-asserted-by":"crossref","unstructured":"Arshi, M., Nasreen, M.D., Madhavi, K.: A survey of DDoS attacks using machine learning techniques. In: E3S Web of Conferences, vol. 184, pp. 01052. EDP Sciences (2020)","DOI":"10.1051\/e3sconf\/202018401052"},{"key":"6_CR50","doi-asserted-by":"crossref","unstructured":"Sudar, K.M., Beulah, M., Deepalakshmi, P., Nagaraj, P., Chinnasamy, P.: Detection of distributed denial of service attacks in SDN using machine learning techniques. In: 2021 International Conference on Computer Communication and Informatics (ICCCI), pp. 1\u20135. IEEE (2021)","DOI":"10.1109\/ICCCI50826.2021.9402517"},{"key":"6_CR51","doi-asserted-by":"crossref","unstructured":"Chen, Y., Pei, J., Li, D.: DETPro: a high-efficiency and low-latency system against DDoS attacks in SDN based on decision tree. In: 2019 IEEE International Conference on Communications (ICC), ICC 2019, pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/ICC.2019.8761580"},{"key":"6_CR52","unstructured":"Phaal, P.: sFlow version 5 (2004). http:\/\/www.sflow.org\/sflow_version_5.txt"},{"key":"6_CR53","doi-asserted-by":"crossref","unstructured":"Zhi, T., Luo, H., Liu, Y.: A Gini impurity-based interest flooding attack defence mechanism in NDN. IEEE Commun. Lett. 22(3), 538\u2013541 (2018)","DOI":"10.1109\/LCOMM.2018.2789896"},{"key":"6_CR54","unstructured":"Wei, H.: Comparison among methods of decision tree pruning. J. Southwest Jiaotong Univ. (2005)"},{"key":"6_CR55","doi-asserted-by":"crossref","unstructured":"Tonkal, \u00d6., Polat, H., Ba\u015faran, E., C\u00f6mert, Z., Kocao\u011flu, R.: Machine learning approach equipped with neighbourhood component analysis for DDoS attack detection in software-defined networking. Electronics 10(11), 1227 (2021)","DOI":"10.3390\/electronics10111227"},{"key":"6_CR56","unstructured":"Roweis, S., Hinton, G., Salakhutdinov, R.: Neighbourhood component analysis. In: Advances in Neural Information Processes System (NIPS), vol. 17, pp. 513\u2013520 (2004)"},{"key":"6_CR57","doi-asserted-by":"crossref","unstructured":"Preamthaisong, P., Auyporntrakool, A., Aimtongkham, P., Sriwuttisap, T., So-In, C.: Enhanced DDoS detection using hybrid genetic algorithm and decision tree for SDN. In: 2019 16th International Joint Conference on Computer Science and Software Engineering (JCSSE), pp. 152\u2013157. IEEE (2019)","DOI":"10.1109\/JCSSE.2019.8864216"},{"key":"6_CR58","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"6_CR59","doi-asserted-by":"crossref","unstructured":"Chetouane, A., Mabrouk, S., Jemili, I., Mosbah, M.: Vision-based vehicle detection for road traffic congestion classification. Concurr. Comput. Pract. Exp. 34, e5983 (2020)","DOI":"10.1002\/cpe.5983"},{"key":"6_CR60","doi-asserted-by":"crossref","unstructured":"Dong, S., Sarem, M.: DDoS attack detection method based on improved KNN with the degree of DDoS attack in software-defined networks. IEEE Access 8, 5039\u20135048 (2019)","DOI":"10.1109\/ACCESS.2019.2963077"},{"key":"6_CR61","doi-asserted-by":"crossref","unstructured":"Yuhua, X., Sun, H., Xiang, F., Sun, Z.: Efficient DDoS detection based on K-FKNN in software defined networks. IEEE Access 7, 160536\u2013160545 (2019)","DOI":"10.1109\/ACCESS.2019.2950945"},{"key":"6_CR62","doi-asserted-by":"crossref","unstructured":"Nam, T.M., et al.: Self-organizing map-based approaches in DDoS flooding detection using SDN. In: 2018 International Conference on Information Networking (ICOIN), pp. 249\u2013254. IEEE (2018)","DOI":"10.1109\/ICOIN.2018.8343119"},{"key":"6_CR63","doi-asserted-by":"crossref","unstructured":"Najafabadi, M.M., Villanustre, F., Khoshgoftaar, T.M., Seliya, N., Wald, R., Muharemagic, E.: Deep learning applications and challenges in big data analytics. J. Big Data 2(1), 1\u201321 (2015)","DOI":"10.1186\/s40537-014-0007-7"},{"key":"6_CR64","unstructured":"Yegnanarayana, B.: Artificial Neural Networks. PHI Learning Pvt. Ltd. (2009)"},{"key":"6_CR65","doi-asserted-by":"crossref","unstructured":"Hannache, O., Batouche, M.C.: Neural network-based approach for detection and mitigation of DDoS attacks in SDN environments. Int. J. Inf. Secur. Priv. 14(3), 50\u201371 (2020)","DOI":"10.4018\/IJISP.2020070104"},{"key":"6_CR66","doi-asserted-by":"crossref","unstructured":"Liu, Z., He, Y., Wang, W., Zhang, B.: DDoS attack detection scheme based on entropy and PSO-BP neural network in SDN. Chin. Commun. 16(7), 144\u2013155 (2019)","DOI":"10.23919\/JCC.2019.07.012"},{"key":"6_CR67","doi-asserted-by":"crossref","unstructured":"Liu, G., Bao, H., Han, B.: A stacked autoencoder-based deep neural network for achieving gearbox fault diagnosis. Math. Probl. Eng. 2018 (2018)","DOI":"10.1155\/2018\/5105709"},{"key":"6_CR68","doi-asserted-by":"crossref","unstructured":"Niyaz, Q., Sun, W., Javaid, A.Y.: A deep learning based DDoS detection system in software-defined networking (SDN). arXiv preprint arXiv:1611.07400 (2016)","DOI":"10.4108\/eai.28-12-2017.153515"},{"key":"6_CR69","doi-asserted-by":"crossref","unstructured":"Ujjan, R.M.A., Pervez, Z., Dahal, K., Bashir, A.K., Mumtaz, R., Gonz\u00e1lez, J.: Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN. Fut. Gener. Comput. Syst. 111, 763\u2013779 (2020)","DOI":"10.1016\/j.future.2019.10.015"},{"key":"6_CR70","doi-asserted-by":"crossref","unstructured":"Polat, H., Turkoglu, M., Polat, O.: Deep network approach with stacked sparse autoencoders in detection of DDoS attacks on SDN-based VANET. IET Commun. 14(22), 4089\u20134100 (2021)","DOI":"10.1049\/iet-com.2020.0477"},{"key":"6_CR71","doi-asserted-by":"crossref","unstructured":"Ahuja, N., Singal, G., Mukhopadhyay, D.: DLSDN: deep learning for DDoS attack detection in software defined networking. In: 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence), pp. 683\u2013688. IEEE (2021)","DOI":"10.1109\/Confluence51648.2021.9376879"},{"issue":"11","key":"6_CR72","first-page":"1086","volume":"8","author":"IM Bapiyev","year":"2017","unstructured":"Bapiyev, I.M., Aitchanov, B.H., Tereikovskyi, I.A., Tereikovska, L.A., Korchenko, A.A.: Deep neural networks in cyber attack detection systems. Int. J. Civ. Eng. Technol. (IJCIET) 8(11), 1086\u20131092 (2017)","journal-title":"Int. J. Civ. Eng. Technol. (IJCIET)"},{"key":"6_CR73","doi-asserted-by":"crossref","unstructured":"Makuvaza, A., Jat, D.S., Gamundani, A.M.: Deep neural network (DNN) solution for real-time detection of distributed denial of service (DDoS) attacks in software defined networks (SDNs). SN Comput. Sci. 2(2), 1\u201310 (2021)","DOI":"10.1007\/s42979-021-00467-1"},{"key":"6_CR74","doi-asserted-by":"crossref","unstructured":"Wu, Y., Wei, D., Feng, J.: Network attacks detection methods based on deep learning techniques: a survey. Secur. Commun. Netw. 2020 (2020)","DOI":"10.1155\/2020\/8872923"},{"key":"6_CR75","doi-asserted-by":"crossref","unstructured":"Nugraha, B., Murthy, R.N.: Deep learning-based slow DDoS attack detection in SDN-based networks. In: 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), pp. 51\u201356. IEEE (2020)","DOI":"10.1109\/NFV-SDN50289.2020.9289894"},{"key":"6_CR76","doi-asserted-by":"crossref","unstructured":"Haider, S.: A deep CNN ensemble framework for efficient DDoS attack detection in software defined networks. IEE Access 8, 53972\u201353983 (2020)","DOI":"10.1109\/ACCESS.2020.2976908"},{"key":"6_CR77","doi-asserted-by":"crossref","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M.: Deep recurrent neural network for intrusion detection in SDN-based networks. In: 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), pp. 202\u2013206. IEEE (2018)","DOI":"10.1109\/NETSOFT.2018.8460090"},{"key":"6_CR78","doi-asserted-by":"crossref","unstructured":"Elsayed, M.S., Le-Khac, N.-A., Dev, S., Jurcut, A.D.: DDoSNET: a deep-learning model for detecting network attacks. In: 2020 IEEE 21st International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM), pp. 391\u2013396. IEEE (2020)","DOI":"10.1109\/WoWMoM49955.2020.00072"},{"key":"6_CR79","doi-asserted-by":"crossref","unstructured":"Li, C., et al.: Detection and defense of DDoS attack-based on deep learning in OpenFlow-based SDN. Int. J. Commun. Syst. 31(5), e3497 (2018)","DOI":"10.1002\/dac.3497"},{"key":"6_CR80","doi-asserted-by":"crossref","unstructured":"Sun, W., Li, Y., Guan, S.: An improved method of DDoS attack detection for controller of SDN. In: 2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET), pp. 249\u2013253. IEEE (2019)","DOI":"10.1109\/CCET48361.2019.8989356"},{"key":"6_CR81","doi-asserted-by":"crossref","unstructured":"Gupta, B.B., Joshi, R.C., Misra, M.: Defending against distributed denial of service attacks: issues and challenges. Inf. Secur. J. Glob. Perspect. 18(5), 224\u2013247 (2009)","DOI":"10.1080\/19393550903317070"},{"key":"6_CR82","doi-asserted-by":"crossref","unstructured":"Cai, K.-Y., Wen, C.-Y., Zhang, M.-L.: A critical review on software reliability modeling. Reliab. Eng. Syst. Saf. 32(3), 357\u2013371 (1991)","DOI":"10.1016\/0951-8320(91)90009-V"},{"key":"6_CR83","unstructured":"Netes, V., Kusakina, M.: Reliability challenges in software defined networking. In: Conference of Open Innovations Association, FRUCT 24, pp. 704\u2013709. FRUCT Oy (2019)"},{"key":"6_CR84","doi-asserted-by":"crossref","unstructured":"Eliyan, L.F., Di Pietro, R.: DoS and DDoS attacks in software defined networks: a survey of existing solutions and research challenges. Fut. Gener. Comput. Syst. 122, 149\u2013171 (2021)","DOI":"10.1016\/j.future.2021.03.011"},{"key":"6_CR85","doi-asserted-by":"crossref","unstructured":"Alzahrani, S., Hong, L., et al.: Generation of DDoS attack dataset for effective ids development and evaluation. J. Inf. Secur. 9(04), 225 (2018)","DOI":"10.4236\/jis.2018.94016"},{"key":"6_CR86","doi-asserted-by":"crossref","unstructured":"Chandrashekar, G., Sahin, F.: A survey on feature selection methods. Comput. Electr. Eng. 40(1), 16\u201328 (2014)","DOI":"10.1016\/j.compeleceng.2013.11.024"},{"key":"6_CR87","doi-asserted-by":"crossref","unstructured":"Xue, M., Yuan, C., Heyi, W., Zhang, Y., Liu, W.: Machine learning security: threats, countermeasures, and evaluations. IEEE Access 8, 74720\u201374742 (2020)","DOI":"10.1109\/ACCESS.2020.2987435"}],"container-title":["Communications in Computer and Information Science","Distributed Computing for Emerging Smart Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99004-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T16:52:47Z","timestamp":1726937567000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99004-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030990039","9783030990046"],"references-count":87,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99004-6_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DiCES-N","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Distributed Computing for Emerging Smart Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bizerte","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tunisia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 February 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 February 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dicesn2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/visidia.labri.fr\/DiCESN2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.42","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.56","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}