{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T17:28:51Z","timestamp":1774805331873,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,10,29]],"date-time":"2023-10-29T00:00:00Z","timestamp":1698537600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,29]],"date-time":"2023-10-29T00:00:00Z","timestamp":1698537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10207-023-00771-2","type":"journal-article","created":{"date-parts":[[2023,10,29]],"date-time":"2023-10-29T11:01:22Z","timestamp":1698577282000},"page":"849-862","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["Network intrusion detection and mitigation in SDN using deep learning models"],"prefix":"10.1007","volume":"23","author":[{"given":"Mamatha","family":"Maddu","sequence":"first","affiliation":[]},{"given":"Yamarthi Narasimha","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,29]]},"reference":[{"issue":"1","key":"771_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7438","volume":"35","author":"AO Alzahrani","year":"2023","unstructured":"Alzahrani, A.O., Alenazi, M.J.: ML-IDSDN: machine learning based intrusion detection system for software-defined network. Concurr. Comput.: Pract. Exp. 35(1), e7438 (2023)","journal-title":"Concurr. Comput.: Pract. Exp."},{"key":"771_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2023.100053","volume":"10","author":"V Hnamte","year":"2023","unstructured":"Hnamte, V., Hussain, J.: DCNNBiLSTM: an efficient hybrid deep learning-based intrusion detection system. Telemat. Inform. Rep. 10, 100053 (2023)","journal-title":"Telemat. Inform. Rep."},{"key":"771_CR3","doi-asserted-by":"publisher","first-page":"11844","DOI":"10.1007\/s11227-023-05117-2","volume":"79","author":"A Arkan","year":"2023","unstructured":"Arkan, A., & Ahmadi, M.: An unsupervised and hierarchical intrusion detection system for software-defined wireless sensor networks. J. Supercomput. 79, 11844\u201311870 (2023)","journal-title":"J. Supercomput."},{"key":"771_CR4","first-page":"91","volume":"70","author":"M Mehmood","year":"2022","unstructured":"Mehmood, M., Javed, T., Nebhen, J., Abbas, S., Abid, R., Bojja, G.R., Rizwan, M.: A hybrid approach for network intrusion detection. CMC-Comput. Mater. Contin 70, 91\u2013107 (2022)","journal-title":"CMC-Comput. Mater. Contin"},{"issue":"2","key":"771_CR5","doi-asserted-by":"publisher","first-page":"890","DOI":"10.3390\/s23020890","volume":"23","author":"A Henry","year":"2023","unstructured":"Henry, A., Gautam, S., Khanna, S., Rabie, K., Shongwe, T., Bhattacharya, P., Chowdhury, S.: Composition of hybrid deep learning model and feature optimization for intrusion detection system. Sensors 23(2), 890 (2023)","journal-title":"Sensors"},{"key":"771_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108042","volume":"101","author":"H Bour","year":"2022","unstructured":"Bour, H., Abolhasan, M., Jafarizadeh, S., Lipman, J., Makhdoom, I.: A multi-layered intrusion detection system for software defined networking. Comput. Electr. Eng. 101, 108042 (2022)","journal-title":"Comput. Electr. Eng."},{"issue":"1","key":"771_CR7","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s11277-022-10100-w","volume":"129","author":"K Shailaja","year":"2023","unstructured":"Shailaja, K., Srinivasulu, B., Thirupathi, L., Gangula, R., Boya, T.R., Polem, V.: An intelligent deep feature based intrusion detection system for network applications. Wireless Pers. Commun. 129(1), 345\u2013370 (2023)","journal-title":"Wireless Pers. Commun."},{"issue":"21","key":"771_CR8","doi-asserted-by":"publisher","first-page":"3941","DOI":"10.3390\/math10213941","volume":"10","author":"X Zhao","year":"2022","unstructured":"Zhao, X., Su, H., Sun, Z.: An intrusion detection system based on genetic algorithm for software-defined networks. Mathematics 10(21), 3941 (2022)","journal-title":"Mathematics"},{"key":"771_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107876","volume":"100","author":"SK Gupta","year":"2022","unstructured":"Gupta, S.K., Tripathi, M., Grover, J.: Hybrid optimization and deep learning based intrusion detection system. Comput. Electr. Eng. 100, 107876 (2022)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"771_CR10","doi-asserted-by":"publisher","first-page":"23","DOI":"10.11113\/elektrika.v21n3.361","volume":"21","author":"SH Ariffin","year":"2022","unstructured":"Ariffin, S.H., Le Chong, J., Latif, N.M.A.A., Abd Malik, N.N.N., Baharudin, M.A., Syed-Yusof, S.K., Yusof, K.M.: Intrusion detection system (IDS) Accuracy testing for software defined network internet of things (SDN-IOT) Testbed. ELEKTRIKA-J. Electr. Eng. 21(3), 23\u201327 (2022)","journal-title":"ELEKTRIKA-J. Electr. Eng."},{"issue":"16","key":"771_CR11","doi-asserted-by":"publisher","first-page":"12175","DOI":"10.1007\/s00521-023-08376-5","volume":"35","author":"S Zavrak","year":"2023","unstructured":"Zavrak, S., Iskefiyeli, M.: Flow-based intrusion detection on software-defined networks: a multivariate time series anomaly detection approach. Neural Comput. Appl. 35(16), 12175\u201312193 (2023)","journal-title":"Neural Comput. Appl."},{"key":"771_CR12","doi-asserted-by":"publisher","first-page":"53015","DOI":"10.1109\/ACCESS.2022.3172304","volume":"10","author":"M Al Razib","year":"2022","unstructured":"Al Razib, M., Javeed, D., Khan, M.T., Alkanhel, R., Muthanna, M.S.A.: Cyber threats detection in smart environments using SDN-enabled DNN-LSTM hybrid framework. IEEE Access 10, 53015\u201353026 (2022)","journal-title":"IEEE Access"},{"key":"771_CR13","first-page":"49","volume":"14","author":"AA Abdulsamad","year":"2023","unstructured":"Abdulsamad, A.A., Salih, T.A.: IoT security improvement based on SDN controller. Eurasian J. Eng. Technol. 14, 49\u201356 (2023)","journal-title":"Eurasian J. Eng. Technol."},{"issue":"1\u20132","key":"771_CR14","first-page":"118","volume":"19","author":"X Guo","year":"2022","unstructured":"Guo, X., Bai, W.: ML-SDNIDS: an attack detection mechanism for SDN based on machine learning. Int. J. Inf. Comput. Secur. 19(1\u20132), 118\u2013141 (2022)","journal-title":"Int. J. Inf. Comput. Secur."},{"issue":"1","key":"771_CR15","first-page":"559","volume":"14","author":"J Kumar","year":"2023","unstructured":"Kumar, J.: Mitigate volumetric DDoS attack using machine learning algorithm in SDN based IoT network environment. Int. J. Adv. Comput. Sci. Appl. 14(1), 559\u2013568 (2023)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"771_CR16","first-page":"100580","volume":"24","author":"A Bhardwaj","year":"2022","unstructured":"Bhardwaj, A., Tyagi, R., Sharma, N., Khare, A., Punia, M.S., Garg, V.K.: Network intrusion detection in software defined networking with self-organized constraint-based intelligent learning framework. Measur.: Sens. 24, 100580 (2022)","journal-title":"Measur.: Sens."},{"issue":"5s","key":"771_CR17","first-page":"591","volume":"11","author":"KP Jadhav","year":"2023","unstructured":"Jadhav, K.P., Arjariya, T., Gangwar, M.: Hybrid-Ids: an approach for intrusion detection system with hybrid feature extraction technique using supervised machine learning. Int. J. Intell. Syst. Appl. Eng. 11(5s), 591\u2013597 (2023)","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"issue":"3","key":"771_CR18","doi-asserted-by":"publisher","first-page":"6587","DOI":"10.32604\/cmc.2023.034176","volume":"74","author":"M Maray","year":"2022","unstructured":"Maray, M., Alshahrani H.M., Alissa, K., Alotaibi, N., Gaddah, A., Meree, A., Hamza, M.A.: Optimal deep learning driven intrusion detection in SDN-Enabled IoT environment. Comput. Mater. Continua 74(3), 6587\u20136604 (2022)","journal-title":"Comput. Mater. Continua"},{"issue":"1","key":"771_CR19","doi-asserted-by":"publisher","first-page":"4","DOI":"10.58491\/2735-4202.3020","volume":"48","author":"AM El-Shamy","year":"2023","unstructured":"El-Shamy, A.M., El-Fishawy, N.A., Attiya, G.M., Ahmed, M.: Detection optimization of rare attacks in software-defined network using ensemble learning. Mansoura Eng.. J. 48(1), 4 (2023)","journal-title":"Mansoura Eng.. J."},{"issue":"3","key":"771_CR20","doi-asserted-by":"publisher","first-page":"2269","DOI":"10.1109\/TNSM.2022.3175710","volume":"19","author":"L Yang","year":"2022","unstructured":"Yang, L., Song, Y., Gao, S., Hu, A., Xiao, B.: Griffin: real-time network intrusion detection system via ensemble of autoencoder in SDN. IEEE Trans. Netw. Serv. Manage. 19(3), 2269\u20132281 (2022)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"10","key":"771_CR21","doi-asserted-by":"publisher","first-page":"102211","DOI":"10.1016\/j.asej.2023.102211","volume":"14","author":"RA Elsayed","year":"2023","unstructured":"Elsayed, R.A., Hamada, R.A., Abdalla, M.I., Elsaid, S.A.: Securing IoT and SDN systems using deep-learning based automatic intrusion detection. Ain Shams Eng. J. 14(10), 102211 (2023)","journal-title":"Ain Shams Eng. J."},{"issue":"4","key":"771_CR22","doi-asserted-by":"publisher","first-page":"197","DOI":"10.3390\/a16040197","volume":"16","author":"L Chen","year":"2023","unstructured":"Chen, L., Wang, Z., Huo, R., Huang, T.: An adversarial DBN-LSTM method for detecting and defending against DDoS attacks in SDN environments. Algorithms 16(4), 197 (2023)","journal-title":"Algorithms"},{"key":"771_CR23","doi-asserted-by":"publisher","first-page":"28934","DOI":"10.1109\/ACCESS.2023.3260256","volume":"11","author":"WI Khedr","year":"2023","unstructured":"Khedr, W.I., Gouda, A.E., Mohamed, E.R.: FMDADM: a multi-layer DDoS attack detection and mitigation framework using machine learning for stateful SDN-based IoT networks. IEEE Access 11, 28934\u201328954 (2023)","journal-title":"IEEE Access"},{"issue":"21","key":"771_CR24","doi-asserted-by":"publisher","first-page":"8287","DOI":"10.3390\/s22218287","volume":"22","author":"J Wang","year":"2022","unstructured":"Wang, J., Wang, L.: SDN-defend: a lightweight online attack detection and mitigation system for DDoS attacks in SDN. Sensors 22(21), 8287 (2022)","journal-title":"Sensors"},{"issue":"1","key":"771_CR25","doi-asserted-by":"publisher","first-page":"867","DOI":"10.32604\/iasc.2023.026769","volume":"35","author":"G Logeswari","year":"2023","unstructured":"Logeswari, G., Bose, S., Anitha, T.: An intrusion detection system for sdn using machine learning. Intell. Autom. Soft Comput. 35(1), 867\u2013880 (2023)","journal-title":"Intell. Autom. Soft Comput."},{"issue":"2","key":"771_CR26","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/IOTM.003.2200001","volume":"5","author":"V Ravi","year":"2022","unstructured":"Ravi, V., Chaganti, R., Alazab, M.: Deep learning feature fusion approach for an intrusion detection system in SDN-based IoT networks. IEEE Internet Things Mag. 5(2), 24\u201329 (2022)","journal-title":"IEEE Internet Things Mag."},{"issue":"3","key":"771_CR27","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s10922-023-09741-4","volume":"31","author":"T Linhares","year":"2023","unstructured":"Linhares, T., Patel, A., Barros, A.L., Fernandez, M.: SDNTruth: innovative DDoS detection scheme for software-defined networks (SDN). J. Netw. Syst. Manage. 31(3), 55 (2023)","journal-title":"J. Netw. Syst. Manage."},{"issue":"1","key":"771_CR28","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1186\/s42400-022-00128-7","volume":"5","author":"K Jia","year":"2022","unstructured":"Jia, K., Liu, C., Liu, Q., Wang, J., Liu, J., Liu, F.: A lightweight DDoS detection scheme under SDN context. Cybersecurity 5(1), 27 (2022)","journal-title":"Cybersecurity"},{"key":"771_CR29","doi-asserted-by":"publisher","first-page":"165263","DOI":"10.1109\/ACCESS.2020.3022633","volume":"8","author":"MS Elsayed","year":"2020","unstructured":"Elsayed, M.S., Le-Khac, N.A., Jurcut, A.D.: InSDN: a novel SDN intrusion dataset. IEEE Access 8, 165263\u2013165284 (2020)","journal-title":"IEEE Access"},{"key":"771_CR30","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag, M.A., Friha, O., Hamouda, D., Maglaras, L., Janicke, H.: Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access 10, 40281\u201340306 (2022)","journal-title":"IEEE Access"},{"issue":"2","key":"771_CR31","first-page":"2366","volume":"75","author":"H Safwan","year":"2023","unstructured":"Safwan, H., Iqbal, Z., Amin, R., Khan, M.A., Alhaisoni, M., Alqahtani, A., Chang, B.: An IoT environment based framework for intelligent intrusion detection, computer. Mater. Cont. 75(2), 2366\u20132381 (2023)","journal-title":"Mater. Cont."},{"key":"771_CR32","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.jpdc.2022.03.003","volume":"165","author":"O Friha","year":"2022","unstructured":"Friha, O., Ferrag, M.A., Shu, L., Maglaras, L., Choo, K.K.R., Nafaa, M.: FELIDS: federated learning-based intrusion detection system for agricultural Internet of Things. J. Parallel Distrib. Comput. 165, 17\u201331 (2022)","journal-title":"J. Parallel Distrib. Comput."},{"key":"771_CR33","doi-asserted-by":"publisher","first-page":"101750","DOI":"10.1016\/j.pmcj.2023.101750","volume":"89","author":"O Aouedi","year":"2023","unstructured":"Aouedi, O., Piamrat, K.: F-BIDS: federated-blending based intrusion detection system. Pervas. Mob. Comput. 89, 101750 (2023)","journal-title":"Pervas. Mob. Comput."},{"issue":"11","key":"771_CR34","first-page":"371","volume":"13","author":"AA Alashhab","year":"2022","unstructured":"Alashhab, A.A., Zahid, M.S.M., Muneer, A., & Abdullahi, M.: Low-rate DDoS attack detection using deep learning for SDN-enabled IoT networks. Int. J. Adv. Comput. Sci. Appl. 13(11), 371\u2013377 (2022)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"19","key":"771_CR35","doi-asserted-by":"publisher","first-page":"9572","DOI":"10.3390\/app12199572","volume":"12","author":"I Tareq","year":"2022","unstructured":"Tareq, I., Elbagoury, B.M., El-Regaily, S., El-Horbaty, E.S.M.: Analysis of ToN-IoT, UNW-NB15, and Edge-IIoT datasets using DL in cybersecurity for IoT. Appl. Sci. 12(19), 9572 (2022)","journal-title":"Appl. Sci."},{"issue":"1","key":"771_CR36","doi-asserted-by":"publisher","first-page":"158","DOI":"10.3390\/network3010008","volume":"3","author":"MM Rashid","year":"2023","unstructured":"Rashid, M.M., Khan, S.U., Eusufzai, F., Redwan, M.A., Sabuj, S.R., Elsharief, M.: A federated learning-based approach for improving intrusion detection in industrial internet of things networks. Network 3(1), 158\u2013179 (2023)","journal-title":"Network"},{"key":"771_CR37","doi-asserted-by":"publisher","first-page":"48890","DOI":"10.1109\/ACCESS.2022.3172432","volume":"10","author":"A Ghourabi","year":"2022","unstructured":"Ghourabi, A.: A security model based on LightGBM and transformer to protect healthcare systems from cyberattacks. IEEE Access 10, 48890\u201348903 (2022)","journal-title":"IEEE Access"},{"key":"771_CR38","doi-asserted-by":"publisher","first-page":"67910","DOI":"10.1109\/ACCESS.2022.3186026","volume":"10","author":"P Dini","year":"2022","unstructured":"Dini, P., Begni, A., Ciavarella, S., De Paoli, E., Fiorelli, G., Silvestro, C., Saponara, S.: Design and testing novel one-class classifier based on polynomial interpolation with application to networking security. IEEE Access 10, 67910\u201367924 (2022)","journal-title":"IEEE Access"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00771-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00771-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00771-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T07:35:12Z","timestamp":1711524912000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00771-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,29]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["771"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00771-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,29]]},"assertion":[{"value":"7 October 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}