{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:59:08Z","timestamp":1775145548813,"version":"3.50.1"},"reference-count":207,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T00:00:00Z","timestamp":1757894400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T00:00:00Z","timestamp":1757894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10207-025-01114-z","type":"journal-article","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T15:29:00Z","timestamp":1757950140000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Detection and mitigation of cyber-attacks in software defined networks using machine learning\/deep learning: a systematic literature review, research challenges and future directions"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5025-1218","authenticated-orcid":false,"given":"Sait Melih","family":"Do\u011fan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9647-7281","authenticated-orcid":false,"given":"Aynur","family":"Ko\u00e7ak","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9542-8039","authenticated-orcid":false,"given":"Mustafa","family":"Alkan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,15]]},"reference":[{"key":"1114_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100289","volume":"12","author":"K Nisar","year":"2020","unstructured":"Nisar, K., Jimson, E.R., Hijazi, M.H.A., Welch, I., Hassan, R., Aman, A.H.M., Sodhro, A.H., Pirbhulal, S., Khan, S.: A survey on the architecture, application, and security of software defined networking: challenges and open issues. Internet of Things 12, 100289 (2020). https:\/\/doi.org\/10.1016\/j.iot.2020.100289","journal-title":"Internet of Things"},{"key":"1114_CR2","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.osn.2018.06.005","volume":"30","author":"M Savi","year":"2018","unstructured":"Savi, M., Siracusa, D.: Application-aware service provisioning and restoration in SDN-based multi-layer transport networks. Opt. Switch. Netw. 30, 71\u201384 (2018). https:\/\/doi.org\/10.1016\/j.osn.2018.06.005","journal-title":"Opt. Switch. Netw."},{"key":"1114_CR3","doi-asserted-by":"publisher","unstructured":"Nanda, S., Zafari, F., DeCusatis, C., Wedaa, E., Yang, B.: Predicting network attack patterns in SDN using machine learning approach. In: 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), pp. 167\u2013172 (2016). https:\/\/doi.org\/10.1109\/NFV-SDN.2016.7919493","DOI":"10.1109\/NFV-SDN.2016.7919493"},{"key":"1114_CR4","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.031719","author":"A Aqdus","year":"2023","unstructured":"Aqdus, A., Amin, R., Ramzan, S., Alshamrani, S.S., Alshehri, A., El-kenawy, E.-S.M.: Detection collision flows in SDN based 5G using machine learning algorithms. Comput. Mater. Contin. (2023). https:\/\/doi.org\/10.32604\/cmc.2023.031719","journal-title":"Comput. Mater. Contin."},{"key":"1114_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1049\/iet-net.2017.0212","volume":"7","author":"J Li","year":"2018","unstructured":"Li, J., Zhao, Z., Li, R.: Machine learning-based IDS for software-defined 5G network. IET Netw. 7, 53\u201360 (2018). https:\/\/doi.org\/10.1049\/iet-net.2017.0212","journal-title":"IET Netw."},{"key":"1114_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106432","volume":"123","author":"J Bhayo","year":"2023","unstructured":"Bhayo, J., Shah, S.A., Hameed, S., Ahmed, A., Nasir, J., Draheim, D.: Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks. Eng. Appl. Artif. Intell. 123, 106432 (2023). https:\/\/doi.org\/10.1016\/j.engappai.2023.106432","journal-title":"Eng. Appl. Artif. Intell."},{"key":"1114_CR7","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2014","unstructured":"Kreutz, D., Ramos, F.M., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103, 14\u201376 (2014). https:\/\/doi.org\/10.1109\/JPROC.2014.2371999","journal-title":"Proc. IEEE"},{"key":"1114_CR8","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., et al.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38, 69\u201374 (2008). https:\/\/doi.org\/10.1145\/1355734.1355746","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"1114_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108013","volume":"191","author":"O Yurekten","year":"2021","unstructured":"Yurekten, O., Demirci, M.: Citadel: cyber threat intelligence assisted defense system for software-defined networks. Comput. Netw. 191, 108013 (2021). https:\/\/doi.org\/10.1016\/j.comnet.2021.108013","journal-title":"Comput. Netw."},{"key":"1114_CR10","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1587\/TRANSCOM.E98.B.12","volume":"98","author":"A Nakao","year":"2015","unstructured":"Nakao, A.: Software-defined data plane enhancing SDN and NFV. IEICE Trans. Commun. 98, 12\u201319 (2015). https:\/\/doi.org\/10.1587\/TRANSCOM.E98.B.12","journal-title":"IEICE Trans. Commun."},{"key":"1114_CR11","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.comnet.2016.11.017","volume":"112","author":"M Karakus","year":"2017","unstructured":"Karakus, M., Durresi, A.: A survey: control plane scalability issues and approaches in software-defined networking (SDN). Comput. Netw. 112, 279\u2013293 (2017). https:\/\/doi.org\/10.1016\/j.comnet.2016.11.017","journal-title":"Comput. Netw."},{"key":"1114_CR12","first-page":"561","volume":"119","author":"NZM Albowarab","year":"2018","unstructured":"Albowarab, N.Z.M., Zainal Abidin, Z.: Software defined network: architecture and programming language survey. Int. J. Pure Appl. Math. 119, 561\u2013572 (2018)","journal-title":"Int. J. Pure Appl. Math."},{"key":"1114_CR13","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1631\/FITEE.1800573","volume":"19","author":"J-H Li","year":"2018","unstructured":"Li, J.-H.: Cyber security meets artificial intelligence: a survey. Front. Inf. Technol. Electron. Eng. 19, 1462\u20131474 (2018). https:\/\/doi.org\/10.1631\/FITEE.1800573","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"1114_CR14","doi-asserted-by":"publisher","first-page":"381","DOI":"10.21275\/ART20203995","volume":"9","author":"B Mahesh","year":"2020","unstructured":"Mahesh, B.: Machine learning algorithms-a review. Int. J. Sci. Res. IJSR 9, 381\u2013386 (2020). https:\/\/doi.org\/10.21275\/ART20203995","journal-title":"Int. J. Sci. Res. IJSR"},{"key":"1114_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38747-0","volume-title":"An introduction to statistical learning: with applications in python","author":"G James","year":"2023","unstructured":"James, G., Witten, D., Hastie, T., Tibshirani, R., Taylor, J.: An introduction to statistical learning: with applications in python. Springer, Switzerland (2023)"},{"key":"1114_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9326-7_1","volume-title":"Ensemble machine learning","author":"R Polikar","year":"2012","unstructured":"Polikar, R.: Ensemble learning. In: Zhang, C., Ma, Y. (eds.) Ensemble machine learning. Springer, New York (2012). https:\/\/doi.org\/10.1007\/978-1-4419-9326-7_1"},{"key":"1114_CR17","doi-asserted-by":"publisher","first-page":"237","DOI":"10.48550\/arXiv.cs\/9605103","volume":"4","author":"LP Kaelbling","year":"1996","unstructured":"Kaelbling, L.P., Littman, M.L., Moore, A.W.: Reinforcement learning: a survey. J. Artif. Intell. Res. 4, 237\u2013285 (1996). https:\/\/doi.org\/10.48550\/arXiv.cs\/9605103","journal-title":"J. Artif. Intell. Res."},{"key":"1114_CR18","doi-asserted-by":"publisher","unstructured":"Deng, L., Yu, D.: Deep learning: methods and applications. Found. Trends Signal Process. 7, 3\u20134, 197\u2013387 (2014). https:\/\/doi.org\/10.1561\/2000000039","DOI":"10.1561\/2000000039"},{"key":"1114_CR19","doi-asserted-by":"crossref","unstructured":"NIST Cybersecurity Framework: Learn the basics, National Institute of Standards and Technology. Accessed 16 Apr 2024. https:\/\/strike.sh\/blog\/NIST-cybersecurity-framework","DOI":"10.6028\/NIST.SP.1309.ipd"},{"key":"1114_CR20","unstructured":"Ahmed, M.R., Shatabda, S., Islam, A.M., Robin, M.T.I.: Intrusion detection system in software-defined networks using machine learning and deep learning techniques\u2014a comprehensive survey. Authorea preprints"},{"key":"1114_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103093","volume":"187","author":"IA Valdovinos","year":"2021","unstructured":"Valdovinos, I.A., P\u00e9rez-D\u00edaz, J.A., Choo, K.K.R., Botero, J.F.: Emerging DDoS attack detection and mitigation strategies in software-defined networks: taxonomy, challenges and future directions. J. Netw. Comput. Appl. 187, 103093 (2021)","journal-title":"J. Netw. Comput. Appl."},{"key":"1114_CR22","doi-asserted-by":"crossref","unstructured":"Chetouane, A., Karoui, K.: A survey of machine learning methods for DDoS threats detection against SDN. In: International Workshop on Distributed Computing for Emerging Smart Networks, pp. 99\u2013127. Springer, Cham (2022)","DOI":"10.1007\/978-3-030-99004-6_6"},{"issue":"9","key":"1114_CR23","doi-asserted-by":"publisher","DOI":"10.3390\/s23094441","volume":"23","author":"AA Bahashwan","year":"2023","unstructured":"Bahashwan, A.A., Anbar, M., Manickam, S., Al-Amiedy, T.A., Aladaileh, M.A., Hasbullah, I.H.: A systematic literature review on machine learning and deep learning approaches for detecting DDoS attacks in software-defined networking. Sensors 23(9), 4441 (2023)","journal-title":"Sensors"},{"issue":"5","key":"1114_CR24","doi-asserted-by":"publisher","DOI":"10.3390\/sym13050866","volume":"13","author":"K Shinan","year":"2021","unstructured":"Shinan, K., Alsubhi, K., Alzahrani, A., Ashraf, M.U.: Machine learning-based botnet detection in software-defined network: a systematic review. Symmetry 13(5), 866 (2021)","journal-title":"Symmetry"},{"issue":"20","key":"1114_CR25","doi-asserted-by":"publisher","DOI":"10.3390\/s22207896","volume":"22","author":"N Ahmed","year":"2022","unstructured":"Ahmed, N., Ngadi, A.B., Sharif, J.M., Hussain, S., Uddin, M., Rathore, M.S., Iqbal, J., Abdelhaq, M., Alsaqour, R., Ullah, S.S., Zuhra, F.T.: Network threat detection using machine\/deep learning in SDN-based platforms: a comprehensive analysis of state-of-the-art solutions, discussion, challenges, and future research direction. Sensors 22(20), 7896 (2022)","journal-title":"Sensors"},{"key":"1114_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102423","volume":"110","author":"S Kaur","year":"2021","unstructured":"Kaur, S., Kumar, K., Aggarwal, N., Singh, G.: A comprehensive survey of DDoS defense solutions in SDN: taxonomy, research challenges, and future directions. Comput. Secur. 110, 102423 (2021)","journal-title":"Comput. Secur."},{"key":"1114_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100279","volume":"37","author":"J Singh","year":"2020","unstructured":"Singh, J., Behal, S.: Detection and mitigation of DDoS attacks in SDN: a comprehensive review, research challenges and future directions. Comput. Sci. Rev. 37, 100279 (2020)","journal-title":"Comput. Sci. Rev."},{"issue":"3","key":"1114_CR28","doi-asserted-by":"publisher","first-page":"3533","DOI":"10.1007\/s13369-023-08075-2","volume":"49","author":"N Aslam","year":"2024","unstructured":"Aslam, N., Srivastava, S., Gore, M.M.: A comprehensive analysis of machine learning-and deep learning-based solutions for DDoS attack detection in SDN. Arab. J. Sci. Eng. 49(3), 3533\u20133573 (2024)","journal-title":"Arab. J. Sci. Eng."},{"key":"1114_CR29","doi-asserted-by":"publisher","first-page":"42236","DOI":"10.1109\/ACCESS.2021.3062909","volume":"9","author":"A Aljuhani","year":"2021","unstructured":"Aljuhani, A.: Machine learning approaches for combating distributed denial of service attacks in modern networking environments. IEEE Access 9, 42236\u201342264 (2021)","journal-title":"IEEE Access"},{"key":"1114_CR30","doi-asserted-by":"crossref","unstructured":"Adamou Djergou, A., Maleh, Y., Mounir, S.: Machine learning techniques for intrusion detection in SDN: a survey. In: Advances in Information, Communication and Cybersecurity: Proceedings of ICI2C\u201921, pp. 460\u2013473. Springer (2022)","DOI":"10.1007\/978-3-030-91738-8_42"},{"issue":"5","key":"1114_CR31","doi-asserted-by":"publisher","first-page":"3183","DOI":"10.3390\/app13053183","volume":"13","author":"TE Ali","year":"2023","unstructured":"Ali, T.E., Chong, Y.W., Manickam, S.: Machine learning techniques to detect a DDoS attack in SDN: a systematic review. Appl. Sci. 13(5), 3183 (2023)","journal-title":"Appl. Sci."},{"issue":"2","key":"1114_CR32","doi-asserted-by":"publisher","first-page":"198","DOI":"10.3390\/electronics11020198","volume":"11","author":"M Abdullahi","year":"2022","unstructured":"Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L.F., Abdulkadir, S.J.: Detecting cybersecurity attacks in internet of things using artificial intelligence methods: a systematic literature review. Electronics 11(2), 198 (2022)","journal-title":"Electronics"},{"key":"1114_CR33","doi-asserted-by":"publisher","first-page":"134695","DOI":"10.1109\/ACCESS.2020.3009849","volume":"8","author":"J Malik","year":"2020","unstructured":"Malik, J., Akhunzada, A., Bibi, I., Imran, M., Musaddiq, A., Kim, S.W.: Hybrid deep learning: an efficient reconnaissance and surveillance detection mechanism in SDN. IEEE Access 8, 134695\u2013134706 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3009849","journal-title":"IEEE Access"},{"key":"1114_CR34","doi-asserted-by":"publisher","unstructured":"Sarica, A.K., Angin, P.: A novel SDN dataset for intrusion detection in iot networks. In: 2020 16th International Conference on Network and Service Management (CNSM), pp. 1\u20135 (2020). https:\/\/doi.org\/10.23919\/CNSM50824.2020.9269042","DOI":"10.23919\/CNSM50824.2020.9269042"},{"key":"1114_CR35","doi-asserted-by":"publisher","unstructured":"Khamaiseh, S.Y., Alsmadi, I., Al-Alaj, A.: Deceiving machine learning-based saturation attack detection systems in SDN. In: 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), pp. 44\u201350 (2020). https:\/\/doi.org\/10.1109\/NFV-SDN50289.2020.9289908","DOI":"10.1109\/NFV-SDN50289.2020.9289908"},{"key":"1114_CR36","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9091533","volume":"9","author":"TA Tang","year":"2020","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M., El Moussa, F.: DeepIDS: deep learning approach for intrusion detection in software defined networking. Electronics 9, 1533 (2020). https:\/\/doi.org\/10.3390\/electronics9091533","journal-title":"Electronics"},{"key":"1114_CR37","doi-asserted-by":"publisher","first-page":"2723","DOI":"10.32604\/cmc.2021.014594","volume":"66","author":"S Shahzadi","year":"2020","unstructured":"Shahzadi, S., Ahmad, F., Basharat, A., Alruwaili, M., Alanazi, S., Humayun, M., et al.: Machine learning empowered security management and quality of service provision in SDN-NFV environment. Comput. Mater. Contin. 66, 2723\u20132749 (2020). https:\/\/doi.org\/10.32604\/cmc.2021.014594","journal-title":"Comput. Mater. Contin."},{"key":"1114_CR38","doi-asserted-by":"publisher","first-page":"5875","DOI":"10.1007\/s12652-020-02099-4","volume":"11","author":"A Sebbar","year":"2020","unstructured":"Sebbar, A., Zkik, K., Baddi, Y., Boulmalf, M., Kettani, M.D.E.-C.E.: MitM detection and defense mechanism CBNA-RF based on machine learning for large-scale SDN context. J. Ambient. Intell. Humaniz. Comput. 11, 5875\u20135894 (2020). https:\/\/doi.org\/10.1007\/s12652-020-02099-4","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"1114_CR39","doi-asserted-by":"publisher","unstructured":"Akbari, I., Tahoun, E., Salahuddin, M.A., Limam, N., Boutaba, R.: ATMoS: autonomous threat mitigation in SDN using reinforcement learning. In: NOMS 2020\u20132020 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20139 (2020). https:\/\/doi.org\/10.1109\/NOMS47738.2020.9110426","DOI":"10.1109\/NOMS47738.2020.9110426"},{"key":"1114_CR40","doi-asserted-by":"publisher","first-page":"106738","DOI":"10.1016\/j.compeleceng.2020.106738","volume":"86","author":"MV de Assis","year":"2020","unstructured":"de Assis, M.V., Carvalho, L.F., Rodrigues, J.J., Lloret, J., Proen\u00e7a, M.L., Jr.: Near real-time security system applied to SDN environments in IoT networks using convolutional neural network. Comput. Electr. Eng. 86, 106738 (2020). https:\/\/doi.org\/10.1016\/j.compeleceng.2020.106738","journal-title":"Comput. Electr. Eng."},{"key":"1114_CR41","doi-asserted-by":"publisher","unstructured":"Althobiti, A., Almohayawi, R., Bamsag, O.: Machine learning approach to secure software defined network: machine learning and artificial intelligence. In: Proceedings of the 4th International Conference on Future Networks and Distributed Systems, pp. 1\u20138 (2020). https:\/\/doi.org\/10.1145\/3440749.3442597","DOI":"10.1145\/3440749.3442597"},{"key":"1114_CR42","doi-asserted-by":"publisher","unstructured":"Ali, M., Hu, Y.-F., Luong, D.K., Oguntala, G., Li, J.-P., Abdo, K.: Adversarial attacks on ai based intrusion detection system for heterogeneous wireless communications networks. In: 2020 AIAA\/IEEE 39th Digital Avionics Systems Conference (DASC), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/DASC50938.2020.9256597","DOI":"10.1109\/DASC50938.2020.9256597"},{"key":"1114_CR43","doi-asserted-by":"publisher","unstructured":"Ali, J., Roh, B.-H., Lee, B., Oh, J., Adil, M.: A machine learning framework for prevention of software-defined networking controller from DDoS attacks and dimensionality reduction of big data. In: 2020 International Conference on Information and Communication Technology Convergence (ICTC), pp. 515\u2013519 (2020). https:\/\/doi.org\/10.1109\/ICTC49870.2020.9289504","DOI":"10.1109\/ICTC49870.2020.9289504"},{"key":"1114_CR44","doi-asserted-by":"publisher","unstructured":"AlMomin, H., Ibrahim, A.A.: Detection of distributed denial of service attacks through a combination of machine learning algorithms over software defined network environment. In: 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1\u20134 (2020). https:\/\/doi.org\/10.1109\/HORA49412.2020.9152873","DOI":"10.1109\/HORA49412.2020.9152873"},{"key":"1114_CR45","doi-asserted-by":"publisher","DOI":"10.3390\/su12031035","volume":"12","author":"H Polat","year":"2020","unstructured":"Polat, H., Polat, O., Cetin, A.: Detecting DDoS attacks in software-defined networks through feature selection methods and machine learning models. Sustainability 12, 1035 (2020). https:\/\/doi.org\/10.3390\/su12031035","journal-title":"Sustainability"},{"key":"1114_CR46","doi-asserted-by":"publisher","unstructured":"Luong, T.-K., Tran, T.-D., Le, G.-T.: DDoS attack detection and defense in SDN based on machine learning. In: 2020 7th NAFOSTED Conference on Information and Computer Science (NICS), pp. 31\u201335 (2020). https:\/\/doi.org\/10.1109\/NICS51282.2020.9335867","DOI":"10.1109\/NICS51282.2020.9335867"},{"key":"1114_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103285","volume":"79","author":"N Satheesh","year":"2020","unstructured":"Satheesh, N., Rathnamma, M., Rajeshkumar, G., Sagar, P.V., Dadheech, P., Dogiwal, S., et al.: Flow-based anomaly intrusion detection using machine learning model with software defined networking for OpenFlow network. Microprocess. Microsyst. 79, 103285 (2020). https:\/\/doi.org\/10.1016\/j.micpro.2020.103285","journal-title":"Microprocess. Microsyst."},{"key":"1114_CR48","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1007\/s11036-019-01437-x","volume":"25","author":"D-M Ngo","year":"2020","unstructured":"Ngo, D.-M., Pham-Quoc, C., Thinh, T.N.: Heterogeneous hardware-based network intrusion detection system with multiple approaches for SDN. Mob. Netw. Appl. 25, 1178\u20131192 (2020). https:\/\/doi.org\/10.1007\/s11036-019-01437-x","journal-title":"Mob. Netw. Appl."},{"key":"1114_CR49","doi-asserted-by":"publisher","unstructured":"Dey, S.K., Raihan Uddin, M., Mahbubur Rahman, M.: Performance analysis of SDN-based intrusion detection model with feature selection approach. In: Proceedings of International Joint Conference on Computational Intelligence: IJCCI 2018, pp. 483\u2013494 (2020). https:\/\/doi.org\/10.1007\/978-981-13-7564-4_41","DOI":"10.1007\/978-981-13-7564-4_41"},{"key":"1114_CR50","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5927","volume":"32","author":"R Swami","year":"2020","unstructured":"Swami, R., Dave, M., Ranga, V.: Voting-based intrusion detection framework for securing software-defined networks. Concurr. Comput. Pract. Exp. 32, e5927 (2020). https:\/\/doi.org\/10.1002\/cpe.5927","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"1114_CR51","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9030413","volume":"9","author":"NN Tuan","year":"2020","unstructured":"Tuan, N.N., Hung, P.H., Nghia, N.D., Tho, N.V., Phan, T.V., Thanh, N.H.: A ddos attack mitigation scheme in ISP networks using machine learning based on SDN. Electronics 9, 413 (2020). https:\/\/doi.org\/10.3390\/electronics9030413","journal-title":"Electronics"},{"key":"1114_CR52","doi-asserted-by":"publisher","unstructured":"Wang, L., Liu, Y.: A DDoS attack detection method based on information entropy and deep learning in SDN. In: 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 1084\u20131088 (2020). https:\/\/doi.org\/10.1109\/ITNEC48623.2020.9085007","DOI":"10.1109\/ITNEC48623.2020.9085007"},{"key":"1114_CR53","doi-asserted-by":"publisher","first-page":"4519","DOI":"10.1109\/TITS.2020.3027390","volume":"22","author":"J Shu","year":"2020","unstructured":"Shu, J., Zhou, L., Zhang, W., Du, X., Guizani, M.: Collaborative intrusion detection for VANETs: a deep learning-based distributed SDN approach. IEEE Trans. Intell. Transp. Syst. 22, 4519\u20134530 (2020). https:\/\/doi.org\/10.1109\/TITS.2020.3027390","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"1114_CR54","doi-asserted-by":"publisher","unstructured":"Lee, T.-H., Chang, L.-H., Syu, C.-W.: Deep learning enabled intrusion detection and prevention system over SDN networks. In: 2020 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/ICCWorkshops49005.2020.9145085","DOI":"10.1109\/ICCWorkshops49005.2020.9145085"},{"key":"1114_CR55","doi-asserted-by":"publisher","unstructured":"Lin, Z., Hongle, D.: Research on SDN intrusion detection based on online ensemble learning algorithm. In: International Conference on Networking and Network Applications (NaNA), pp. 114\u2013118 (2020). https:\/\/doi.org\/10.1109\/NaNA51271.2020.00027","DOI":"10.1109\/NaNA51271.2020.00027"},{"key":"1114_CR56","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/927\/1\/012035","author":"I Kurochkin","year":"2020","unstructured":"Kurochkin, I., Volkov, S.: Using GRU based deep neural network for intrusion detection in software-defined networks. IOP Conf. Ser. Mater. Sci. Eng. (2020). https:\/\/doi.org\/10.1088\/1757-899X\/927\/1\/012035","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"1114_CR57","doi-asserted-by":"publisher","first-page":"1349","DOI":"10.1109\/TNSM.2020.3004415","volume":"17","author":"TV Phan","year":"2020","unstructured":"Phan, T.V., Nguyen, T.G., Dao, N.-N., Huong, T.T., Thanh, N.H., Bauschert, T.: Deepguard: efficient anomaly detection in SDN with fine-grained traffic flow monitoring. IEEE Trans. Netw. Serv. Manag. 17, 1349\u20131362 (2020). https:\/\/doi.org\/10.1109\/TNSM.2020.3004415","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"1114_CR58","doi-asserted-by":"publisher","unstructured":"Holik, F., Dolezel, P.: Industrial network protection by SDN-based IPS with AI. In: Asian Conference on Intelligent Information and Database Systems, pp. 192\u2013203 (2020). https:\/\/doi.org\/10.1007\/978-981-15-3380-8_17","DOI":"10.1007\/978-981-15-3380-8_17"},{"key":"1114_CR59","doi-asserted-by":"publisher","first-page":"155859","DOI":"10.1109\/ACCESS.2020.3019330","volume":"8","author":"JA Perez-Diaz","year":"2020","unstructured":"Perez-Diaz, J.A., Valdovinos, I.A., Choo, K.-K.R., Zhu, D.: A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning. IEEE Access 8, 155859\u2013155872 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3019330","journal-title":"IEEE Access"},{"key":"1114_CR60","doi-asserted-by":"publisher","unstructured":"Le, D.-H., Tran, H.-A.: A novel machine learning-based network intrusion detection system for software-defined network. In: 7th NAFOSTED Conference on Information and Computer Science (NICS), pp. 25\u201330 (2020). https:\/\/doi.org\/10.1109\/NICS51282.2020.9335863","DOI":"10.1109\/NICS51282.2020.9335863"},{"key":"1114_CR61","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1080\/09540091.2020.1870437","volume":"33","author":"PK Mondal","year":"2021","unstructured":"Mondal, P.K., Aguirre Sanchez, L.P., Benedetto, E., Shen, Y., Guo, M.: A dynamic network traffic classifier using supervised ML for a Docker-based SDN network. Connect. Sci. 33, 693\u2013718 (2021). https:\/\/doi.org\/10.1080\/09540091.2020.1870437","journal-title":"Connect. Sci."},{"key":"1114_CR62","doi-asserted-by":"publisher","first-page":"9","DOI":"10.5120\/ijca2021921027","volume":"174","author":"HA Alamri","year":"2021","unstructured":"Alamri, H.A., Thayananthan, V., Yazdani, J.: Machine learning for securing SDN based 5G network. Int. J. Comput. Appl. 174, 9\u201316 (2021). https:\/\/doi.org\/10.5120\/ijca2021921027","journal-title":"Int. J. Comput. Appl."},{"key":"1114_CR63","doi-asserted-by":"publisher","unstructured":"Abou El Houda, Z., Hafid, A.S., Khoukhi, L.: A novel machine learning framework for advanced attack detection using SDN. In: 2021 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/GLOBECOM46510.2021.9685643","DOI":"10.1109\/GLOBECOM46510.2021.9685643"},{"key":"1114_CR64","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.16.7.267-275","author":"B Aryal","year":"2021","unstructured":"Aryal, B., Abbas, R., Collings, I.B.: SDN Enabled DDoS attack detection and mitigation for 5G. J. Commun. (2021). https:\/\/doi.org\/10.12720\/jcm.16.7.267-275","journal-title":"J. Commun."},{"key":"1114_CR65","doi-asserted-by":"publisher","unstructured":"Thorat, P., Dubey, N.K., Khetan, K., Challa, R.: SDN-based predictive alarm manager for security attacks detection at the IoT gateways. In: IEEE 18th Annual Consumer Communications and Networking Conference (CCNC), pp. 1\u20132 (2021). https:\/\/doi.org\/10.1109\/CCNC49032.2021.9369623","DOI":"10.1109\/CCNC49032.2021.9369623"},{"key":"1114_CR66","doi-asserted-by":"publisher","unstructured":"Ganesan, A., Sarac, K.: Mitigating evasion attacks on machine learning based NIDS systems in SDN. In: IEEE 7th International Conference on Network Softwarization (NetSoft), pp. 268\u2013272 (2021). https:\/\/doi.org\/10.1109\/NetSoft51509.2021.9492526","DOI":"10.1109\/NetSoft51509.2021.9492526"},{"key":"1114_CR67","doi-asserted-by":"publisher","first-page":"102367","DOI":"10.1016\/j.cose.2021.102367","volume":"109","author":"PT Duy","year":"2021","unstructured":"Duy, P.T., Khoa, N.H., Nguyen, A.G.-T., Pham, V.-H.: DIGFuPAS: deceive IDS with GAN and function-preserving on adversarial samples in SDN-enabled networks. Comput. Secur. 109, 102367 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102367","journal-title":"Comput. Secur."},{"key":"1114_CR68","doi-asserted-by":"publisher","first-page":"34885","DOI":"10.1109\/access.2019.2904236","volume":"7","author":"RU Rasool","year":"2019","unstructured":"Rasool, R.U., Ashraf, U., Ahmed, K., Wang, H., Rafique, W., Anwar, Z.: Cyberpulse: a machine learning based link flooding attack mitigation system for software defined networks. IEEE Access 7, 34885\u201334899 (2019). https:\/\/doi.org\/10.1109\/access.2019.2904236","journal-title":"IEEE Access"},{"key":"1114_CR69","doi-asserted-by":"publisher","unstructured":"Le, L.T., Thinh, T.N.: On the improvement of machine learning based intrusion detection system for SDN networks. In: 8th NAFOSTED Conference on Information and Computer Science (NICS), pp. 464\u2013469 (2021). https:\/\/doi.org\/10.1109\/NICS54270.2021.9701522","DOI":"10.1109\/NICS54270.2021.9701522"},{"key":"1114_CR70","doi-asserted-by":"publisher","unstructured":"Ashraf, J., Moustafa, N., Bukhshi, A.D., Javed, A.: Intrusion detection system for SDN-enabled IoT networks using machine learning techniques. In: IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW), pp. 46\u201352 (2021). https:\/\/doi.org\/10.1109\/EDOCW52865.2021.00031","DOI":"10.1109\/EDOCW52865.2021.00031"},{"key":"1114_CR71","doi-asserted-by":"publisher","unstructured":"Hussain, J., Hnamte, V.: Deep learning based intrusion detection system: software defined network. In: 2021 Asian Conference on Innovation in Technology (ASIANCON), pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/ASIANCON51346.2021.9544913","DOI":"10.1109\/ASIANCON51346.2021.9544913"},{"key":"1114_CR72","doi-asserted-by":"publisher","unstructured":"Carvalho, R.N., Costa, L.R., Bordim, J.L., Alchieri, E.A.: Detecting DDoS attacks on SDN data plane with machine learning. In: 2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW), pp. 138\u2013144 (2021). https:\/\/doi.org\/10.1109\/CANDARW53999.2021.00030","DOI":"10.1109\/CANDARW53999.2021.00030"},{"key":"1114_CR73","doi-asserted-by":"publisher","first-page":"108495","DOI":"10.1109\/ACCESS.2021.3101650","volume":"9","author":"NM Yungaicela-Naula","year":"2021","unstructured":"Yungaicela-Naula, N.M., Vargas-Rosales, C., Perez-Diaz, J.A.: SDN-based architecture for transport and application layer DDoS attack detection by using machine and deep learning. IEEE Access 9, 108495\u2013108512 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3101650","journal-title":"IEEE Access"},{"key":"1114_CR74","doi-asserted-by":"publisher","first-page":"102942","DOI":"10.1016\/j.jnca.2020.102942","volume":"177","author":"MV Assis","year":"2021","unstructured":"Assis, M.V., Carvalho, L.F., Lloret, J., Proen\u00e7a, M.L., Jr.: A GRU deep learning system against attacks in software defined networks. J. Netw. Comput. Appl. 177, 102942 (2021). https:\/\/doi.org\/10.1016\/j.jnca.2020.102942","journal-title":"J. Netw. Comput. Appl."},{"key":"1114_CR75","first-page":"423","volume":"8","author":"R Khamkar","year":"2021","unstructured":"Khamkar, R., Thakre, K., Kotkar, A., Jadhav, P., Hanchate, R.: Low rate DDoS attack identification and defense using SDN based on machine learning method. Int. Res. J. Eng. Technol. IRJET 8, 423\u2013428 (2021)","journal-title":"Int. Res. J. Eng. Technol. IRJET"},{"key":"1114_CR76","doi-asserted-by":"publisher","unstructured":"Chasaki, D., Mansour, C.: SDN security through system call learning. In: 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/NTMS49979.2021.9432640","DOI":"10.1109\/NTMS49979.2021.9432640"},{"key":"1114_CR77","doi-asserted-by":"publisher","first-page":"4939","DOI":"10.3390\/s21144939","volume":"21","author":"Y Nikoloudakis","year":"2021","unstructured":"Nikoloudakis, Y., Kefaloukos, I., Klados, S., Panagiotakis, S., Pallis, E., Skianis, C., Markakis, E.K.: Towards a machine learning based situational awareness framework for cybersecurity: an SDN implementation. Sensors 21, 4939 (2021). https:\/\/doi.org\/10.3390\/s21144939","journal-title":"Sensors"},{"key":"1114_CR78","doi-asserted-by":"publisher","unstructured":"Hussain, J., Hnamte, V.: A novel deep learning based intrusion detection system: software defined network. In: International Conference on innovation and intelligence for informatics, computing, and technologies (3ICT), pp. 506\u2013511 (2021). https:\/\/doi.org\/10.1109\/3ICT53449.2021.9581404","DOI":"10.1109\/3ICT53449.2021.9581404"},{"key":"1114_CR79","doi-asserted-by":"publisher","first-page":"47815","DOI":"10.1109\/ACCESS.2021.3068459","volume":"9","author":"S Kim","year":"2021","unstructured":"Kim, S., Yoon, S., Lim, H.: Deep reinforcement learning-based traffic sampling for multiple traffic analyzers on software-defined networks. IEEE Access 9, 47815\u201347827 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3068459","journal-title":"IEEE Access"},{"key":"1114_CR80","doi-asserted-by":"publisher","unstructured":"Liu, Luo, Jiang, Wang, Jia: A CGAN-based DDoS attack detection method in SDN. In: International Wireless Communications and Mobile Computing (IWCMC), pp. 1030\u20131034 (2021). https:\/\/doi.org\/10.1109\/IWCMC51323.2021.9498840","DOI":"10.1109\/IWCMC51323.2021.9498840"},{"key":"1114_CR81","doi-asserted-by":"publisher","unstructured":"Sharma, H., Gupta, S.: Leveraging machine learning and SDN-Fog infrastructure to mitigate flood attacks. In: IEEE Globecom Workshops (GC Wkshps), pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/GCWkshps52748.2021.9681984","DOI":"10.1109\/GCWkshps52748.2021.9681984"},{"key":"1114_CR82","doi-asserted-by":"publisher","unstructured":"Zhong, H., Yu, C., Cui, J., Sun, X., Gu, C., Liu, L.: DDoS defense scheme based on machine learning in software-defined networking. In: IEEE 23rd International Conference on High Performance Computing and Communications; 7th International Conference on Data Science and Systems; 19th International Conference on Smart City; 7th International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application (HPCC\/DSS\/SmartCity\/DependSys), pp. 253\u2013260 (2021). https:\/\/doi.org\/10.1109\/HPCC-DSS-SmartCity-DependSys53884.2021.00059","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys53884.2021.00059"},{"key":"1114_CR83","doi-asserted-by":"publisher","unstructured":"Girish, L., Rao, S.K., Renukananda, T., Vidyashree, K., Hemashree, R.: DadGAN: DDOS anomaly detection using generative adversarial network. In: IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), pp. 1\u20137 (2021). https:\/\/doi.org\/10.1109\/CSITSS54238.2021.9683282","DOI":"10.1109\/CSITSS54238.2021.9683282"},{"key":"1114_CR84","doi-asserted-by":"publisher","unstructured":"Das, T., Shukla, R.M., Sengupta, S.: The devil is in the details: confident and explainable anomaly detector for software-defined networks. In: IEEE 20th International Symposium on Network Computing and Applications (NCA), pp. 1\u20135 (2021). https:\/\/doi.org\/10.1109\/NCA53618.2021.9685157","DOI":"10.1109\/NCA53618.2021.9685157"},{"key":"1114_CR85","doi-asserted-by":"publisher","first-page":"108015","DOI":"10.1016\/j.comnet.2021.108015","volume":"191","author":"P Hadem","year":"2021","unstructured":"Hadem, P., Saikia, D.K., Moulik, S.: An SDN-based intrusion detection system using SVM with selective logging for IP traceback. Comput. Netw. 191, 108015 (2021). https:\/\/doi.org\/10.1016\/j.comnet.2021.108015","journal-title":"Comput. Netw."},{"key":"1114_CR86","doi-asserted-by":"publisher","unstructured":"Hassan, H.A., Hemdan, E.E., El-Shafai, W., Shokair, M., Abd El-Samie, F.E.: An efficient intrusion detection system for SDN using convolutional neural network. In: International Conference on Electronic Engineering (ICEEM), pp. 1\u20135 (2021). https:\/\/doi.org\/10.1109\/ICEEM52022.2021.9480383","DOI":"10.1109\/ICEEM52022.2021.9480383"},{"key":"1114_CR87","doi-asserted-by":"publisher","unstructured":"Ribeiro, A.D.R.L., Santos, R.Y.C., Nascimento, A.C.A.: Anomaly detection technique for intrusion detection in SDN environment using continuous data stream machine learning algorithms. In: IEEE International Systems Conference (SysCon), pp. 1\u20137 (2021). https:\/\/doi.org\/10.1109\/SysCon48628.2021.9447092","DOI":"10.1109\/SysCon48628.2021.9447092"},{"key":"1114_CR88","doi-asserted-by":"publisher","first-page":"13166","DOI":"10.1007\/s11227-021-03782-9","volume":"77","author":"OE Tayfour","year":"2021","unstructured":"Tayfour, O.E., Marsono, M.N.: Collaborative detection and mitigation of DDoS in software-defined networks. J. Supercomput. 77, 13166\u201313190 (2021). https:\/\/doi.org\/10.1007\/s11227-021-03782-9","journal-title":"J. Supercomput."},{"issue":"3","key":"1114_CR89","doi-asserted-by":"publisher","first-page":"252","DOI":"10.34218\/IJARET.12.3.2021.025","volume":"12","author":"R Batra","year":"2021","unstructured":"Batra, R., Mahajan, M., Goel, A.: Implementation of SDN based feature selection approaches on NSLKDD dataset for anomaly detection. Int. J. Adv. Res. Eng. Technol. (IJARET) 12(3), 252\u2013262 (2021). https:\/\/doi.org\/10.34218\/IJARET.12.3.2021.025","journal-title":"Int. J. Adv. Res. Eng. Technol. (IJARET)"},{"key":"1114_CR90","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1804\/1\/012007","author":"OJ Ibrahim","year":"2021","unstructured":"Ibrahim, O.J., Bhaya, W.S.: Intrusion detection system for cloud based software-defined networks. J. Phys. Conf. Ser. (2021). https:\/\/doi.org\/10.1088\/1742-6596\/1804\/1\/012007","journal-title":"J. Phys. Conf. Ser."},{"key":"1114_CR91","doi-asserted-by":"publisher","unstructured":"Qui, C.P.X., Quang, D.H., Duy, P.T., Pham, V.-H.: Strengthening IDS against evasion attacks with GAN-based adversarial samples in SDN-enabled network. In: RIVF International Conference on Computing and Communication Technologies (RIVF), pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/RIVF51545.2021.9642111","DOI":"10.1109\/RIVF51545.2021.9642111"},{"key":"1114_CR92","doi-asserted-by":"publisher","unstructured":"Elsayed, M.S., Jahromi, H.Z., Nazir, M.M., Jurcut, A.D.: The role of CNN for intrusion detection systems: an improved CNN learning approach for SDNs. In: International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures, pp. 91\u2013104 (2021). https:\/\/doi.org\/10.1007\/978-3-030-78459-1_7","DOI":"10.1007\/978-3-030-78459-1_7"},{"key":"1114_CR93","doi-asserted-by":"publisher","DOI":"10.3390\/su13031522","volume":"13","author":"RMA Ujjan","year":"2021","unstructured":"Ujjan, R.M.A., Pervez, Z., Dahal, K., Khan, W.A., Khattak, A.M., Hayat, B.: Entropy based features distribution for anti-DDoS model in SDN. Sustainability 13, 1522 (2021). https:\/\/doi.org\/10.3390\/su13031522","journal-title":"Sustainability"},{"key":"1114_CR94","doi-asserted-by":"publisher","unstructured":"Sudar, K.M., Beulah, M., Deepalakshmi, P., Nagaraj, P., Chinnasamy, P.: Detection of distributed denial of service attacks in SDN using machine learning techniques. In: International Conference on Computer Communication and Informatics (ICCCI), pp. 1\u20135 (2021). https:\/\/doi.org\/10.1109\/ICCCI50826.2021.9402517","DOI":"10.1109\/ICCCI50826.2021.9402517"},{"key":"1114_CR95","doi-asserted-by":"publisher","first-page":"122495","DOI":"10.1109\/ACCESS.2021.3109490","volume":"9","author":"AO Sangodoyin","year":"2021","unstructured":"Sangodoyin, A.O., Akinsolu, M.O., Pillai, P., Grout, V.: Detection and classification of DDoS flooding attacks on software-defined networks: a case study for the application of machine learning. IEEE Access 9, 122495\u2013122508 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3109490","journal-title":"IEEE Access"},{"key":"1114_CR96","doi-asserted-by":"publisher","first-page":"445","DOI":"10.19101\/IJATEE.2021.874021","volume":"8","author":"R Sanjeetha","year":"2021","unstructured":"Sanjeetha, R., Raj, A., Saivenu, K., Ahmed, M.I., Sathvik, B., Kanavalli, A.: Detection and mitigation of botnet based DDoS attacks using catboost machine learning algorithm in SDN environment. Int. J. Adv. Technol. Eng. Explor. 8, 445 (2021). https:\/\/doi.org\/10.19101\/IJATEE.2021.874021","journal-title":"Int. J. Adv. Technol. Eng. Explor."},{"key":"1114_CR97","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.3390\/electronics10111227","volume":"10","author":"\u00d6 Tonkal","year":"2021","unstructured":"Tonkal, \u00d6., Polat, H., Ba\u015faran, E., C\u00f6mert, Z., Kocao\u011flu, R.: Machine learning approach equipped with neighbourhood component analysis for DDoS attack detection in software-defined networking. Electronics 10, 1227 (2021). https:\/\/doi.org\/10.3390\/electronics10111227","journal-title":"Electronics"},{"key":"1114_CR98","doi-asserted-by":"publisher","first-page":"14","DOI":"10.3390\/technologies9010014","volume":"9","author":"JD Gadze","year":"2021","unstructured":"Gadze, J.D., Bamfo-Asante, A.A., Agyemang, J.O., Nunoo-Mensah, H., Opare, K.A.-B.: An investigation into the application of deep learning in the detection and mitigation of DDOS attack on SDN controllers. Technologies 9, 14 (2021). https:\/\/doi.org\/10.3390\/technologies9010014","journal-title":"Technologies"},{"key":"1114_CR99","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.future.2021.06.047","volume":"125","author":"MP Novaes","year":"2021","unstructured":"Novaes, M.P., Carvalho, L.F., Lloret, J., Proen\u00e7a, M.L., Jr.: Adversarial deep learning approach detection and defense against DDoS attacks in SDN environments. Future Gener. Comput. Syst. 125, 156\u2013167 (2021). https:\/\/doi.org\/10.1016\/j.future.2021.06.047","journal-title":"Future Gener. Comput. Syst."},{"key":"1114_CR100","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.procs.2021.07.032","volume":"191","author":"AS Alshra\u2019a","year":"2021","unstructured":"Alshra\u2019a, A.S., Farhat, A., Seitz, J.: Deep learning algorithms for detecting denial of service attacks in software-defined networks. Procedia Comput. Sci. 191, 254\u2013263 (2021). https:\/\/doi.org\/10.1016\/j.procs.2021.07.032","journal-title":"Procedia Comput. Sci."},{"key":"1114_CR101","doi-asserted-by":"publisher","unstructured":"Elsayed, M.S., Le-Khac, N.A., Jahromi, H.Z., Jurcut, A.D.: A hybrid CNN-LSTM based approach for anomaly detection systems in SDNs. In: Proceedings of the 16th International Conference on Availability, Reliability and Security, Vienna, Austria, pp. 17\u201320 (2021). https:\/\/doi.org\/10.1145\/3465481.3469190","DOI":"10.1145\/3465481.3469190"},{"key":"1114_CR102","doi-asserted-by":"publisher","first-page":"103160","DOI":"10.1016\/j.jnca.2021.103160","volume":"191","author":"MS ElSayed","year":"2021","unstructured":"ElSayed, M.S., Le-Khac, N.-A., Albahar, M.A., Jurcut, A.: A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique. J. Netw. Comput. Appl. 191, 103160 (2021). https:\/\/doi.org\/10.1016\/j.jnca.2021.103160","journal-title":"J. Netw. Comput. Appl."},{"key":"1114_CR103","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-030-77185-0_7","volume-title":"Computational Intelligence in Recent Communication Networks","author":"Z Abou El Houda","year":"2021","unstructured":"Abou El Houda, Z., Senhaji Hafid, A., Khoukhi, L.: A novel unsupervised learning method for intrusion detection in software-defined networks. In: Ouaissa, M., Boulouard, Z., Ouaissa, M., Guermah, B. (eds.) Computational Intelligence in Recent Communication Networks, pp. 103\u2013117. Springer (2021). https:\/\/doi.org\/10.1007\/978-3-030-77185-0_7"},{"key":"1114_CR104","doi-asserted-by":"publisher","first-page":"2041","DOI":"10.1109\/TII.2021.3093905","volume":"18","author":"P Radoglou-Grammatikis","year":"2021","unstructured":"Radoglou-Grammatikis, P., Rompolos, K., Sarigiannidis, P., Argyriou, V., Lagkas, T., Sarigiannidis, A., et al.: Modeling, detecting, and mitigating threats against industrial healthcare systems: a combined software defined networking and reinforcement learning approach. IEEE Trans. Ind. Inf. 18, 2041\u20132052 (2021). https:\/\/doi.org\/10.1109\/TII.2021.3093905","journal-title":"IEEE Trans. Ind. Inf."},{"key":"1114_CR105","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-09071-1","author":"M Revathi","year":"2022","unstructured":"Revathi, M., Ramalingam, V., Amutha, B.: A machine learning based detection and mitigation of the DDOS attack by using SDN controller framework. Wirel. Pers. Commun. (2022). https:\/\/doi.org\/10.1007\/s11277-021-09071-1","journal-title":"Wirel. Pers. Commun."},{"key":"1114_CR106","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1007\/s11277-021-09071-1","volume":"14","author":"H-M Chuang","year":"2022","unstructured":"Chuang, H.-M., Liu, F., Tsai, C.-H.: Early detection of abnormal attacks in software-defined networking using machine learning approaches. Symmetry 14, 1178 (2022). https:\/\/doi.org\/10.1007\/s11277-021-09071-1","journal-title":"Symmetry"},{"key":"1114_CR107","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.021669","author":"MW Nadeem","year":"2022","unstructured":"Nadeem, M.W., Goh, H.G., Ponnusamy, V., Aun, Y.: DDoS detection in SDN using machine learning techniques. Comput. Mater. Contin. (2022). https:\/\/doi.org\/10.32604\/cmc.2022.021669","journal-title":"Comput. Mater. Contin."},{"key":"1114_CR108","doi-asserted-by":"publisher","unstructured":"Arevalo-Herrera, J., Camargo Mendoza, J.E., Martinez Torre, J.I.: Network anomaly detection with machine learning techniques for SDN networks. In: Proceedings of the 7th International Conference on Information and Education Innovations, pp. 129\u2013135 (2022). https:\/\/doi.org\/10.1145\/3535735.3535750","DOI":"10.1145\/3535735.3535750"},{"key":"1114_CR109","doi-asserted-by":"publisher","first-page":"233","DOI":"10.18280\/ria.360207","volume":"36","author":"MA Mohsin","year":"2022","unstructured":"Mohsin, M.A., Hamad, A.H.: Performance evaluation of SDN DDoS attack detection and mitigation based random forest and K-nearest neighbors machine learning algorithms. Rev. Intell. Artif. 36, 233\u2013240 (2022). https:\/\/doi.org\/10.18280\/ria.360207","journal-title":"Rev. Intell. Artif."},{"key":"1114_CR110","doi-asserted-by":"publisher","unstructured":"Chetouane, A., Karoui, K., Nemri, G.: An intelligent ML-based IDS framework for DDoS detection in the SDN environment. In: International Conference on Advances in Mobile Computing and Multimedia Intelligence, pp. 18\u201331 (2022). https:\/\/doi.org\/10.1007\/978-3-031-20436-4_2","DOI":"10.1007\/978-3-031-20436-4_2"},{"key":"1114_CR111","doi-asserted-by":"publisher","first-page":"709","DOI":"10.3390\/s22030709","volume":"22","author":"S Prabakaran","year":"2022","unstructured":"Prabakaran, S., Ramar, R., Hussain, I., Kavin, B.P., Alshamrani, S.S., AlGhamdi, A.S., et al.: Predicting attack pattern via machine learning by exploiting stateful firewall as virtual network function in an SDN network. Sensors 22, 709 (2022). https:\/\/doi.org\/10.3390\/s22030709","journal-title":"Sensors"},{"key":"1114_CR112","doi-asserted-by":"publisher","first-page":"6958","DOI":"10.3390\/s22186958","volume":"22","author":"S Ramani","year":"2022","unstructured":"Ramani, S., Jhaveri, R.H.: ML-based delay attack detection and isolation for fault-tolerant software-defined industrial networks. Sensors 22, 6958 (2022). https:\/\/doi.org\/10.3390\/s22186958","journal-title":"Sensors"},{"key":"1114_CR113","doi-asserted-by":"publisher","unstructured":"Safavat, S., Rawat, D.B.: OptiML: an enhanced ML approach towards design of SDN based UAV networks. In: ICC 2022-IEEE International Conference on Communications, pp. 1\u20136 (2022). https:\/\/doi.org\/10.1109\/ICC45855.2022.9839272","DOI":"10.1109\/ICC45855.2022.9839272"},{"key":"1114_CR114","doi-asserted-by":"publisher","unstructured":"Abou El Houda, Z., Khoukhi, L.: A hierarchical fog computing framework for network attack detection in SDN. In: ICC 2022-IEEE International Conference on Communications, pp. 4366\u20134371 (2022). https:\/\/doi.org\/10.1109\/ICC45855.2022.9838560","DOI":"10.1109\/ICC45855.2022.9838560"},{"key":"1114_CR115","doi-asserted-by":"publisher","unstructured":"Santos-Neto, M.J., Bordim, J.L., Alchieri, E.A., Ishikawa, E., Dourado, L.S.: Detecting DDoS attacks in SDN using a hybrid method with entropy and machine learning. In: Tenth International Symposium on Computing and Networking Workshops (CANDARW), pp. 248\u2013254 (2022). https:\/\/doi.org\/10.1109\/CANDARW57323.2022.00040","DOI":"10.1109\/CANDARW57323.2022.00040"},{"key":"1114_CR116","doi-asserted-by":"publisher","first-page":"4458","DOI":"10.1109\/TNSE.2022.3202147","volume":"9","author":"N Niknami","year":"2022","unstructured":"Niknami, N., Wu, J.: Entropy-kl-ml: enhancing the entropy-kl-based anomaly detection on software-defined networks. IEEE Trans. Netw. Sci. Eng. 9, 4458\u20134467 (2022). https:\/\/doi.org\/10.1109\/TNSE.2022.3202147","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"1114_CR117","doi-asserted-by":"publisher","unstructured":"Setitra, M.A., Benkhaddra, I., Bensalem, Z.E.A., Fan, M.: Feature modeling and dimensionality reduction to improve ML-based DDOS detection systems in SDN environment. In: 19th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp. 1\u20137 (2022). https:\/\/doi.org\/10.1109\/ICCWAMTIP56608.2022.10016507","DOI":"10.1109\/ICCWAMTIP56608.2022.10016507"},{"key":"1114_CR118","doi-asserted-by":"publisher","unstructured":"Sahbi, A., Ja\u00efdi, F., Bouhoula, A.: Artificial intelligence for SDN security: analysis, challenges and approach proposal. In: 15th International Conference on Security of Information and Networks (SIN), pp. 01\u201307 (2022). https:\/\/doi.org\/10.1109\/SIN56466.2022.9970501","DOI":"10.1109\/SIN56466.2022.9970501"},{"key":"1114_CR119","doi-asserted-by":"publisher","unstructured":"Meamarian, M., Yazdani, N.: A robust, lightweight deep learning approach for detection and mitigation of DDoS attacks in SDN. In: 27th International Computer Conference, Computer Society of Iran (CSICC), pp. 1\u20137 (2022). https:\/\/doi.org\/10.1109\/CSICC55295.2022.9780521","DOI":"10.1109\/CSICC55295.2022.9780521"},{"key":"1114_CR120","doi-asserted-by":"publisher","unstructured":"AlMasri, T., Snober, M.A., Al-Haija, Q.A.: IDPS-SDN-ML: an intrusion detection and prevention system using software-defined networks and machine learning. In: 1st International Conference on Smart Technology, Applied Informatics, and Engineering (APICS), pp. 133\u2013137 (2022). https:\/\/doi.org\/10.1109\/APICS56469.2022.9918804","DOI":"10.1109\/APICS56469.2022.9918804"},{"key":"1114_CR121","doi-asserted-by":"publisher","first-page":"103444","DOI":"10.1016\/j.jnca.2022.103444","volume":"205","author":"NM Yungaicela-Naula","year":"2022","unstructured":"Yungaicela-Naula, N.M., Vargas-Rosales, C., P\u00e9rez-D\u00edaz, J.A., Carrera, D.F.: A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning. J. Netw. Comput. Appl. 205, 103444 (2022). https:\/\/doi.org\/10.1016\/j.jnca.2022.103444","journal-title":"J. Netw. Comput. Appl."},{"key":"1114_CR122","doi-asserted-by":"publisher","first-page":"109140","DOI":"10.1016\/j.comnet.2022.109140","volume":"214","author":"RF Fouladi","year":"2022","unstructured":"Fouladi, R.F., Ermi\u015f, O., Anarim, E.: A ddos attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN. Comput. Netw. 214, 109140 (2022). https:\/\/doi.org\/10.1016\/j.comnet.2022.109140","journal-title":"Comput. Netw."},{"key":"1114_CR123","doi-asserted-by":"publisher","unstructured":"Goud, N.P.K., Reddy, G.S.C., Maryposonia, A.: Traffic classification of SDN network using machine learning algorithms. In: 6th International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 1181\u20131185 (2022). https:\/\/doi.org\/10.1109\/ICICCS53718.2022.9788429","DOI":"10.1109\/ICICCS53718.2022.9788429"},{"key":"1114_CR124","doi-asserted-by":"publisher","unstructured":"Deepa, V., Sivakumar, B.: Detection of DDoS attack using multiple kernel level (MKL) algorithm. In: International Conference on Innovative Trends in Information Technology (ICITIIT), pp. 1\u20135 (2022). https:\/\/doi.org\/10.1109\/ICITIIT54346.2022.9744225","DOI":"10.1109\/ICITIIT54346.2022.9744225"},{"key":"1114_CR125","doi-asserted-by":"publisher","unstructured":"Fenil, E., Kumar, P.M.: Towards a secure software defined network with adaptive mitigation of DDoS attacks by machine learning approaches. In: International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), pp. 1\u201313 (2022). https:\/\/doi.org\/10.1016\/j.engappai.2023.106432","DOI":"10.1016\/j.engappai.2023.106432"},{"key":"1114_CR126","doi-asserted-by":"publisher","unstructured":"O'Meara, J.W., Elsayed, M.S., Saber, T., Jurcut, A.D.: SDN intrusion detection: an ensemble approach to reducing false negative rate for novel attacks. In: 32nd International Telecommunication Networks and Applications Conference (ITNAC), pp. 1\u20138 (2022). https:\/\/doi.org\/10.1109\/ITNAC55475.2022.9998363","DOI":"10.1109\/ITNAC55475.2022.9998363"},{"key":"1114_CR127","doi-asserted-by":"publisher","unstructured":"Kim, M., Cho, J.-H., Lim, H., Moore, T.J., Nelson, F.F., Ko, R.K. et al.: Evaluating performance and security of a hybrid moving target defense in SDN environments. In: IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS), pp. 276\u2013286 (2022). https:\/\/doi.org\/10.1109\/QRS57517.2022.00037","DOI":"10.1109\/QRS57517.2022.00037"},{"key":"1114_CR128","doi-asserted-by":"publisher","first-page":"109850","DOI":"10.1109\/ACCESS.2022.3214974","volume":"10","author":"A Fausto","year":"2022","unstructured":"Fausto, A., Gaggero, G., Patrone, F., Marchese, M.: Reduction of the delays within an intrusion detection system (IDS) based on software defined networking (SDN). IEEE Access 10, 109850\u2013109862 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3214974","journal-title":"IEEE Access"},{"key":"1114_CR129","doi-asserted-by":"publisher","unstructured":"Sanjeetha, R., Mundada, M.R., Vaibhavi, G.: Botnet forensic analysis in software defined networks using ensemble based classifier. In: 4th International Conference on Circuits, Control, Communication and Computing (I4C), pp. 462\u2013467 (2022). https:\/\/doi.org\/10.1109\/I4C57141.2022.10057656","DOI":"10.1109\/I4C57141.2022.10057656"},{"key":"1114_CR130","doi-asserted-by":"publisher","unstructured":"Ganesan, A., Sarac, K.: Attack detection and mitigation using intelligent data planes in SDNs. In: GLOBECOM 2022\u20132022 IEEE Global Communications Conference, pp. 1\u20136 (2022). https:\/\/doi.org\/10.1109\/GLOBECOM48099.2022.10000925","DOI":"10.1109\/GLOBECOM48099.2022.10000925"},{"key":"1114_CR131","doi-asserted-by":"publisher","unstructured":"Trong, N.T., Do Hoang, H., Trung, D.M., Duy, P.T., Pham, V.-H.: A federated threat hunting system with big data analysis for SDN-enabled networks. In: RIVF International Conference on Computing and Communication Technologies (RIVF), pp. 35\u201340 (2022). https:\/\/doi.org\/10.1109\/RIVF55975.2022.10013833","DOI":"10.1109\/RIVF55975.2022.10013833"},{"key":"1114_CR132","doi-asserted-by":"publisher","unstructured":"Eldhai, A.M., Hamdan, M., Khan, S., Hamzah, M., Marsono, M.N.: Traffic classification based on incremental learning algorithms for the software-defined networks. In: International Conference on Frontiers of Information Technology (FIT), pp. 338\u2013343 (2022). https:\/\/doi.org\/10.1109\/FIT57066.2022.00068","DOI":"10.1109\/FIT57066.2022.00068"},{"key":"1114_CR133","doi-asserted-by":"publisher","unstructured":"Franco, J., Aris, A., Babun, L., Uluagac, A.S.: S-pot: a smart honeypot framework with dynamic rule configuration for SDN. In: GLOBECOM 2022\u20132022 IEEE Global Communications Conference, pp. 2818\u20132824 (2022). https:\/\/doi.org\/10.1109\/GLOBECOM48099.2022.10000682","DOI":"10.1109\/GLOBECOM48099.2022.10000682"},{"key":"1114_CR134","doi-asserted-by":"publisher","first-page":"53015","DOI":"10.1109\/ACCESS.2022.3172304","volume":"10","author":"M Al Razib","year":"2022","unstructured":"Al Razib, M., Javeed, D., Khan, M.T., Alkanhel, R., Muthanna, M.S.A.: Cyber threats detection in smart environments using SDN-enabled DNN-LSTM hybrid framework. IEEE Access 10, 53015\u201353026 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3172304","journal-title":"IEEE Access"},{"key":"1114_CR135","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s10766-021-00715-0","volume":"50","author":"T Naqash","year":"2022","unstructured":"Naqash, T., Shah, S.H., Islam, M.N.U.: Statistical analysis based intrusion detection system for ultra-high-speed software defined network. Int. J. Parallel Program. 50, 89\u2013114 (2022). https:\/\/doi.org\/10.1007\/s10766-021-00715-0","journal-title":"Int. J. Parallel Program."},{"key":"1114_CR136","doi-asserted-by":"publisher","unstructured":"Sandhya Vani, M., Durga Devi, R., Mandru, D.B.: An efficient intrusion detection framework in software-defined networking for cyber security applications. In: International Conference on Soft Computing and Signal Processing, vol. 313, pp. 461\u2013474 (2022). https:\/\/doi.org\/10.1007\/978-981-19-8669-7_40","DOI":"10.1007\/978-981-19-8669-7_40"},{"key":"1114_CR137","doi-asserted-by":"publisher","first-page":"342","DOI":"10.3390\/drones6110342","volume":"6","author":"L Kou","year":"2022","unstructured":"Kou, L., Ding, S., Wu, T., Dong, W., Yin, Y.: An intrusion detection model for drone communication network in SDN environment. Drones 6, 342 (2022). https:\/\/doi.org\/10.3390\/drones6110342","journal-title":"Drones"},{"key":"1114_CR138","doi-asserted-by":"publisher","unstructured":"Das, T., Hamdan, O.A., Sengupta, S., Arslan, E.: Flood control: TCP-SYN flood detection for software-defined networks using openflow port statistics. In: IEEE International Conference on Cyber Security and Resilience (CSR), pp. 1\u20138 (2022). https:\/\/doi.org\/10.1109\/CSR54599.2022.9850339","DOI":"10.1109\/CSR54599.2022.9850339"},{"key":"1114_CR139","doi-asserted-by":"publisher","unstructured":"Senthanathan Gandhi R., Krishnan, M.: Block-hSDN-edge: deep learning based hybrid intrusion detection and prevention system for secure hybrid SDN environment. In: Ramadevi and R, Eswari and Krishnan, Moorthy, Block-hSDN-Edge: Deep Learning Based Hybrid Intrusion Detection and Prevention System for Secure Hybrid SDN Environment. https:\/\/doi.org\/10.2139\/ssrn.4292667","DOI":"10.2139\/ssrn.4292667"},{"key":"1114_CR140","doi-asserted-by":"publisher","first-page":"2207","DOI":"10.1109\/TNSM.2022.3158468","volume":"19","author":"TV Phan","year":"2022","unstructured":"Phan, T.V., Bauschert, T.: Deepair: deep reinforcement learning for adaptive intrusion response in software-defined networks. IEEE Trans. Netw. Serv. Manag. 19, 2207\u20132218 (2022). https:\/\/doi.org\/10.1109\/TNSM.2022.3158468","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"1114_CR141","doi-asserted-by":"publisher","first-page":"2322","DOI":"10.11591\/eei.v11i4.3835","volume":"11","author":"H Kamel","year":"2022","unstructured":"Kamel, H., Abdullah, M.Z.: Distributed denial of service attacks detection for software defined networks based on evolutionary decision tree model. Bull. Electr. Eng. Inform. 11, 2322\u20132330 (2022). https:\/\/doi.org\/10.11591\/eei.v11i4.3835","journal-title":"Bull. Electr. Eng. Inform."},{"key":"1114_CR142","doi-asserted-by":"publisher","unstructured":"Alqahtani, A.H., Clark, J.A.: Enhanced scanning in SDN networks and its detection using machine learning. In: IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA), pp. 188\u2013197 (2022). https:\/\/doi.org\/10.1109\/TPS-ISA56441.2022.00032","DOI":"10.1109\/TPS-ISA56441.2022.00032"},{"key":"1114_CR143","doi-asserted-by":"publisher","unstructured":"Thi, H.T., Son, N.D.H., Duy, P.T., Pham, V.-H.: Federated learning-based cyber threat hunting for apt attack detection in SDN-enabled networks. In: 21st International Symposium on Communications and Information Technologies (ISCIT), pp. 1\u20136 (2022). https:\/\/doi.org\/10.1109\/ISCIT55906.2022.9931222","DOI":"10.1109\/ISCIT55906.2022.9931222"},{"key":"1114_CR144","doi-asserted-by":"publisher","first-page":"66481","DOI":"10.1109\/ACCESS.2022.3184722","volume":"10","author":"AH Janabi","year":"2022","unstructured":"Janabi, A.H., Kanakis, T., Johnson, M.: Overhead reduction technique for software-defined network based intrusion detection systems. IEEE Access 10, 66481\u201366491 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3184722","journal-title":"IEEE Access"},{"key":"1114_CR145","doi-asserted-by":"publisher","unstructured":"Chetouane, A., Karoui, K.: Performance improvement of DDoS intrusion detection model using hybrid deep learning method in the SDN environment. In: IEEE 21st International Conference on Ubiquitous Computing and Communications (IUCC\/CIT\/DSCI\/SmartCNS), pp. 159\u2013166 (2022). https:\/\/doi.org\/10.1109\/IUCC-CIT-DSCI-SmartCNS57392.2022.00035","DOI":"10.1109\/IUCC-CIT-DSCI-SmartCNS57392.2022.00035"},{"key":"1114_CR146","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.comcom.2021.11.003","volume":"182","author":"A El Kamel","year":"2022","unstructured":"El Kamel, A., Eltaief, H., Youssef, H.: On-the-fly (D) DoS attack mitigation in SDN using deep neural network-based rate limiting. Comput. Commun. 182, 153\u2013169 (2022). https:\/\/doi.org\/10.1016\/j.comcom.2021.11.003","journal-title":"Comput. Commun."},{"key":"1114_CR147","doi-asserted-by":"publisher","first-page":"e4534","DOI":"10.1002\/ett.4534","volume":"33","author":"N Aslam","year":"2022","unstructured":"Aslam, N., Srivastava, S., Gore, M.: ONOS flood defender: an intelligent approach to mitigate DDoS attack in SDN. Trans. Emerg. Telecommun. Technol. 33, e4534 (2022). https:\/\/doi.org\/10.1002\/ett.4534","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"1114_CR148","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-021-09633-5","volume":"30","author":"F Musumeci","year":"2022","unstructured":"Musumeci, F., Fidanci, A.C., Paolucci, F., Cugini, F., Tornatore, M.: Machine-learning-enabled DDoS attacks detection in p4 programmable networks. J. Netw. Syst. Manag. 30, 1\u201327 (2022). https:\/\/doi.org\/10.1007\/s10922-021-09633-5","journal-title":"J. Netw. Syst. Manag."},{"key":"1114_CR149","doi-asserted-by":"publisher","first-page":"2836","DOI":"10.11591\/eei.v11i5.4155","volume":"11","author":"AJ Altamemi","year":"2022","unstructured":"Altamemi, A.J., Abdulhassan, A., Obeis, N.T.: DDoS attack detection in software defined networking controller using machine learning techniques. Bull. Electr. Eng. Inform. 11, 2836\u20132844 (2022). https:\/\/doi.org\/10.11591\/eei.v11i5.4155","journal-title":"Bull. Electr. Eng. Inform."},{"key":"1114_CR150","doi-asserted-by":"publisher","first-page":"101176","DOI":"10.1016\/j.jestch.2022.101176","volume":"35","author":"S Wang","year":"2022","unstructured":"Wang, S., Balarezo, J.F., Chavez, K.G., Al-Hourani, A., Kandeepan, S., Asghar, M.R., et al.: Detecting flooding DDoS attacks in software defined networks using supervised learning techniques. Eng. Sci. Technol. Int. J. 35, 101176 (2022). https:\/\/doi.org\/10.1016\/j.jestch.2022.101176","journal-title":"Eng. Sci. Technol. Int. J."},{"key":"1114_CR151","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/1169035","volume":"2022","author":"M Akbari Kohnehshahri","year":"2022","unstructured":"Akbari Kohnehshahri, M., Mohammadi, R., Abdoli, H., Nassiri, M.: An efficient method for online detection of DRDoS attacks on UDP-based services in SDN using machine learning algorithms. Mob. Inf. Syst. 2022, 1\u201313 (2022). https:\/\/doi.org\/10.1155\/2022\/1169035","journal-title":"Mob. Inf. Syst."},{"key":"1114_CR152","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.comcom.2021.12.009","volume":"184","author":"U Ahmed","year":"2022","unstructured":"Ahmed, U., Lin, J.C.-W., Srivastava, G.: A resource allocation deep active learning based on load balancer for network intrusion detection in SDN sensors. Comput. Commun. 184, 56\u201363 (2022). https:\/\/doi.org\/10.1016\/j.comcom.2021.12.009","journal-title":"Comput. Commun."},{"key":"1114_CR153","doi-asserted-by":"publisher","unstructured":"Isa, M.M., Mhamdi, L.: Hybrid deep autoencoder with random forest in native SDN intrusion detection environment. In: ICC 2022-IEEE International Conference on Communications, pp. 1698\u20131703 (2022). https:\/\/doi.org\/10.1109\/ICC45855.2022.9838282","DOI":"10.1109\/ICC45855.2022.9838282"},{"key":"1114_CR154","doi-asserted-by":"crossref","unstructured":"Hadi, M.R., Mohammed, A.S.: A novel approach to network intrusion detection system using deep learning for SDN: futuristic approach. arXiv preprint arXiv:2208.02094 (2022)","DOI":"10.2139\/ssrn.4160050"},{"key":"1114_CR155","doi-asserted-by":"publisher","first-page":"3931","DOI":"10.1007\/s11042-022-13440-8","volume":"82","author":"RP Nayak","year":"2023","unstructured":"Nayak, R.P., Sethi, S., Bhoi, S.K., Sahoo, K.S., Nayyar, A.: Ml-MDS: machine learning based misbehavior detection system for cognitive software-defined multimedia vanets (CSDMV) in smart cities. Multimedia Tools Appl. 82, 3931\u20133951 (2023). https:\/\/doi.org\/10.1007\/s11042-022-13440-8","journal-title":"Multimedia Tools Appl."},{"key":"1114_CR156","doi-asserted-by":"publisher","unstructured":"Das, T., Shukla, R., Sengupta, S.: Poisoning the well: adversarial poisoning on ML-based software-defined network intrusion detection systems. Authorea Preprints (2023). https:\/\/doi.org\/10.36227\/techrxiv.21664031.v1","DOI":"10.36227\/techrxiv.21664031.v1"},{"key":"1114_CR157","doi-asserted-by":"publisher","first-page":"867","DOI":"10.32604\/iasc.2023.026769","volume":"35","author":"G Logeswari","year":"2023","unstructured":"Logeswari, G., Bose, S., Anitha, T.: An intrusion detection system for SDN using machine learning. Intell. Autom. Soft Comput. 35, 867\u2013880 (2023). https:\/\/doi.org\/10.32604\/iasc.2023.026769","journal-title":"Intell. Autom. Soft Comput."},{"key":"1114_CR158","doi-asserted-by":"publisher","unstructured":"Sahbi, A., Jaidi, F., Bouhoula, A.: Machine learning algorithms for enhancing intrusion detection within SDN\/NFV. In: International Wireless Communications and Mobile Computing (IWCMC), pp. 602\u2013607 (2023). https:\/\/doi.org\/10.1109\/IWCMC58020.2023.10183024","DOI":"10.1109\/IWCMC58020.2023.10183024"},{"key":"1114_CR159","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3266826","author":"LM Halman","year":"2023","unstructured":"Halman, L.M., Alenazi, M.J.: MCAD: a machine learning based cyberattacks detector in Software-Defined Networking (SDN) for healthcare systems. IEEE Access (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3266826","journal-title":"IEEE Access"},{"key":"1114_CR160","doi-asserted-by":"publisher","first-page":"9488","DOI":"10.3390\/app13179488","volume":"13","author":"K-M Ko","year":"2023","unstructured":"Ko, K.-M., Baek, J.-M., Seo, B.-S., Lee, W.-B.: Comparative study of AI-enabled DDoS detection technologies in SDN. Appl. Sci. 13, 9488 (2023). https:\/\/doi.org\/10.3390\/app13179488","journal-title":"Appl. Sci."},{"key":"1114_CR161","doi-asserted-by":"publisher","first-page":"103462","DOI":"10.1016\/j.cose.2023.103462","volume":"134","author":"MA Ribeiro","year":"2023","unstructured":"Ribeiro, M.A., Fonseca, M.S.P., de Santi, J.: Detecting and mitigating DDoS attacks with moving target defense approach based on automated flow classification in SDN networks. Comput. Secur. 134, 103462 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103462","journal-title":"Comput. Secur."},{"key":"1114_CR162","doi-asserted-by":"publisher","first-page":"1797","DOI":"10.11591\/eei.v12i3.5232","volume":"12","author":"P Karthika","year":"2023","unstructured":"Karthika, P., Arockiasamy, K.: Simulation of SDN in mininet and detection of DDoS attack using machine learning. Bull. Electr. Eng. Inform. 12, 1797\u20131805 (2023). https:\/\/doi.org\/10.11591\/eei.v12i3.5232","journal-title":"Bull. Electr. Eng. Inform."},{"key":"1114_CR163","doi-asserted-by":"publisher","DOI":"10.1109\/WiSEE49342.2022.9926943","author":"R Uddin","year":"2023","unstructured":"Uddin, R., Kumar, S.: SDN-based federated learning approach for satellite-IoT framework to enhance data security and privacy in space communication. IEEE J. Radio Freq. Identif. (2023). https:\/\/doi.org\/10.1109\/WiSEE49342.2022.9926943","journal-title":"IEEE J. Radio Freq. Identif."},{"key":"1114_CR164","doi-asserted-by":"publisher","unstructured":"Kurakula, A.K., Akhila, K., Bhavya, M., Sai, M.V.: Detecting distributed DoS attacks on SDN using machine learning (ML) methods. In: International Conference on Innovative Data Communication Technologies and Application (ICIDCA), pp. 767\u2013772 (2023). https:\/\/doi.org\/10.1109\/ICIDCA56705.2023.10099680","DOI":"10.1109\/ICIDCA56705.2023.10099680"},{"key":"1114_CR165","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/s10207-022-00641-3","volume":"22","author":"R Mohammadi","year":"2023","unstructured":"Mohammadi, R., Lal, C., Conti, M.: HTTPScout: a machine learning based countermeasure for HTTP flood attacks in SDN. Int. J. Inf. Secur. 22, 367\u2013379 (2023). https:\/\/doi.org\/10.1007\/s10207-022-00641-3","journal-title":"Int. J. Inf. Secur."},{"key":"1114_CR166","doi-asserted-by":"publisher","unstructured":"Mustafa, O., Ali, K., Naqash, T.: C-RADAR: a centralized deep learning system for intrusion detection in software defined networks. In: International Conference on Communication, Computing and Digital Systems (C-CODE), pp. 1\u20136 (2023). https:\/\/doi.org\/10.1109\/C-CODE58145.2023.10139892","DOI":"10.1109\/C-CODE58145.2023.10139892"},{"key":"1114_CR167","doi-asserted-by":"publisher","first-page":"3033","DOI":"10.3390\/app13053033","volume":"13","author":"TE Ali","year":"2023","unstructured":"Ali, T.E., Chong, Y.-W., Manickam, S.: Comparison of ML\/DL approaches for detecting DDoS attacks in SDN. Appl. Sci. 13, 3033 (2023). https:\/\/doi.org\/10.3390\/app13053033","journal-title":"Appl. Sci."},{"issue":"4","key":"1114_CR168","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.1109\/TNSE.2023.3237367","volume":"10","author":"ZAE Houda","year":"2023","unstructured":"Houda, Z.A.E., Hafid, A.S., Khoukhi, L.: MiTFed: a privacy preserving collaborative network attack mitigation framework based on federated learning using SDN and blockchain. IEEE Trans. Netw. Sci. Eng. 10(4), 1985\u20132001 (2023). https:\/\/doi.org\/10.1109\/TNSE.2023.3237367","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"1114_CR169","doi-asserted-by":"publisher","first-page":"103472","DOI":"10.1016\/j.jisa.2023.103472","volume":"74","author":"PT Duy","year":"2023","unstructured":"Duy, P.T., Khoa, N.H., Do Hoang, H., Pham, V.-H.: Investigating on the robustness of flow-based intrusion detection system against adversarial samples using Generative Adversarial Networks. J. Inf. Secur. Appl. 74, 103472 (2023). https:\/\/doi.org\/10.1016\/j.jisa.2023.103472","journal-title":"J. Inf. Secur. Appl."},{"key":"1114_CR170","doi-asserted-by":"publisher","first-page":"107757","DOI":"10.1016\/j.compeleceng.2022.107757","volume":"99","author":"N Ahuja","year":"2022","unstructured":"Ahuja, N., Singal, G., Mukhopadhyay, D., Nehra, A.: Ascertain the efficient machine learning approach to detect different ARP attacks. Comput. Electr. Eng. 99, 107757 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107757","journal-title":"Comput. Electr. Eng."},{"key":"1114_CR171","doi-asserted-by":"publisher","first-page":"4914","DOI":"10.3390\/app13084914","volume":"13","author":"A Mozo","year":"2023","unstructured":"Mozo, A., Karamchandani, A., de la Cal, L., G\u00f3mez-Canaval, S., Pastor, A., Gifre, L.: A machine-learning-based cyberattack detector for a cloud-based SDN controller. Appl. Sci. 13, 4914 (2023). https:\/\/doi.org\/10.3390\/app13084914","journal-title":"Appl. Sci."},{"key":"1114_CR172","unstructured":"Alqahtani, A.H., Clark, J.A.: Detecting stealthy scans in SDN using a hybrid intrusion detection system (2022)"},{"key":"1114_CR173","doi-asserted-by":"publisher","first-page":"964","DOI":"10.17762\/sfs.v10i4S.1117","volume":"10","author":"R Anusuya","year":"2023","unstructured":"Anusuya, R., Prabhu, M.R., Prathima, C., Kumar, J.A.: Detection of TCP, UDP and ICMP DDOS attacks in SDN Using Machine Learning approach. J. Surv. Fish. Sci. 10, 964\u2013971 (2023). https:\/\/doi.org\/10.17762\/sfs.v10i4S.1117","journal-title":"J. Surv. Fish. Sci."},{"key":"1114_CR174","doi-asserted-by":"publisher","unstructured":"Towhid, M.S., Shahriar, N.: Early detection of intrusion in SDN. In: NOMS 2023\u20132023 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20136 (2023). https:\/\/doi.org\/10.1109\/NOMS56928.2023.10154272","DOI":"10.1109\/NOMS56928.2023.10154272"},{"key":"1114_CR175","doi-asserted-by":"publisher","unstructured":"Shinde, A.R., Bendale, S.P.: Evolution of quantum machine learning and an attempt of its application for SDN intrusion detection. In: Quantum Computing: A Shift from Bits to Qubits. Springer, pp. 437\u2013456 (2023). https:\/\/doi.org\/10.1007\/978-981-19-9530-9_22","DOI":"10.1007\/978-981-19-9530-9_22"},{"key":"1114_CR176","doi-asserted-by":"publisher","first-page":"e7438","DOI":"10.1002\/cpe.7438","volume":"35","author":"AO Alzahrani","year":"2023","unstructured":"Alzahrani, A.O., Alenazi, M.J.: ML-IDSDN: machine learning based intrusion detection system for software-defined network. Concurr. Comput. Pract. Exp. 35, e7438 (2023). https:\/\/doi.org\/10.1002\/cpe.7438","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"1114_CR177","doi-asserted-by":"publisher","first-page":"103438","DOI":"10.1016\/j.cose.2023.103438","volume":"134","author":"C Kumar","year":"2023","unstructured":"Kumar, C., Biswas, S., Ansari, M.S.A., Govil, M.C.: Nature-inspired intrusion detection system for protecting software-defined networks controller. Comput. Secur. 134, 103438 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103438","journal-title":"Comput. Secur."},{"key":"1114_CR178","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.033382","author":"A Almazyad","year":"2023","unstructured":"Almazyad, A., Halman, L., Alsaeed, A.: Probe attack detection using an improved intrusion detection system. Comput. Mater. Contin. (2023). https:\/\/doi.org\/10.32604\/cmc.2023.033382","journal-title":"Comput. Mater. Contin."},{"key":"1114_CR179","doi-asserted-by":"publisher","first-page":"103026","DOI":"10.1016\/j.adhoc.2022.103026","volume":"140","author":"GO Anyanwu","year":"2023","unstructured":"Anyanwu, G.O., Nwakanma, C.I., Lee, J.-M., Kim, D.-S.: RBF-SVM kernel-based model for detecting DDoS attacks in SDN integrated vehicular network. Ad Hoc Netw. 140, 103026 (2023). https:\/\/doi.org\/10.1016\/j.adhoc.2022.103026","journal-title":"Ad Hoc Netw."},{"key":"1114_CR180","doi-asserted-by":"publisher","unstructured":"Puranik, K., Patil, K., Ghaligi, G., Jannu, R., Patil, S., Narayan, D., et al.: A two-level DDoS attack detection using entropy and machine learning in SDN. In: 2023 3rd International Conference on Intelligent Technologies (CONIT), pp. 1\u20137 (2023). https:\/\/doi.org\/10.1109\/CONIT59222.2023.10205776","DOI":"10.1109\/CONIT59222.2023.10205776"},{"key":"1114_CR181","doi-asserted-by":"publisher","unstructured":"Roy, B., Acharya, I., Papalkar, D., Joseph, M.: Top-performing unifying architecture for network intrusion detection in SDN using fully convolutional network. In: 5th International Conference on Inventive Research in Computing Applications (ICIRCA), pp. 1340\u20131344 (2023). https:\/\/doi.org\/10.1109\/ICIRCA57980.2023.10220608","DOI":"10.1109\/ICIRCA57980.2023.10220608"},{"key":"1114_CR182","doi-asserted-by":"publisher","first-page":"8021","DOI":"10.1002\/cpe.8021","volume":"36","author":"MJ Santos-Neto","year":"2024","unstructured":"Santos-Neto, M.J., Bordim, J.L., Alchieri, E.A., Ishikawa, E.: DDoS attack detection in SDN: enhancing entropy-based detection with machine learning. Concurr. Comput. Pract. Exp. 36, 8021 (2024). https:\/\/doi.org\/10.1002\/cpe.8021","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"1114_CR183","doi-asserted-by":"publisher","unstructured":"Dandotiya, M., Makwana, R.R.S.: DDoS attack detection and mitigation in SDN environment: a deep learning perspective. In: IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI), pp. 1\u20136 (2024). https:\/\/doi.org\/10.1109\/IATMSI60426.2024.10502843","DOI":"10.1109\/IATMSI60426.2024.10502843"},{"key":"1114_CR184","doi-asserted-by":"publisher","unstructured":"Salatino, F., Spina, M.G., Tropea, M., De Rango, F.: Detecting DDoS attacks through AI driven SDN intrusion detection system. In: IEEE 21st Consumer Communications and Networking Conference (CCNC), pp. 990\u2013993 (2024). https:\/\/doi.org\/10.1109\/CCNC51664.2024.10454798","DOI":"10.1109\/CCNC51664.2024.10454798"},{"key":"1114_CR185","doi-asserted-by":"publisher","first-page":"60568","DOI":"10.1109\/ACCESS.2024.3392279","volume":"12","author":"Zabeehullah","year":"2024","unstructured":"Zabeehullah, et al.: DQQS: deep reinforcement learning-based technique for enhancing security and performance in SDN-IoT environments. IEEE Access 12, 60568\u201360587 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3392279","journal-title":"IEEE Access"},{"key":"1114_CR186","doi-asserted-by":"publisher","unstructured":"Jouilili, A., Hantouti, H., El Ouazzani, R.: Enhancing AI-driven intrusion detection in SDN: exploring the power of dimensionality reduction techniques. In: 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET), pp. 1\u20137 (2024). https:\/\/doi.org\/10.1109\/IRASET60544.2024.10549433","DOI":"10.1109\/IRASET60544.2024.10549433"},{"key":"1114_CR187","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3384398","author":"AA Alashhab","year":"2024","unstructured":"Alashhab, A.A., Zahid, M.S., Isyaku, B., Elnour, A.A., Nagmeldin, W., Abdelmaboud, A., et al.: Enhancing DDoS attack detection and mitigation in SDN using an ensemble online machine learning model. IEEE Access (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3384398","journal-title":"IEEE Access"},{"key":"1114_CR188","doi-asserted-by":"publisher","unstructured":"Raza, M.S., Sheikh, M.N.A., Hwang, I.-S., Ab-Rahman, M.S.: Feature-selection-based DDoS attack detection using AI algorithms. In: Telecom, pp. 333\u2013346 (2024). https:\/\/doi.org\/10.3390\/telecom5020017","DOI":"10.3390\/telecom5020017"},{"key":"1114_CR189","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04477-5","author":"M Cui","year":"2024","unstructured":"Cui, M., Chen, J., Qiu, X., Lv, W., Qin, H., Zhang, X.: Multi-class intrusion detection system in SDN based on hybrid BiLSTM model. Clust. Comput. (2024). https:\/\/doi.org\/10.1007\/s10586-024-04477-5","journal-title":"Clust. Comput."},{"key":"1114_CR190","doi-asserted-by":"publisher","first-page":"948","DOI":"10.26599\/TST.2023.9010032","volume":"29","author":"A Eljialy","year":"2024","unstructured":"Eljialy, A., Uddin, M.Y., Ahmad, S.: Novel framework for an intrusion detection system using multiple feature selection methods based on deep learning. Tsinghua Sci. Technol. 29, 948\u2013958 (2024). https:\/\/doi.org\/10.26599\/TST.2023.9010032","journal-title":"Tsinghua Sci. Technol."},{"key":"1114_CR191","doi-asserted-by":"publisher","unstructured":"Mundstock, I.A., Santo, Y., da Silveira, T.L., Immich, R., Riker, A., Dalmazo, B.L.: On feature selection techniques for detecting DoS attacks with a multi-class classifier (2024). https:\/\/doi.org\/10.20944\/preprints202403.1635.v1","DOI":"10.20944\/preprints202403.1635.v1"},{"key":"1114_CR192","doi-asserted-by":"publisher","unstructured":"Rajkumar, K., Selvaraj, M.S., Stanly, H.: SDN defense: detection and mitigation of DDoS attack via IoT network. In: ICDCN, pp. 371\u2013376 (2024). https:\/\/doi.org\/10.1145\/3631461.3631467","DOI":"10.1145\/3631461.3631467"},{"key":"1114_CR193","doi-asserted-by":"publisher","unstructured":"Vallabhaneni, R., Nagamani, H., Harshitha, P., Sumanth, S.: Team work optimizer based bidirectional LSTM model for designing a secure cybersecurity model. In: 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), pp. 1\u20136 (2024). https:\/\/doi.org\/10.1109\/ICDCOT61034.2024.10515495","DOI":"10.1109\/ICDCOT61034.2024.10515495"},{"key":"1114_CR194","doi-asserted-by":"publisher","unstructured":"Goud, K.S., Rao, G.S.: Towards an efficient DDoS attack detection in SDN: an approach with CNN-GRU fusion. In: 2024 Fourth International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), pp. 1\u201310 (2024). https:\/\/doi.org\/10.1109\/ICAECT60202.2024.10469528","DOI":"10.1109\/ICAECT60202.2024.10469528"},{"key":"1114_CR195","doi-asserted-by":"publisher","first-page":"e337","DOI":"10.1002\/spy2.337","volume":"7","author":"A Dhadhania","year":"2024","unstructured":"Dhadhania, A., Bhatia, J., Mehta, R., Tanwar, S., Sharma, R., Verma, A.: Unleashing the power of SDN and GNN for network anomaly detection: State-of-the-art, challenges, and future directions. Secur. Priv. 7, e337 (2024). https:\/\/doi.org\/10.1002\/spy2.337","journal-title":"Secur. Priv."},{"key":"1114_CR196","doi-asserted-by":"publisher","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","volume":"6","author":"Y Xin","year":"2018","unstructured":"Xin, Y., Kong, L., Liu, Z., et al.: Machine learning and deep learning methods for cybersecurity. IEEE Access 6, 35365\u201335381 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2836950","journal-title":"IEEE Access"},{"key":"1114_CR197","unstructured":"\u201cNSL-KDD Dataset\u201d, Canadian Institute for Cybersecurity. Accessed 16 Apr 2024. https:\/\/www.unb.ca\/cic\/datasets\/nsl.html"},{"key":"1114_CR198","unstructured":"\u201cKDD\u201999 Dataset\u201d, Canadian Institute for Cybersecurity, Accessed 16 Apr 2024. https:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"1114_CR199","unstructured":"Ahuja, N., Singal, G., Mukhopadhyay, D.: DDOS attack SDN Dataset. Mendeley Data, V1; Bennett University, Greater Noida, India (2020)"},{"key":"1114_CR200","doi-asserted-by":"publisher","unstructured":"Sarica, A.K., Angin, P.: A novel SDN dataset for intrusion detection in IoT networks. In: Proceedings 2020 16th International Conference on Network and Service Management (CNSM) (2020). https:\/\/doi.org\/10.23919\/CNSM50824.2020.9269042","DOI":"10.23919\/CNSM50824.2020.9269042"},{"key":"1114_CR201","unstructured":"\u201cInSDN Dataset\u201d, University College Dublin. Accessed 16 Apr 2024. https:\/\/aseados.ucd.ie\/datasets\/SDN\/"},{"key":"1114_CR202","unstructured":"\u201cCICDS2017 Dataset\u201d, Canadian Institute for Cybersecurity, Accessed 16 Apr 2024. https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html"},{"key":"1114_CR203","doi-asserted-by":"publisher","unstructured":"Mueller, S.T., Hoffman, R.R., William, C., et al.: Explanation in human-AI systems: a literature meta-review (2019). https:\/\/doi.org\/10.48550\/arXiv.1902.01876","DOI":"10.48550\/arXiv.1902.01876"},{"key":"1114_CR204","doi-asserted-by":"publisher","unstructured":"Murdoch, W.J., Singh, C., Kumbier, K., Abbasi-Asl, R., Yu, B.: Interpretable machine learning: definitions, methods, and applications (2019). https:\/\/doi.org\/10.48550\/arXiv.1901.04592","DOI":"10.48550\/arXiv.1901.04592"},{"key":"1114_CR205","doi-asserted-by":"publisher","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136 (2015). https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"1","key":"1114_CR206","doi-asserted-by":"publisher","first-page":"55","DOI":"10.3233\/JHS-200630","volume":"26","author":"KM Sudar","year":"2020","unstructured":"Sudar, K.M., Deepalakshmi, P.: A two level security mechanism to detect a DDoS flooding attack in software-defined networks using entropy-based and C4.5 technique. J. High Speed Netw. 26(1), 55\u201376 (2020). https:\/\/doi.org\/10.3233\/JHS-200630","journal-title":"J. High Speed Netw."},{"key":"1114_CR207","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.1007\/s10586-022-03666-4","volume":"26","author":"KM Sudar","year":"2023","unstructured":"Sudar, K.M., Deepalakshmi, P., Singh, A., et al.: TFAD: TCP flooding attack detection in software-defined networking using proxy-based and machine learning-based mechanisms. Clust. Comput. 26, 1461\u20131477 (2023). https:\/\/doi.org\/10.1007\/s10586-022-03666-4","journal-title":"Clust. Comput."}],"updated-by":[{"DOI":"10.1007\/s10207-025-01141-w","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000}}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01114-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01114-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01114-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T01:03:05Z","timestamp":1762218185000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01114-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,15]]},"references-count":207,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1114"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01114-z","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,15]]},"assertion":[{"value":"20 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2025","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original online version of this article was revised:\nthe duplicate names of last two authors have been removed.","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2025","order":8,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":9,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":10,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s10207-025-01141-w","URL":"https:\/\/doi.org\/10.1007\/s10207-025-01141-w","order":11,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"209"}}