{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T15:34:16Z","timestamp":1772033656629,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T00:00:00Z","timestamp":1728950400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T00:00:00Z","timestamp":1728950400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"This research was supported by The VNUHCM-University of Information Technology's Scientific Research Support Fund."}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10586-024-04757-0","type":"journal-article","created":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T19:01:43Z","timestamp":1729018903000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["uitSDD: Protect software defined networks from distributed denial-of-service using multi machine learning models"],"prefix":"10.1007","volume":"28","author":[{"given":"Nguyen Tan","family":"Cam","sequence":"first","affiliation":[]},{"given":"Tran Duc","family":"Viet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,15]]},"reference":[{"key":"4757_CR1","unstructured":"TechTarget: Software-Defined Networking (SDN). https:\/\/www.techtarget.com\/searchnetworking\/definition\/software-defined-networking-SDN. Accessed 22 June 2024"},{"key":"4757_CR2","doi-asserted-by":"crossref","unstructured":"Al-Dunainawi, Y., Al-Kaseem, B.R., Al-Raweshidy, H.S.: Optimized artificial intelligence model for DDoS detection in SDN environment. IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3319214"},{"key":"4757_CR3","doi-asserted-by":"crossref","unstructured":"Singh, A., Kaur, H., Kaur, N.: A novel DDoS detection and mitigation technique using hybrid machine learning model and redirect illegitimate traffic in SDN network. Clust. Comput. 1\u201321 (2023)","DOI":"10.1007\/s10586-023-04152-1"},{"key":"4757_CR4","doi-asserted-by":"crossref","unstructured":"Najar, A.A., et al.: Cyber-secure SDN: a CNN-based approach for efficient detection and mitigation of DDoS attacks. Comput. Secur. 103716 (2024)","DOI":"10.1016\/j.cose.2024.103716"},{"key":"4757_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109642","volume":"225","author":"H Zhou","year":"2023","unstructured":"Zhou, H., Zheng, Y., Jia, X., Shu, J.: Collaborative prediction and detection of DDoS attacks in edge computing: a deep learning-based approach with distributed SDN. Comput. Netw. 225, 109642 (2023)","journal-title":"Comput. Netw."},{"issue":"3","key":"4757_CR6","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s10922-023-09741-4","volume":"31","author":"T Linhares","year":"2023","unstructured":"Linhares, T., Patel, A., Barros, A.L., Fernandez, M.: SDNTruth: innovative DDoS detection scheme for software-defined networks (SDN). J. Netw. Syst. Manag. 31(3), 55 (2023)","journal-title":"J. Netw. Syst. Manag."},{"key":"4757_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106432","volume":"123","author":"J Bhayo","year":"2023","unstructured":"Bhayo, J., Shah, S.A., Hameed, S., Ahmed, A., Nasir, J., Draheim, D.: Towards a machine learning-based framework for DDoS attack detection in software-defined IoT (SD-IoT) networks. Eng. Appl. Artif. Intell. 123, 106432 (2023)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"4757_CR8","doi-asserted-by":"crossref","unstructured":"Tang, D., Wang, S., Liu, B., Jin, W., Zhang, J.: GASF-IPP: detection and mitigation of LDoS attack in SDN. IEEE Trans. Serv. Comput. (2023)","DOI":"10.1109\/TSC.2023.3266757"},{"key":"4757_CR9","doi-asserted-by":"crossref","unstructured":"Maddu, M., Rao, Y.N.: Network intrusion detection and mitigation in SDN using deep learning models. Int. J. Inf. Secur. 1\u201314 (2023)","DOI":"10.1007\/s10207-023-00771-2"},{"issue":"2","key":"4757_CR10","doi-asserted-by":"publisher","first-page":"86","DOI":"10.2991\/ijndc.k.200325.001","volume":"8","author":"MM Oo","year":"2020","unstructured":"Oo, M.M., Kamolphiwong, S., Kamolphiwong, T., Vasupongayya, S.: Analysis of features dataset for DDoS detection by using ASVM method on software defined networking. Int. J. Networked Distrib. Comput. 8(2), 86\u201393 (2020)","journal-title":"Int. J. Networked Distrib. Comput."},{"key":"4757_CR11","doi-asserted-by":"crossref","unstructured":"Ayo, F.E., Awotunde, J.B., Ogundele, L.A., Solanke, O.O., Brahma, B., Panigrahi, R., Bhoi, A.K.: Ontology-based layered rule-based network intrusion detection system for cybercrimes detection. Knowl. Inf. Syst. 1\u201338 (2024)","DOI":"10.1007\/s10115-024-02068-9"},{"key":"4757_CR12","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/s10115-018-1306-7","volume":"60","author":"M Lopez-Martin","year":"2019","unstructured":"Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A.: Variational data generative model for intrusion detection. Knowl. Inf. Syst. 60, 569\u2013590 (2019)","journal-title":"Knowl. Inf. Syst."},{"key":"4757_CR13","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/s10115-017-1034-4","volume":"53","author":"I Boukhris","year":"2017","unstructured":"Boukhris, I., Elouedi, Z., Ajabi, M.: Toward intrusion detection using belief decision trees for big data. Knowl. Inf. Syst. 53, 671\u2013698 (2017)","journal-title":"Knowl. Inf. Syst."},{"key":"4757_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103546","volume":"136","author":"A Paya","year":"2024","unstructured":"Paya, A., Arroni, S., Garc\u00eda-D\u00edaz, V., G\u00f3mez, A.: Apollon: a robust defense system against adversarial machine learning attacks in intrusion detection systems. Comput. Secur. 136, 103546 (2024)","journal-title":"Comput. Secur."},{"key":"4757_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108034","volume":"101","author":"O Yousuf","year":"2022","unstructured":"Yousuf, O., Mir, R.N.: DDoS attack detection in internet of things using recurrent neural network. Comput. Electr. Eng. 101, 108034 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"4757_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107995","volume":"101","author":"H Karthikeyan","year":"2022","unstructured":"Karthikeyan, H., Usha, G.: Real-time DDoS flooding attack detection in intelligent transportation systems. Comput. Electr. Eng. 101, 107995 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"4757_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108635","volume":"107","author":"R Mall","year":"2023","unstructured":"Mall, R., Abhishek, K., Manimurugan, S., Shankar, A., Kumar, A.: Stacking ensemble approach for DDoS attack detection in software-defined cyber-physical systems. Comput. Electr. Eng. 107, 108635 (2023)","journal-title":"Comput. Electr. Eng."},{"key":"4757_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108466","volume":"104","author":"H Lin","year":"2022","unstructured":"Lin, H., Wu, C., Masdari, M.: A comprehensive survey of network traffic anomalies and DDoS attacks detection schemes using fuzzy techniques. Comput. Electr. Eng. 104, 108466 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"4757_CR19","doi-asserted-by":"crossref","unstructured":"Kapourchali, R.F., Mohammadi, R., Nassiri, M.: P4httpguard: detection and prevention of slow-rate DDoS attacks using machine learning techniques in p4 switch. Clust. Comput. 1\u201318 (2024)","DOI":"10.1007\/s10586-024-04407-5"},{"key":"4757_CR20","doi-asserted-by":"crossref","unstructured":"Gupta, N., Tanwar, S., Badotra, S.: Performance analysis of ODL and RYU controllers\u2019 against DDoS attack in software defined networks. Clust. Comput. 1\u201321 (2024)","DOI":"10.1007\/s10586-024-04535-y"},{"key":"4757_CR21","doi-asserted-by":"crossref","unstructured":"Cui, M., Chen, J., Qiu, X., Lv, W., Qin, H., Zhang, X.: Multi-class intrusion detection system in SDN based on hybrid BILSTM model. Clust. Comput. 1\u201320 (2024)","DOI":"10.1007\/s10586-024-04477-5"},{"issue":"2","key":"4757_CR22","doi-asserted-by":"publisher","first-page":"876","DOI":"10.1109\/TNSM.2020.2971776","volume":"17","author":"R Doriguzzi-Corin","year":"2020","unstructured":"Doriguzzi-Corin, R., Millar, S., Scott-Hayward, S., Martinez-del-Rincon, J., Siracusa, D.: Lucid: A practical, lightweight deep learning solution for DDoS attack detection. IEEE Trans. Netw. Serv. Manag. 17(2), 876\u2013889 (2020)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"4757_CR23","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.comcom.2015.06.012","volume":"67","author":"P Xiao","year":"2015","unstructured":"Xiao, P., Qu, W., Qi, H., Li, Z.: Detecting DDoS attacks against data center with correlation analysis. Comput. Commun. 67, 66\u201374 (2015)","journal-title":"Comput. Commun."},{"issue":"3","key":"4757_CR24","doi-asserted-by":"publisher","first-page":"2781","DOI":"10.1007\/s11277-022-09685-z","volume":"125","author":"S Singh","year":"2022","unstructured":"Singh, S., Jayakumar, S.: DDoS attack detection in SDN: optimized deep convolutional neural network with optimal feature set. Wireless Pers. Commun. 125(3), 2781\u20132797 (2022)","journal-title":"Wireless Pers. Commun."},{"key":"4757_CR25","doi-asserted-by":"crossref","unstructured":"Feinstein, L., Schnackenberg, D., Balupari, R., Kindred, D.: Statistical approaches to DDoS attack detection and response. In: Proceedings DARPA information survivability conference and exposition, vol. 1, pp. 303\u2013314. IEEE (2003)","DOI":"10.1109\/DISCEX.2003.1194894"},{"key":"4757_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2023\/9965945","volume":"2023","author":"TG Gebremeskel","year":"2023","unstructured":"Gebremeskel, T.G., Gemeda, K.A., Krishna, T.G., Ramulu, P.J.: DDoS attack detection and classification using hybrid model for multicontroller SDN. Wirel. Commun. Mob. Comput. 2023, 1\u201318 (2023). https:\/\/doi.org\/10.1155\/2023\/9965945","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"4757_CR27","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOM.2013.6553676","volume":"51","author":"S Sezer","year":"2013","unstructured":"Sezer, S., Scott-Hayward, S., Chouhan, P.K., Fraser, B., Lake, D., Finnegan, J., Viljoen, N., Miller, M., Rao, N.: Are we ready for SDN? Implementation challenges for software-defined networks. IEEE Commun. Mag. 51, 36\u201343 (2013). https:\/\/doi.org\/10.1109\/MCOM.2013.6553676","journal-title":"IEEE Commun. Mag."},{"key":"4757_CR28","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.future.2021.03.011","volume":"122","author":"LF Eliyan","year":"2021","unstructured":"Eliyan, L.F., Pietro, R.D.: DoS and DDoS attacks in software defined networks: a survey of existing solutions and research challenges. Future Gener. Comput. Syst. 122, 149\u2013171 (2021). https:\/\/doi.org\/10.1016\/j.future.2021.03.011","journal-title":"Future Gener. Comput. Syst."},{"key":"4757_CR29","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1109\/TNET.2020.2983976","volume":"28","author":"S Gao","year":"2020","unstructured":"Gao, S., Peng, Z., Xiao, B., Member, S., Hu, A., Song, Y., Ren, K.: Detection and mitigation of dos attacks in software defined networks. IEEE\/ACM Trans. Netw. 28, 1419\u20131433 (2020). https:\/\/doi.org\/10.1109\/TNET.2020.2983976","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"4757_CR30","doi-asserted-by":"publisher","unstructured":"Carvalho, R.N., Bordim, J.L., Alchieri, E.A.P.: Entropy-based dos attack identification in SDN. In: IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), pp. 627\u2013634 (2019). https:\/\/doi.org\/10.1109\/IPDPSW.2019.00108","DOI":"10.1109\/IPDPSW.2019.00108"},{"key":"4757_CR31","doi-asserted-by":"publisher","first-page":"82477","DOI":"10.1109\/ACCESS.2023.3301994","volume":"11","author":"LF Eliyan","year":"2023","unstructured":"Eliyan, L.F., Pietro, R.D.: Demi: a solution to detect and mitigate DoS attacks in SDN. IEEE Access 11, 82477\u201382495 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3301994","journal-title":"IEEE Access"},{"key":"4757_CR32","doi-asserted-by":"publisher","first-page":"2383","DOI":"10.1007\/s11227-020-03323-w","volume":"77","author":"A Banitalebi Dehkordi","year":"2021","unstructured":"Banitalebi Dehkordi, A., Soltanaghaei, M., Boroujeni, F.Z.: The DDoS attacks detection through machine learning and statistical methods in SDN. J. Supercomput. 77, 2383\u20132415 (2021)","journal-title":"J. Supercomput."},{"key":"4757_CR33","doi-asserted-by":"publisher","DOI":"10.47839\/ijc.21.3.2691","author":"R Sanjeetha","year":"2022","unstructured":"Sanjeetha, R., Kanavalli, A., Gupta, A., Agarwal, A.P.: Real-time DDoS detection and mitigation in software defined networks using machine learning techniques. Int. J. Comput. (2022). https:\/\/doi.org\/10.47839\/ijc.21.3.2691","journal-title":"Int. J. Comput."},{"key":"4757_CR34","doi-asserted-by":"publisher","unstructured":"Yungaicela-Naula, N.M., Vargas-Rosales, C., P\u00e9rez-D\u00ed\u00adaz, J.A., Carrera, D.F.: A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning. J. Netw. Comput. Appl. 205, 103444 (2022). https:\/\/doi.org\/10.1016\/j.jnca.2022.103444","DOI":"10.1016\/j.jnca.2022.103444"},{"key":"4757_CR35","doi-asserted-by":"publisher","unstructured":"P\u00e9rez-D\u00ed\u00adaz, J.A., Valdovinos, I.A., Choo, K.-K.R., Zhu, D.: Flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning. IEEE Access 8, 99 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3019330","DOI":"10.1109\/ACCESS.2020.3019330"},{"key":"4757_CR36","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.comcom.2015.06.012","volume":"67","author":"P Xiao","year":"2015","unstructured":"Xiao, P., Qu, W., Qi, H., Li, Z.: Detecting DDoS attacks against data centers with correlation analysis. Comput. Commun. 67, 66\u201374 (2015). https:\/\/doi.org\/10.1016\/j.comcom.2015.06.012","journal-title":"Comput. Commun."},{"key":"4757_CR37","doi-asserted-by":"publisher","first-page":"2781","DOI":"10.1007\/s11277-022-09685-z","volume":"125","author":"S Singh","year":"2022","unstructured":"Singh, S., Jayakumar, S.K.V.: DDoS attack detection in SDN: optimized deep convolutional neural network with optimal feature set. Wirel. Pers. Commun. Int. J. 125, 2781\u20132797 (2022). https:\/\/doi.org\/10.1007\/s11277-022-09685-z","journal-title":"Wirel. Pers. Commun. Int. J."},{"key":"4757_CR38","doi-asserted-by":"publisher","unstructured":"Feinstein, Schnackenberg: Statistical approaches to DDoS attack detection and response. In: DARPA Information Survivability Conference and Exposition, vol. 2, pp. 303\u2013314 (2003). https:\/\/doi.org\/10.1109\/DISCEX.2003.1194894","DOI":"10.1109\/DISCEX.2003.1194894"},{"key":"4757_CR39","doi-asserted-by":"publisher","first-page":"9965","DOI":"10.1007\/s13369-021-06484-9","volume":"47","author":"A Prasad","year":"2022","unstructured":"Prasad, A., Chandra, S.: VMFCVD: an optimized framework to combat volumetric DDoS attacks using machine learning. Arab. J. Sci. Eng. 47, 9965\u20139983 (2022). https:\/\/doi.org\/10.1007\/s13369-021-06484-9","journal-title":"Arab. J. Sci. Eng."},{"key":"4757_CR40","doi-asserted-by":"crossref","unstructured":"Gongane, V.U., Munot, M.V., Anuse, A.D.: A survey of explainable AI techniques for detection of fake news and hate speech on social media platforms. J. Comput. Soc. Sci. 1\u201337 (2024)","DOI":"10.1007\/s42001-024-00248-9"},{"key":"4757_CR41","unstructured":"Apache: Apache Kafka. https:\/\/kafka.apache.org\/. Accessed 10 May 2024"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04757-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04757-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04757-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T15:07:28Z","timestamp":1736521648000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04757-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,15]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["4757"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04757-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,15]]},"assertion":[{"value":"29 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"11"}}