{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T02:53:12Z","timestamp":1773197592237,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10586-024-04989-0","type":"journal-article","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T11:47:47Z","timestamp":1745840867000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Advanced SDN-based network security: an ensemble optimized deep learning-based framework for mitigating DDoS attacks with intrusion detection"],"prefix":"10.1007","volume":"28","author":[{"given":"Dandugudum","family":"Mahesh","sequence":"first","affiliation":[]},{"given":"Sampath Kumar","family":"Tallapally","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,28]]},"reference":[{"key":"4989_CR1","doi-asserted-by":"publisher","first-page":"103661","DOI":"10.1016\/j.cose.2023.103661","volume":"138","author":"V Hnamte","year":"2024","unstructured":"Hnamte, V., Najar, A.A., Nhung-Nguyen, H., Hussain, J., Sugali, M.N.: DDoS attack detection and mitigation using deep neural network in SDN environment. Comput. Secur. 138, 103661 (2024)","journal-title":"Comput. Secur."},{"key":"4989_CR2","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.comcom.2024.04.001","volume":"221","author":"UH Garba","year":"2024","unstructured":"Garba, U.H., Toosi, A.N., Pasha, M.F., Khan, S.: SDN-based detection and mitigation of DDoS attacks on smart homes. Comput. Commun. 221, 29\u201341 (2024)","journal-title":"Comput. Commun."},{"issue":"1","key":"4989_CR3","first-page":"23","volume":"14","author":"J Kumar","year":"2023","unstructured":"Kumar, J.: Mitigate volumetric DDoS attacks using machine learning algorithm in SDN-based IoT network environment. Int. J. Adv. Comput. Sci. Appl.Comput. Sci. Appl. 14(1), 23 (2023)","journal-title":"Int. J. Adv. Comput. Sci. Appl.Comput. Sci. Appl."},{"issue":"4","key":"4989_CR4","doi-asserted-by":"publisher","first-page":"11077","DOI":"10.1007\/s11042-023-15725-y","volume":"83","author":"NS Shaji","year":"2024","unstructured":"Shaji, N.S., Muthalagu, R., Pawar, P.M.: SD-IIDS: intelligent intrusion detection system for software-defined networks. Multimed. Tools Appl. 83(4), 11077\u201311109 (2024)","journal-title":"Multimed. Tools Appl."},{"key":"4989_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3384398","volume-title":"Enhancing DDoS attack detection and mitigation in SDN using an ensemble online machine learning model","author":"AA Alashhab","year":"2024","unstructured":"Alashhab, A.A., Zahid, M.S., Isyaku, B., Elnour, A.A., Nagmeldin, W., Abdelmaboud, A., Maiwada, U.: Enhancing DDoS attack detection and mitigation in SDN using an ensemble online machine learning model. IEEE Access, New York (2024)"},{"key":"4989_CR6","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.future.2024.02.015","volume":"156","author":"R Kumar","year":"2024","unstructured":"Kumar, R., Aljuhani, A., Javeed, D., Kumar, P., Islam, S., Islam, A.N.: Digital twins-enabled zero touch network: a smart contract and explainable AI integrated cybersecurity framework. Futur. Gener. Comput. Syst. 156, 191\u2013205 (2024)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"4989_CR7","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1080\/03772063.2022.2142163","volume":"70","author":"J Ramprasath","year":"2024","unstructured":"Ramprasath, J., Krishnaraj, N., Seethalakshmi, V.: Mitigation services on SDN for distributed denial of service and denial of service attacks using machine learning techniques. IETE J. Res. 70(1), 70\u201381 (2024)","journal-title":"IETE J. Res."},{"key":"4989_CR8","volume-title":"DeMi: a solution to detect and mitigate DoS attacks in SDN","author":"LF Eliyan","year":"2023","unstructured":"Eliyan, L.F., Di Pietro, R.: DeMi: a solution to detect and mitigate DoS attacks in SDN. IEEE Access, New York (2023)"},{"issue":"10","key":"4989_CR9","doi-asserted-by":"publisher","first-page":"6045","DOI":"10.3934\/era.2023308","volume":"31","author":"A Prasad","year":"2023","unstructured":"Prasad, A., Chandra, S., Atoum, I., Ahmad, N., Alqahhas, Y.: A collaborative prediction approach to defend against amplified reflection and exploitation attacks. Electron. Res. Arch. 31(10), 6045\u20136070 (2023)","journal-title":"Electron. Res. Arch."},{"issue":"3","key":"4989_CR10","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s10922-023-09741-4","volume":"31","author":"T Linhares","year":"2023","unstructured":"Linhares, T., Patel, A., Barros, A.L., Fernandez, M.: SDNTruth: innovative DDoS detection scheme for software-defined networks (SDN). J. Netw. Syst. Manage. 31(3), 55 (2023)","journal-title":"J. Netw. Syst. Manage."},{"issue":"3","key":"4989_CR11","doi-asserted-by":"publisher","first-page":"3313","DOI":"10.1007\/s13369-023-08016-z","volume":"49","author":"A Prasad","year":"2024","unstructured":"Prasad, A., Chandra, S.: BotDefender: a collaborative defense framework against botnet attacks using network traffic analysis and machine learning. Arab. J. Sci. Eng. 49(3), 3313\u20133329 (2024)","journal-title":"Arab. J. Sci. Eng."},{"key":"4989_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.06.023","author":"D Javeed","year":"2024","unstructured":"Javeed, D., Saeed, M.S., Ahmad, I., Adil, M., Kumar, P., Islam, A.N.: Quantum-empowered federated learning and 6G wireless networks for IoT security: concept, challenges and future directions. Future Gen. Comput. Syst. (2024). https:\/\/doi.org\/10.1016\/j.future.2024.06.023","journal-title":"Future Gen. Comput. Syst."},{"issue":"10","key":"4989_CR13","doi-asserted-by":"publisher","first-page":"102211","DOI":"10.1016\/j.asej.2023.102211","volume":"14","author":"RA Elsayed","year":"2023","unstructured":"Elsayed, R.A., Hamada, R.A., Abdalla, M.I., Elsaid, S.A.: Securing IoT and SDN systems using deep-learning based automatic intrusion detection. Ain Shams Eng. J. 14(10), 102211 (2023)","journal-title":"Ain Shams Eng. J."},{"key":"4989_CR14","doi-asserted-by":"publisher","first-page":"103462","DOI":"10.1016\/j.cose.2023.103462","volume":"134","author":"MA Ribeiro","year":"2023","unstructured":"Ribeiro, M.A., Fonseca, M.S.P., de Santi, J.: Detecting and mitigating DDoS attacks with moving target defense approach based on automated flow classification in SDN networks. Comput. Secur. 134, 103462 (2023)","journal-title":"Comput. Secur."},{"key":"4989_CR15","doi-asserted-by":"publisher","first-page":"37052","DOI":"10.1109\/ACCESS.2023.3266826","volume":"11","author":"LM Halman","year":"2023","unstructured":"Halman, L.M., Alenazi, M.J.: MCAD: a machine learning based cyberattacks detector in software-defined networking (SDN) for healthcare systems. IEEE Access 11, 37052\u201337067 (2023)","journal-title":"IEEE Access"},{"issue":"2","key":"4989_CR16","doi-asserted-by":"publisher","first-page":"e7503","DOI":"10.1002\/cpe.7503","volume":"35","author":"RK Varma","year":"2023","unstructured":"Varma, R.K., P., RR, S., & Vanitha, M.: Enhanced Elman spike neural network based intrusion attack detection in software defined Internet of Things network. Concurr. Comput.: Pract. Exp. 35(2), e7503 (2023)","journal-title":"Concurr. Comput.: Pract. Exp."},{"key":"4989_CR17","doi-asserted-by":"publisher","first-page":"103438","DOI":"10.1016\/j.cose.2023.103438","volume":"134","author":"C Kumar","year":"2023","unstructured":"Kumar, C., Biswas, S., Ansari, M.S.A., Govil, M.C.: Nature-inspired intrusion detection system for protecting software-defined networks controller. Comput. Secur. 134, 103438 (2023)","journal-title":"Comput. Secur."},{"key":"4989_CR18","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.procs.2024.06.007","volume":"238","author":"F Jaraba","year":"2024","unstructured":"Jaraba, F., Mahajan, G., Jani, J., Ipu, R., Butakov, S.: Exploring current solutions against DDoS attacks in SDN environment. Procedia Comput. Sci. 238, 127\u2013134 (2024)","journal-title":"Procedia Comput. Sci."},{"key":"4989_CR19","doi-asserted-by":"publisher","first-page":"108655","DOI":"10.1016\/j.compeleceng.2023.108655","volume":"108","author":"Y Wang","year":"2023","unstructured":"Wang, Y., Wang, X., Ariffin, M.M., Abolfathi, M., Alqhatani, A., Almutairi, L.: Attack detection analysis in software-defined networks using various machine learning method. Comput. Electr. Eng. 108, 108655 (2023)","journal-title":"Comput. Electr. Eng."},{"key":"4989_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2023.3306358","author":"D Tang","year":"2023","unstructured":"Tang, D., Wang, S., Zhang, S., Qin, Z., Liang, W., Xiao, S.: Real-time monitoring and mitigation of SDoS attacks using the SDN and new metrics. IEEE Trans. Cognit. Commun. Netw. (2023). https:\/\/doi.org\/10.1109\/TCCN.2023.3306358","journal-title":"IEEE Trans. Cognit. Commun. Netw."},{"key":"4989_CR21","doi-asserted-by":"publisher","first-page":"107688","DOI":"10.1016\/j.comnet.2020.107688","volume":"184","author":"A Yazdinejadna","year":"2021","unstructured":"Yazdinejadna, A., Parizi, R.M., Dehghantanha, A., Khan, M.S.: A kangaroo-based intrusion detection system on software-defined networks. Comput. Netw. 184, 107688 (2021)","journal-title":"Comput. Netw."},{"key":"4989_CR22","doi-asserted-by":"publisher","first-page":"28934","DOI":"10.1109\/ACCESS.2023.3260256","volume":"11","author":"WI Khedr","year":"2023","unstructured":"Khedr, W.I., Gouda, A.E., Mohamed, E.R.: FMDADM: a multi-layer DDoS attack detection and mitigation framework using machine learning for stateful SDN-based IoT networks. IEEE Access 11, 28934\u201328954 (2023)","journal-title":"IEEE Access"},{"issue":"3","key":"4989_CR23","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/s10922-023-09749-w","volume":"31","author":"M Cherian","year":"2023","unstructured":"Cherian, M., Varma, S.L.: Secure SDN\u2013IoT framework for DDoS attack detection using deep learning and counter based approach. J. Netw. Syst. Manage. 31(3), 54 (2023)","journal-title":"J. Netw. Syst. Manage."},{"key":"4989_CR24","doi-asserted-by":"publisher","first-page":"103716","DOI":"10.1016\/j.cose.2024.103716","volume":"139","author":"AA Najar","year":"2024","unstructured":"Najar, A.A., Naik, S.M.: Cyber-secure SDN: A CNN-based approach for efficient detection and mitigation of DDoS attacks. Comput. Secur. 139, 103716 (2024)","journal-title":"Comput. Secur."},{"key":"4989_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18466-8","author":"P Charanarur","year":"2024","unstructured":"Charanarur, P., Thanh Hung, B., Chakrabarti, P., Siva Shankar, S.: Design optimization-based software-defined networking scheme for detecting and preventing attacks. Multimed. Tools Appl. (2024). https:\/\/doi.org\/10.1007\/s11042-024-18466-8","journal-title":"Multimed. Tools Appl."},{"key":"4989_CR26","doi-asserted-by":"publisher","first-page":"103868","DOI":"10.1016\/j.jnca.2024.103868","volume":"225","author":"L Mhamdi","year":"2024","unstructured":"Mhamdi, L., Isa, M.M.: Securing SDN: hybrid autoencoder-random forest for intrusion detection and attack mitigation. J. Netw. Comput. Appl. 225, 103868 (2024)","journal-title":"J. Netw. Comput. Appl."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04989-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04989-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04989-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T12:29:23Z","timestamp":1757161763000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04989-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,28]]},"references-count":26,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["4989"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04989-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,28]]},"assertion":[{"value":"30 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"This material is the author\u2019s original work, which has yet to be previously published elsewhere. The paper reflects the author\u2019s research and analysis truthfully and completely.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"331"}}