{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T21:36:54Z","timestamp":1775079414699,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s10922-024-09841-9","type":"journal-article","created":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T03:16:43Z","timestamp":1723778203000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Preprocessing-Based Approach for Prompt Intrusion Detection in SDN Networks"],"prefix":"10.1007","volume":"32","author":[{"given":"Madjed","family":"Bencheikh Lehocine","sequence":"first","affiliation":[]},{"given":"Hacene","family":"Belhadef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,16]]},"reference":[{"key":"9841_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114363","volume":"167","author":"X Ren","year":"2021","unstructured":"Ren, X., Gu, H., Wei, W.: Tree-rnn: tree structural recurrent neural network for network traffic classification. Expert Syst. Appl. 167, 114363 (2021)","journal-title":"Expert Syst. Appl."},{"key":"9841_CR2","doi-asserted-by":"publisher","first-page":"107557","DOI":"10.1016\/j.comnet.2020.107557","volume":"181","author":"V Labayen","year":"2020","unstructured":"Labayen, V., Magana, E., Morato, D., Izal, M.: Online classification of user activities using machine learning on network traffic. Comput. Net. 181, 107557 (2020)","journal-title":"Comput. Net."},{"key":"9841_CR3","doi-asserted-by":"crossref","unstructured":"Staden, J., Brown, D.: An evaluation of machine learning methods for classifying bot traffic in software defined networks. In: Proceedings of Third International Conference on Sustainable Expert Systems: ICSES 2022, pp. 979\u2013991 (2023). Springer","DOI":"10.1007\/978-981-19-7874-6_72"},{"issue":"21","key":"9841_CR4","doi-asserted-by":"publisher","first-page":"8434","DOI":"10.3390\/s22218434","volume":"22","author":"Z Latif","year":"2022","unstructured":"Latif, Z., Umer, Q., Lee, C., Sharif, K., Li, F., Biswas, S.: A machine learningbased anomaly prediction service for software-defined networks. Sensors 22(21), 8434 (2022)","journal-title":"Sensors"},{"key":"9841_CR5","doi-asserted-by":"publisher","first-page":"55380","DOI":"10.1109\/ACCESS.2018.2872430","volume":"6","author":"P Wang","year":"2018","unstructured":"Wang, P., Ye, F., Chen, X., Qian, Y.: Datanet: deep learning based encrypted network traffic classification in sdn home gateway. IEEE Access 6, 55380\u201355391 (2018)","journal-title":"IEEE Access"},{"key":"9841_CR6","doi-asserted-by":"publisher","first-page":"45182","DOI":"10.1109\/ACCESS.2019.2908225","volume":"7","author":"Y Zeng","year":"2019","unstructured":"Zeng, Y., Gu, H., Wei, W., Guo, Y.: deep\u2014full\u2014range: a deep learning based network encrypted traffic classification and intrusion detection framework. IEEE Access 7, 45182\u201345190 (2019)","journal-title":"IEEE Access"},{"issue":"3","key":"9841_CR7","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","volume":"24","author":"M Lotfollahi","year":"2020","unstructured":"Lotfollahi, M., Siavoshani, Jafari, et al.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput. 24(3), 1999\u20132012 (2020)","journal-title":"Soft Comput."},{"issue":"9","key":"9841_CR8","doi-asserted-by":"publisher","first-page":"10741","DOI":"10.1007\/s10489-021-03032-8","volume":"52","author":"W Zheng","year":"2022","unstructured":"Zheng, W., Zhong, J., Zhang, Q., Zhao, G.: Mtt: an efficient model for encrypted network traffic classification using multi-task transformer. Appl. Intell. 52(9), 10741\u201310756 (2022)","journal-title":"Appl. Intell."},{"key":"9841_CR9","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s12083-017-0630-0","volume":"12","author":"N Sultana","year":"2019","unstructured":"Sultana, N., Chilamkurti, N., Peng, W., Alhadad, R.: Survey on sdn based network intrusion detection system using machine learning approaches. Peer-to-Peer Net. Appl. 12, 493\u2013501 (2019)","journal-title":"Peer-to-Peer Net. Appl."},{"issue":"20","key":"9841_CR10","doi-asserted-by":"publisher","first-page":"4396","DOI":"10.3390\/app9204396","volume":"9","author":"H Liu","year":"2019","unstructured":"Liu, H., Lang, B.: Machine learning and deep learning methods for intrusion detection systems: a survey. Appl. Sci. 9(20), 4396 (2019)","journal-title":"Appl. Sci."},{"issue":"24","key":"9841_CR11","doi-asserted-by":"publisher","first-page":"5927","DOI":"10.1002\/cpe.5927","volume":"32","author":"R Swami","year":"2020","unstructured":"Swami, R., Dave, M., Ranga, V.: Voting-based intrusion detection framework for securing software-defined networks. Concurrency and Computation: Pract. Exp. 32(24), 5927 (2020)","journal-title":"Concurrency and Computation: Pract. Exp."},{"key":"9841_CR12","doi-asserted-by":"publisher","first-page":"13166","DOI":"10.1007\/s11227-021-03782-9","volume":"77","author":"OE Tayfour","year":"2021","unstructured":"Tayfour, O.E., Marsono, M.N.: Collaborative detection and mitigation of ddos in software-defined networks. J. Supercomput. 77, 13166\u201313190 (2021)","journal-title":"J. Supercomput."},{"key":"9841_CR13","unstructured":"Statista: Software-defined networking (SDN) market size worldwide from 2021 to 2027 (in billion U.S. dollars). https:\/\/www.statista.com\/statistics\/468636\/ global-sdn-market-size\/ (2023)"},{"key":"9841_CR14","doi-asserted-by":"publisher","first-page":"165263","DOI":"10.1109\/ACCESS.2020.3022633","volume":"8","author":"MS Elsayed","year":"2020","unstructured":"Elsayed, M.S., Le-Khac, N.-A., Jurcut, A.D.: Insdn: a novel sdn intrusion dataset. Ieee Access 8, 165263\u2013165284 (2020)","journal-title":"Ieee Access"},{"key":"9841_CR15","doi-asserted-by":"crossref","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M.: Deep learning approach for network intrusion detection in software defined networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 258\u2013263 (2016). IEEE","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"9841_CR16","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136 (2009). Ieee","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"9841_CR17","doi-asserted-by":"crossref","unstructured":"Dey, S.K., Rahman, M.M., Uddin, M.R.: Detection of flow based anomaly in openflow controller: Machine learning approach in software defined networking. In: 2018 4th International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT), pp. 416\u2013421 (2018). IEEE","DOI":"10.1109\/CEEICT.2018.8628105"},{"key":"9841_CR18","doi-asserted-by":"crossref","unstructured":"Said Elsayed, M., Le-Khac, N.-A., Dev, S., Jurcut, A.D.: Network anomaly detection using lstm based autoencoder. In: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp. 37\u201345 (2020)","DOI":"10.1145\/3416013.3426457"},{"key":"9841_CR19","doi-asserted-by":"crossref","unstructured":"Dang, Q.-V.: Intrusion detection in software-defined networks. In: Future Data and Security Engineering: 8th International Conference, FDSE 2021, Virtual Event, November 24\u201326, 2021, Proceedings 8, pp. 356\u2013371 (2021). Springer","DOI":"10.1007\/978-3-030-91387-8_23"},{"key":"9841_CR20","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: Xgboost: A scalable tree boosting system. In: Proceedings of the 22nd Acm Sigkdd International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"9841_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103160","volume":"191","author":"MS ElSayed","year":"2021","unstructured":"ElSayed, M.S., Le-Khac, N.-A., Albahar, M.A., Jurcut, A.: A novel hybrid model for intrusion detection systems in sdns based on cnn and a new regularization technique. J. Netw. Comput. Appl. 191, 103160 (2021)","journal-title":"J. Netw. Comput. Appl."},{"key":"9841_CR22","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136 (2015). IEEE","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"9841_CR23","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018)","journal-title":"ICISSp"},{"issue":"4","key":"9841_CR24","doi-asserted-by":"publisher","first-page":"1862","DOI":"10.1109\/TCCN.2022.3186331","volume":"8","author":"MS El Sayed","year":"2022","unstructured":"El Sayed, M.S., Le-Khac, N.-A., Azer, M.A., Jurcut, A.D.: A flow-based anomaly detection approach with feature selection method against ddos attacks in sdns. IEEE Transactions on Cognitive Commun. Net. 8(4), 1862\u20131880 (2022)","journal-title":"IEEE Transactions on Cognitive Commun. Net."},{"key":"9841_CR25","doi-asserted-by":"crossref","unstructured":"Towhid, M.S., Shahriar, N.: Early detection of intrusion in sdn. In: NOMS 20232023 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20136 (2023). IEEE","DOI":"10.1109\/NOMS56928.2023.10154272"},{"issue":"1","key":"9841_CR26","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.ipm.2013.08.006","volume":"50","author":"AK Uysal","year":"2014","unstructured":"Uysal, A.K., Gunal, S.: The impact of preprocessing on text classification. Inf. Process. Manage. 50(1), 104\u2013112 (2014)","journal-title":"Inf. Process. Manage."},{"key":"9841_CR27","doi-asserted-by":"crossref","unstructured":"Chandrasekar, P., Qian, K.: The impact of data preprocessing on the performance of a naive bayes classifier. In: 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 618\u2013619 (2016). IEEE","DOI":"10.1109\/COMPSAC.2016.205"},{"key":"9841_CR28","doi-asserted-by":"crossref","unstructured":"Yahi, N., Belhadef, H.: Morphosyntactic preprocessing impact on document embedding: An empirical study on semantic similarity. In: Emerging Trends in Intelligent Computing and Informatics: Data Science, Intelligent Information Systems and Smart Computing 4, pp. 118\u2013126 (2020). Springer","DOI":"10.1007\/978-3-030-33582-3_12"},{"issue":"2","key":"9841_CR29","doi-asserted-by":"publisher","first-page":"11","DOI":"10.3390\/data6020011","volume":"6","author":"E Alshdaifat","year":"2021","unstructured":"Alshdaifat, E., Alshdaifat, D., Alsarhan, A., Hussein, F., El-Salhi, S.M.F.S.: The effect of preprocessing techniques, applied to numeric features, on classification algorithms\u2019 performance. Data 6(2), 11 (2021)","journal-title":"Data"},{"key":"9841_CR30","first-page":"18","volume":"9","author":"C Fan","year":"2021","unstructured":"Fan, C., Chen, M., Wang, X., Wang, J., Huang, B.: A review on data preprocessing techniques toward efficient and reliable knowledge discovery from building operational data. Sustain. Energy Syst. Policies, Front. Energy Res. 9, 18 (2021)","journal-title":"Sustain. Energy Syst. Policies, Front. Energy Res."},{"key":"9841_CR31","doi-asserted-by":"publisher","first-page":"132950","DOI":"10.1109\/ACCESS.2020.3010637","volume":"8","author":"Z Bu","year":"2020","unstructured":"Bu, Z., Zhou, B., Cheng, P., Zhang, K., Ling, Z.-H.: Encrypted network traffic classification using deep and parallel network-in-network models. Ieee Access 8, 132950\u2013132959 (2020)","journal-title":"Ieee Access"},{"key":"9841_CR32","doi-asserted-by":"crossref","unstructured":"Ma, Q., Huang, W., Jin, Y., Mao, J.: Encrypted traffic classification based on traffic reconstruction. In: 2021 4th International Conference on Artificial Intelligence and Big Data (ICAIBD), pp. 572\u2013576 (2021). IEEE","DOI":"10.1109\/ICAIBD51990.2021.9459072"},{"key":"9841_CR33","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Zeng, X., Ye, X., Sheng, Y.: Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN), pp. 712\u2013717 (2017). IEEE","DOI":"10.1109\/ICOIN.2017.7899588"},{"issue":"1","key":"9841_CR34","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10922-023-09777-6","volume":"32","author":"SS Reddy","year":"2024","unstructured":"Reddy, S.S., Nishoak, K., Shreya, J., Reddy, Y.V., Venkanna, U.: A p4-based adversarial attack mitigation on machine learning models in data plane devices. J. Netw. Syst. Manage. 32(1), 5 (2024)","journal-title":"J. Netw. Syst. Manage."}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-024-09841-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-024-09841-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-024-09841-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:13:53Z","timestamp":1730301233000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-024-09841-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,16]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["9841"],"URL":"https:\/\/doi.org\/10.1007\/s10922-024-09841-9","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,16]]},"assertion":[{"value":"12 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"79"}}