{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T11:27:25Z","timestamp":1778153245704,"version":"3.51.4"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T00:00:00Z","timestamp":1726099200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T00:00:00Z","timestamp":1726099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["306397\/2022-6"],"award-info":[{"award-number":["306397\/2022-6"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s10922-024-09867-z","type":"journal-article","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T20:33:06Z","timestamp":1726173186000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Generative Adversarial Network Models for Anomaly Detection in Software-Defined Networks"],"prefix":"10.1007","volume":"32","author":[{"given":"Alexandro Marcelo","family":"Zacaron","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniel Matheus Brand\u00e3o","family":"Lent","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vitor Gabriel","family":"da Silva Ruffo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Luiz Fernando","family":"Carvalho","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"suffix":"Jr.","given":"Mario Lemes","family":"Proen\u00e7a","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,9,12]]},"reference":[{"key":"9867_CR1","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.future.2020.09.006","volume":"115","author":"O Yurekten","year":"2021","unstructured":"Yurekten, O., Demirci, M.: Sdn-based cyber defense: a survey. Futur. Gener. Comput. Syst. 115, 126\u2013149 (2021). https:\/\/doi.org\/10.1016\/j.future.2020.09.006","journal-title":"Futur. Gener. Comput. Syst."},{"key":"9867_CR2","doi-asserted-by":"publisher","unstructured":"Shahriyar, M.M., Saha, G., Bhattacharjee, B., Reaz, R.: Deft: distributed, elastic, and fault-tolerant state management of network functions. In: 2023 19th International Conference on Network and Service Management (CNSM), pp. 1\u20137 (2023). https:\/\/doi.org\/10.23919\/CNSM59352.2023.10327813","DOI":"10.23919\/CNSM59352.2023.10327813"},{"key":"9867_CR3","doi-asserted-by":"publisher","unstructured":"Coelho, B.L., Schaeffer-Filho, A.E.: Crossbal: data and control plane cooperation for efficient and scalable network load balancing. In: 2023 19th International Conference on Network and Service Management (CNSM), pp. 1\u20139 (2023). https:\/\/doi.org\/10.23919\/CNSM59352.2023.10327790","DOI":"10.23919\/CNSM59352.2023.10327790"},{"key":"9867_CR4","doi-asserted-by":"publisher","unstructured":"Chiaro, C., Monaco, D., Sacco, A., Casetti, C., Marchetto, G.: Latency-aware scheduling in the cloud-edge continuum. In: NOMS 2024-2024 IEEE Network Operations and Management Symposium, pp. 1\u20135 (2024). https:\/\/doi.org\/10.1109\/NOMS59830.2024.10575183","DOI":"10.1109\/NOMS59830.2024.10575183"},{"key":"9867_CR5","doi-asserted-by":"publisher","first-page":"2076","DOI":"10.1109\/TIFS.2023.3262121","volume":"18","author":"P Zhang","year":"2023","unstructured":"Zhang, P., He, F., Zhang, H., Hu, J., Huang, X., Wang, J., Yin, X., Zhu, H., Li, Y.: Real-time malicious traffic detection with online isolation forest over sd-wan. IEEE Trans. Inf. Forensics Secur. 18, 2076\u20132090 (2023). https:\/\/doi.org\/10.1109\/TIFS.2023.3262121","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9867_CR6","doi-asserted-by":"publisher","first-page":"100172","DOI":"10.1109\/ACCESS.2020.2997939","volume":"8","author":"GF Scaranti","year":"2020","unstructured":"Scaranti, G.F., Carvalho, L.F., Barbon, S., Proen\u00e7a, M.L.: Artificial immune systems and fuzzy logic to detect flooding attacks in software-defined networks. IEEE Access 8, 100172\u2013100184 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2997939","journal-title":"IEEE Access"},{"issue":"3","key":"9867_CR7","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s10922-023-09741-4","volume":"31","author":"T Linhares","year":"2023","unstructured":"Linhares, T., Patel, A., Barros, A.L., Fernandez, M.: Sdntruth: innovative ddos detection scheme for software-defined networks (sdn). J. Netw. Syst. Manage. 31(3), 55 (2023). https:\/\/doi.org\/10.1007\/s10922-023-09741-4","journal-title":"J. Netw. Syst. Manage."},{"key":"9867_CR8","unstructured":"CloudGoogle. https:\/\/cloud.google.com\/blog\/products\/identity-security\/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps\/. Accessed 12 Oct 2023"},{"key":"9867_CR9","unstructured":"Theverge. https:\/\/www.theverge.com\/2023\/10\/10\/23911186\/ddos-http2-vulnerability-blocked-amazon-aws-cloudflare-google-cloud\/. Accessed 12 Oct 2023"},{"issue":"2","key":"9867_CR10","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s10922-023-09732-5","volume":"31","author":"NH Thanh","year":"2023","unstructured":"Thanh, N.H., Tuan, N.N., Khoa, D.A., Tuan, L.C., Kien, N.T., Dung, N.X., Thu, N.Q., Wamser, F.: On profiling, benchmarking and behavioral analysis of sdn architecture under ddos attacks. J. Netw. Syst. Manage. 31(2), 43 (2023). https:\/\/doi.org\/10.1007\/s10922-023-09732-5","journal-title":"J. Netw. Syst. Manage."},{"key":"9867_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109140","volume":"214","author":"RF Fouladi","year":"2022","unstructured":"Fouladi, R.F., Ermi\u015f, O., Anarim, E.: A ddos attack detection and countermeasure scheme based on dwt and auto-encoder neural network for sdn. Comput. Netw. 214, 109140 (2022). https:\/\/doi.org\/10.1016\/j.comnet.2022.109140","journal-title":"Comput. Netw."},{"key":"9867_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108156","volume":"102","author":"V Ravi","year":"2022","unstructured":"Ravi, V., Chaganti, R., Alazab, M.: Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system. Comput. Electr. Eng. 102, 108156 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108156","journal-title":"Comput. Electr. Eng."},{"key":"9867_CR13","doi-asserted-by":"publisher","first-page":"109850","DOI":"10.1109\/ACCESS.2022.3214974","volume":"10","author":"A Fausto","year":"2022","unstructured":"Fausto, A., Gaggero, G., Patrone, F., Marchese, M.: Reduction of the delays within an intrusion detection system (ids) based on software defined networking (sdn). IEEE Access 10, 109850\u2013109862 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3214974","journal-title":"IEEE Access"},{"key":"9867_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109725","volume":"228","author":"V Quezada","year":"2023","unstructured":"Quezada, V., Astudillo-Salinas, F., Tello-Oquendo, L., Bernal, P.: Real-time bot infection detection system using dns fingerprinting and machine-learning. Comput. Netw. 228, 109725 (2023). https:\/\/doi.org\/10.1016\/j.comnet.2023.109725","journal-title":"Comput. Netw."},{"key":"9867_CR15","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.neunet.2022.12.011","volume":"159","author":"SY Diaba","year":"2023","unstructured":"Diaba, S.Y., Elmusrati, M.: Proposed algorithm for smart grid ddos detection based on deep learning. Neural Netw. 159, 175\u2013184 (2023). https:\/\/doi.org\/10.1016\/j.neunet.2022.12.011","journal-title":"Neural Netw."},{"key":"9867_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103141","volume":"128","author":"WD Xiong","year":"2023","unstructured":"Xiong, W.D., Luo, K.L., Li, R.: Aidtf: adversarial training framework for network intrusion detection. Comput. Secur. 128, 103141 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103141","journal-title":"Comput. Secur."},{"issue":"3","key":"9867_CR17","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/s10922-023-09749-w","volume":"31","author":"SL Cherian","year":"2023","unstructured":"Cherian, S.L.: Mimiand Varma: Secure sdn-iot framework for ddos attack detection using deep learning and counter based approach. J. Netw. Syst. Manage. 31(3), 54 (2023). https:\/\/doi.org\/10.1007\/s10922-023-09749-w","journal-title":"J. Netw. Syst. Manage."},{"key":"9867_CR18","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.future.2021.06.047","volume":"125","author":"MP Novaes","year":"2021","unstructured":"Novaes, M.P., Carvalho, L.F., Lloret, J., Proen\u00e7a, M.L.: Adversarial deep learning approach detection and defense against ddos attacks in sdn environments. Futur. Gener. Comput. Syst. 125, 156\u2013167 (2021). https:\/\/doi.org\/10.1016\/j.future.2021.06.047","journal-title":"Futur. Gener. Comput. Syst."},{"key":"9867_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103117","volume":"127","author":"A Mustapha","year":"2023","unstructured":"Mustapha, A., Khatoun, R., Zeadally, S., Chbib, F., Fadlallah, A., Fahs, W., El Attar, A.: Detecting ddos attacks using adversarial neural network. Comput. Secur. 127, 103117 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103117","journal-title":"Comput. Secur."},{"key":"9867_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103098","volume":"127","author":"N Rust-Nguyen","year":"2023","unstructured":"Rust-Nguyen, N., Sharma, S., Stamp, M.: Darknet traffic classification and adversarial attacks using machine learning. Comput. Secur. 127, 103098 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103098","journal-title":"Comput. Secur."},{"key":"9867_CR21","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems, vol. 27. Curran Associates, Inc., Cambridge, MA (2014). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2014\/file\/5ca3e9b122f61f8f06494c97b1afccf3-Paper.pdf"},{"key":"9867_CR22","unstructured":"Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. In: Bengio, Y., LeCun, Y. (eds.) 4th International Conference on Learning Representations, ICLR 2016, San Juan, Puerto Rico, May 2\u20134, 2016, Conference Track Proceedings (2016)"},{"key":"9867_CR23","unstructured":"Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., Courville, A.: Improved training of Wasserstein Gans. In: Proceedings of the 31st International Conference on Neural Information Processing Systems. NIPS\u201917, pp. 5769\u20135779. Curran Associates Inc., Red Hook, NY (2017)"},{"key":"9867_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107597","volume":"184","author":"X Zhang","year":"2021","unstructured":"Zhang, X., Cui, L., Wei, K., Tso, F.P., Ji, Y., Jia, W.: A survey on stateful data plane in software defined networks. Comput. Netw. 184, 107597 (2021). https:\/\/doi.org\/10.1016\/j.comnet.2020.107597","journal-title":"Comput. Netw."},{"key":"9867_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103652","volume":"139","author":"AA Wabi","year":"2024","unstructured":"Wabi, A.A., Idris, I., Olaniyi, O.M., Ojeniyi, J.A.: Ddos attack detection in sdn: method of attacks, detection techniques, challenges and research gaps. Comput. Secur. 139, 103652 (2024). https:\/\/doi.org\/10.1016\/j.cose.2023.103652","journal-title":"Comput. Secur."},{"key":"9867_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.103868","author":"L Mhamdi","year":"2024","unstructured":"Mhamdi, L., Isa, M.M.: Securing sdn: hybrid autoencoder-random forest for intrusion detection and attack mitigation. J. Netw. Comput. Appl. (2024). https:\/\/doi.org\/10.1016\/j.jnca.2024.103868","journal-title":"J. Netw. Comput. Appl."},{"key":"9867_CR27","unstructured":"Openflow SDN standards. https:\/\/opennetworking.org\/software-defined-standards\/specifications\/. Accessed 10 Mar 2023"},{"key":"9867_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103661","volume":"138","author":"V Hnamte","year":"2024","unstructured":"Hnamte, V., Najar, A.A., Nhung-Nguyen, H., Hussain, J., Sugali, M.N.: Ddos attack detection and mitigation using deep neural network in sdn environment. Comput. Secur. 138, 103661 (2024). https:\/\/doi.org\/10.1016\/j.cose.2023.103661","journal-title":"Comput. Secur."},{"key":"9867_CR29","doi-asserted-by":"publisher","unstructured":"Proenca, M.L., Zarpelao, B.B., Mendes, L.S.: Anomaly detection for network servers using digital signature of network segment. In: Advanced Industrial Conference on Telecommunications\/Service Assurance with Partial and Intermittent Resources Conference\/E-Learning on Telecommunications Workshop (AICT\/SAPIR\/ELETE\u201905), pp. 290\u2013295 (2005). https:\/\/doi.org\/10.1109\/AICT.2005.26","DOI":"10.1109\/AICT.2005.26"},{"key":"9867_CR30","doi-asserted-by":"publisher","unstructured":"da Silva Ruffo, V.G., Brand\u00e3o Lent, D.M., Komarchesqui, M., Schiavon, V.F., de Assis, M.V.O., Carvalho, L.F., Proen\u00e7, M.L.: Anomaly and intrusion detection using deep learning for software-defined networks: A survey. Expert Systems with Applications, 124982 (2024) https:\/\/doi.org\/10.1016\/j.eswa.2024.124982","DOI":"10.1016\/j.eswa.2024.124982"},{"key":"9867_CR31","doi-asserted-by":"publisher","first-page":"46820","DOI":"10.1109\/ACCESS.2023.3274577","volume":"11","author":"NM Yungaicela-Naula","year":"2023","unstructured":"Yungaicela-Naula, N.M., Vargas-Rosales, C., Perez-Diaz, J.A., Jacob, E., Martinez-Cagnazzo, C.: Physical assessment of an sdn-based security framework for ddos attack mitigation: introducing the sdn-slowrate-ddos dataset. IEEE Access 11, 46820\u201346831 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3274577","journal-title":"IEEE Access"},{"key":"9867_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2024.100042","volume":"2","author":"CM Nalayai","year":"2024","unstructured":"Nalayai, C.M., Katiravan, J., Geetha, S., Eunaicy, C.: A novel dual optimized ids to detect ddos attack in sdn using hyper tuned rfe and deep grid network. Cyber Secur. Appl. 2, 100042 (2024). https:\/\/doi.org\/10.1016\/j.csa.2024.100042","journal-title":"Cyber Secur. Appl."},{"key":"9867_CR33","doi-asserted-by":"publisher","first-page":"37052","DOI":"10.1109\/ACCESS.2023.3266826","volume":"11","author":"LM Halman","year":"2023","unstructured":"Halman, L.M., Alenazi, M.J.F.: Mcad: A machine learning based cyberattacks detector in software-defined networking (sdn) for healthcare systems. IEEE Access 11, 37052\u201337067 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3266826","journal-title":"IEEE Access"},{"key":"9867_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103096","volume":"127","author":"P Kumari","year":"2023","unstructured":"Kumari, P., Jain, A.K.: A comprehensive study of ddos attacks over iot network and their countermeasures. Comput. Secur. 127, 103096 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103096","journal-title":"Comput. Secur."},{"issue":"4","key":"9867_CR35","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.1109\/TNSE.2023.3237367","volume":"10","author":"ZAE Houda","year":"2023","unstructured":"Houda, Z.A.E., Hafid, A.S., Khoukhi, L.: Mitfed: a privacy preserving collaborative network attack mitigation framework based on federated learning using sdn and blockchain. IEEE Trans. Netw. Sci. Eng. 10(4), 1985\u20132001 (2023). https:\/\/doi.org\/10.1109\/TNSE.2023.3237367","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"9867_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103716","volume":"139","author":"AA Najar","year":"2024","unstructured":"Najar, A.A., Manohar Naik, S.: Cyber-secure sdn: a cnn-based approach for efficient detection and mitigation of ddos attacks. Comput. Secur. 139, 103716 (2024). https:\/\/doi.org\/10.1016\/j.cose.2024.103716","journal-title":"Comput. Secur."},{"key":"9867_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109642","volume":"225","author":"H Zhou","year":"2023","unstructured":"Zhou, H., Zheng, Y., Jia, X., Shu, J.: Collaborative prediction and detection of ddos attacks in edge computing: A deep learning-based approach with distributed sdn. Comput. Netw. 225, 109642 (2023). https:\/\/doi.org\/10.1016\/j.comnet.2023.109642","journal-title":"Comput. Netw."},{"key":"9867_CR38","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3390\/a15120453","volume":"15","author":"B Yang","year":"2022","unstructured":"Yang, B., Arshad, M.H., Zhao, Q.: Packet-level and flow-level network intrusion detection based on reinforcement learning and adversarial training. Algorithms 15, 12 (2022). https:\/\/doi.org\/10.3390\/a15120453","journal-title":"Algorithms"},{"key":"9867_CR39","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1016\/j.future.2023.12.033","volume":"154","author":"J Ma","year":"2024","unstructured":"Ma, J., Su, W., Li, Y., Peng, Y.: Synchronizing ddos detection and mitigation based graph learning with programmable data plane, sdn. Futur. Gener. Comput. Syst. 154, 206\u2013218 (2024). https:\/\/doi.org\/10.1016\/j.future.2023.12.033","journal-title":"Futur. Gener. Comput. Syst."},{"key":"9867_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121199","volume":"235","author":"M Kuntalp","year":"2024","unstructured":"Kuntalp, M., D\u00fczyel, O.: A new method for gan-based data augmentation for classes with distinct clusters. Expert Syst. Appl. 235, 121199 (2024). https:\/\/doi.org\/10.1016\/j.eswa.2023.121199","journal-title":"Expert Syst. Appl."},{"key":"9867_CR41","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1016\/j.neucom.2021.12.093","volume":"493","author":"X Xia","year":"2022","unstructured":"Xia, X., Pan, X., Li, N., He, X., Ma, L., Zhang, X., Ding, N.: Gan-based anomaly detection: a review. Neurocomputing 493, 497\u2013535 (2022). https:\/\/doi.org\/10.1016\/j.neucom.2021.12.093","journal-title":"Neurocomputing"},{"key":"9867_CR42","unstructured":"Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein generative adversarial networks. In: Precup, D., Teh, Y.W. (eds.) Proceedings of the 34th International Conference on Machine Learning. Proceedings of Machine Learning Research, vol. 70, pp. 214\u2013223. PMLR, San Diego, CA, USA (2017). https:\/\/proceedings.mlr.press\/v70\/arjovsky17a.html"},{"key":"9867_CR43","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/3487891","volume":"55","author":"N Aldausari","year":"2022","unstructured":"Aldausari, N., Sowmya, A., Marcus, N., Mohammadi, G.: Video generative adversarial networks: a review. ACM Comput. Surv. 55, 2 (2022). https:\/\/doi.org\/10.1145\/3487891","journal-title":"ACM Comput. Surv."},{"key":"9867_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103733","volume":"139","author":"W Lim","year":"2024","unstructured":"Lim, W., Yong, K.S.C., Lau, B.T., Tan, C.C.L.: Future of generative adversarial networks (gan) for anomaly detection in network security: a review. Comput. Secur. 139, 103733 (2024). https:\/\/doi.org\/10.1016\/j.cose.2024.103733","journal-title":"Comput. Secur."},{"key":"9867_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.108385","volume":"116","author":"J Cao","year":"2022","unstructured":"Cao, J., Ma, J., Huang, D., Yu, P., Wang, J., Zheng, K.: Method to enhance deep learning fault diagnosis by generating adversarial samples. Appl. Soft Comput. 116, 108385 (2022). https:\/\/doi.org\/10.1016\/j.asoc.2021.108385","journal-title":"Appl. Soft Comput."},{"key":"9867_CR46","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1016\/j.neunet.2023.06.033","volume":"165","author":"F Huang","year":"2023","unstructured":"Huang, F., Deng, Y.: Tcgan: Convolutional generative adversarial network for time series classification and clustering. Neural Netw. 165, 868\u2013883 (2023). https:\/\/doi.org\/10.1016\/j.neunet.2023.06.033","journal-title":"Neural Netw."},{"key":"9867_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108149","volume":"194","author":"H Navidan","year":"2021","unstructured":"Navidan, H., Moshiri, P.F., Nabati, M., Shahbazian, R., Ghorashi, S.A., Shah-Mansouri, V., Windridge, D.: Generative adversarial networks (gans) in networking: a comprehensive survey & evaluation. Comput. Netw. 194, 108149 (2021). https:\/\/doi.org\/10.1016\/j.comnet.2021.108149","journal-title":"Comput. Netw."},{"key":"9867_CR48","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/3463475","volume":"54","author":"A Jabbar","year":"2021","unstructured":"Jabbar, A., Li, X., Omar, B.: A survey on generative adversarial networks: variants, applications, and training. ACM Comput. Surv. 54, 8 (2021). https:\/\/doi.org\/10.1145\/3463475","journal-title":"ACM Comput. Surv."},{"key":"9867_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102672","volume":"116","author":"J Lee","year":"2022","unstructured":"Lee, J., Lee, H.: Improving ssh detection model using ipa time and wgan-gp. Comput. Secur. 116, 102672 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102672","journal-title":"Comput. Secur."},{"key":"9867_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103622","volume":"214","author":"W Yao","year":"2023","unstructured":"Yao, W., Shi, H., Zhao, H.: Scalable anomaly-based intrusion detection for secure internet of things using generative adversarial networks in fog environment. J. Netw. Comput. Appl. 214, 103622 (2023). https:\/\/doi.org\/10.1016\/j.jnca.2023.103622","journal-title":"J. Netw. Comput. Appl."},{"key":"9867_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103054","volume":"125","author":"V Kumar","year":"2023","unstructured":"Kumar, V., Sinha, D.: Synthetic attack data generation model applying generative adversarial network for intrusion detection. Comput. Secur. 125, 103054 (2023). https:\/\/doi.org\/10.1016\/j.cose.2022.103054","journal-title":"Comput. Secur."},{"key":"9867_CR52","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.neucom.2023.03.056","volume":"537","author":"M Adiban","year":"2023","unstructured":"Adiban, M., Siniscalchi, S.M., Salvi, G.: A step-by-step training method for multi generator gans with application to anomaly detection and cybersecurity. Neurocomputing 537, 296\u2013308 (2023). https:\/\/doi.org\/10.1016\/j.neucom.2023.03.056","journal-title":"Neurocomputing"},{"key":"9867_CR53","doi-asserted-by":"publisher","unstructured":"Girish, L., Rao, S.K., Renukananda, T., Vidyashree, K., Hemashree, R.: Dadgan: Ddos anomaly detection using generative adversarial network. In: 2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), pp. 1\u20137 (2021). https:\/\/doi.org\/10.1109\/CSITSS54238.2021.9683282","DOI":"10.1109\/CSITSS54238.2021.9683282"},{"key":"9867_CR54","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.arcontrol.2021.10.002","volume":"53","author":"M Katzef","year":"2022","unstructured":"Katzef, M., Cullen, A.C., Alpcan, T., Leckie, C.: Generative adversarial networks for anomaly detection on decentralised data. Annu. Rev. Control. 53, 329\u2013337 (2022). https:\/\/doi.org\/10.1016\/j.arcontrol.2021.10.002","journal-title":"Annu. Rev. Control."},{"key":"9867_CR55","doi-asserted-by":"publisher","unstructured":"Sharafaldin, I., Lashkari, A.H., Hakak, S., Ghorbani, A.A.: Developing realistic distributed denial of service (ddos) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20138 (2019). https:\/\/doi.org\/10.1109\/CCST.2019.8888419","DOI":"10.1109\/CCST.2019.8888419"},{"issue":"3","key":"9867_CR56","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379\u2013423 (1948). https:\/\/doi.org\/10.1002\/j.1538-7305.1948.tb01338.x","journal-title":"Bell Syst. Tech. J."},{"issue":"2","key":"9867_CR57","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s10922-024-09813-z","volume":"32","author":"KC Santos","year":"2024","unstructured":"Santos, K.C., Miani, R.S., Oliveira Silva, F.: Evaluating the impact of data preprocessing techniques on the performance of intrusion detection systems. J. Netw. Syst. Manage. 32(2), 36 (2024). https:\/\/doi.org\/10.1007\/s10922-024-09813-z","journal-title":"J. Netw. Syst. Manage."},{"key":"9867_CR58","doi-asserted-by":"publisher","unstructured":"Brand\u00e3o Lent, D.M., Silva Ruffo, V.G., Carvalho, L.F., Lloret, J., Rodrigues, J.J.P.C., Lemes\u00a0Proen\u00e7a, M.: An unsupervised generative adversarial network system to detect ddos attacks in sdn. IEEE Access 12, 70690\u201370706 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3402069","DOI":"10.1109\/ACCESS.2024.3402069"},{"key":"9867_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102748","volume":"118","author":"D Akgun","year":"2022","unstructured":"Akgun, D., Hizal, S., Cavusoglu, U.: A new ddos attacks intrusion detection model based on deep learning for cybersecurity. Comput. Secur. 118, 102748 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102748","journal-title":"Comput. Secur."},{"key":"9867_CR60","unstructured":"Datasets used in publications - Orion Research Group. http:\/\/www.uel.br\/grupos\/orion\/datasets.html. Accessed 26 May 2023"},{"key":"9867_CR61","unstructured":"Mininet. http:\/\/mininet.org\/overview\/. Accessed 10 Mar 2023"},{"key":"9867_CR62","unstructured":"P4. https:\/\/p4.org\/. Accessed 10 Jun 2023"},{"key":"9867_CR63","unstructured":"Floodlight. https:\/\/floodlight.atlassian.net\/wiki\/spaces\/floodlightcontroller\/overview. Accessed 20 Mar 2023"},{"key":"9867_CR64","unstructured":"Scapy - Packet crafting for Python2 and Python3. https:\/\/scapy.net. Accessed 10 Mar 2023"},{"key":"9867_CR65","unstructured":"Hping3 - command-line oriented TCP\/IP packet assembler\/analyzer. http:\/\/hping.org. Accessed 10 Mar 2023"},{"key":"9867_CR66","unstructured":"CICFlowMeter-V3. https:\/\/www.unb.ca\/cic\/research\/applications.html#CICFlowMeter. Accessed 22 Aug 2023"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-024-09867-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-024-09867-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-024-09867-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:18:07Z","timestamp":1730301487000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-024-09867-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,12]]},"references-count":66,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["9867"],"URL":"https:\/\/doi.org\/10.1007\/s10922-024-09867-z","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,12]]},"assertion":[{"value":"26 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"93"}}