{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T19:03:42Z","timestamp":1773342222648,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s11036-025-02475-4","type":"journal-article","created":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T06:48:05Z","timestamp":1763534885000},"page":"508-527","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mitigating DDoS Attacks in Private 5G Networks Using Deep Learning"],"prefix":"10.1007","volume":"30","author":[{"given":"Chien-Liang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yin-Jing","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Chun-Hsien","family":"Sung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,19]]},"reference":[{"issue":"7","key":"2475_CR1","doi-asserted-by":"publisher","first-page":"4276","DOI":"10.1109\/TII.2019.2908210","volume":"15","author":"C-C Lin","year":"2019","unstructured":"Lin C-C, Deng D-J, Chih Y-L, Chiu H-T (2019) Smart manufacturing scheduling with edge computing using multiclass deep q network. IEEE Trans Industr Inf 15(7):4276\u20134284","journal-title":"IEEE Trans Industr Inf"},{"key":"2475_CR2","doi-asserted-by":"publisher","first-page":"127639","DOI":"10.1109\/ACCESS.2019.2939938","volume":"7","author":"A Ghosh","year":"2019","unstructured":"Ghosh A, Maeder A, Baker M, Chandramouli D (2019) 5g evolution: A view on 5g cellular technology beyond 3g pp release 15. IEEE Access 7:127639\u2013127651","journal-title":"IEEE Access"},{"key":"2475_CR3","doi-asserted-by":"publisher","first-page":"42828","DOI":"10.1109\/ACCESS.2020.2977406","volume":"8","author":"S Henry","year":"2020","unstructured":"Henry S, Alsohaily A, Sousa ES (2020) 5g is real: Evaluating the compliance of the 3g pp 5g new radio system with the itu imt-2020 requirements. IEEE Access 8:42828\u201342840","journal-title":"IEEE Access"},{"key":"2475_CR4","doi-asserted-by":"publisher","first-page":"23022","DOI":"10.1109\/ACCESS.2020.2970118","volume":"8","author":"K Shafique","year":"2020","unstructured":"Shafique K, Khawaja BA, Sabir F, Qazi S, Mustaqim M (2020) Internet of things (iot) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5g-iot scenarios. IEEE Access 8:23022\u201323040","journal-title":"IEEE Access"},{"key":"2475_CR5","doi-asserted-by":"publisher","first-page":"1581","DOI":"10.1109\/ACCESS.2015.2477299","volume":"3","author":"TN Pham","year":"2015","unstructured":"Pham TN, Tsai M-F, Nguyen DB, Dow C-R, Deng D-J (2015) A cloud-based smart-parking system based on internet-of-things technologies. IEEE Access 3:1581\u20131591","journal-title":"IEEE Access"},{"key":"2475_CR6","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","volume":"22","author":"R Khan","year":"2019","unstructured":"Khan R, Kumar P, Jayakody DNK, Liyanage M (2019) A survey on security and privacy of 5g technologies: Potential solutions, recent advancements, and future directions. IEEE Communications Surveys & Tutorials 22:196\u2013248","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"2475_CR7","unstructured":"Radware (2022) Radware Full Year 2022 Report: Malicious DDoS Attacks Rise 150%. https:\/\/www.radware.com\/newsevents\/pressreleases\/2023\/radware-full-year-2022-report-malicious-ddos-attacks\/"},{"key":"2475_CR8","unstructured":"MikePT (2016) Dyn.com Attack Analysis (21st October). https:\/\/lowendtalk.com\/discussion\/95204\/dyn-com-attack-analysis-21st-october"},{"key":"2475_CR9","unstructured":"Newman LH (2018) A 1.3-Tbs DDoS Hit GitHub, the Largest Yet Recorded. https:\/\/www.wired.com\/story\/github-ddos-memcached\/"},{"key":"2475_CR10","unstructured":"Cimpanu C (2020) Google says it mitigated a 2.54 Tbps DDoS attack in 2017, largest known to date. https:\/\/www.zdnet.com\/article\/google-says-it-mitigated-a-2-54-tbps-ddos-attack-in-2017-largest-known-to-date\/"},{"key":"2475_CR11","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MIC.2006.5","volume":"10","author":"G Carl","year":"2006","unstructured":"Carl G, Kesidis G, Brooks RR, Rai S (2006) Denial-of-service attack-detection techniques. IEEE Internet Comput 10:82\u201389","journal-title":"IEEE Internet Comput"},{"key":"2475_CR12","doi-asserted-by":"crossref","unstructured":"Basu S, Bardhan A, Gupta K, Saha P, Pal M, Bose M, Basu K, Chaudhury S, Sarkar P (2018) Cloud computing security challenges & solutions-a survey. 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), 347\u2013356","DOI":"10.1109\/CCWC.2018.8301700"},{"key":"2475_CR13","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCOM.2002.1039856","volume":"40","author":"RKC Chang","year":"2002","unstructured":"Chang RKC (2002) Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun Mag 40:42\u201351","journal-title":"IEEE Commun Mag"},{"key":"2475_CR14","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar ST, Joshi J, Tipper D (2013) A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks. IEEE Communications Surveys & Tutorials 15:2046\u20132069","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"2475_CR15","first-page":"1","volume":"2017","author":"X Yuan","year":"2017","unstructured":"Yuan X, Li C, Li X (2017) Deepdefense: Identifying ddos attack via deep learning. IEEE International Conference on Smart Computing (SMARTCOMP) 2017:1\u20138","journal-title":"IEEE International Conference on Smart Computing (SMARTCOMP)"},{"key":"2475_CR16","doi-asserted-by":"crossref","unstructured":"Kr\u00fcgel C, Toth T, Kirda E (2002) Service specific anomaly detection for network intrusion detection","DOI":"10.1145\/508832.508835"},{"key":"2475_CR17","doi-asserted-by":"crossref","unstructured":"Li K, Zhou W, Li P, Hai J, Liu J (2009) Distinguishing ddos attacks from flash crowds using probability metrics, 9\u201317","DOI":"10.1109\/NSS.2009.35"},{"key":"2475_CR18","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.comcom.2017.05.015","volume":"110","author":"N Hoque","year":"2017","unstructured":"Hoque N, Kashyap H, Bhattacharyya DK (2017) Real-time ddos attack detection using fpga. Comput Commun 110:48\u201358","journal-title":"Comput Commun"},{"key":"2475_CR19","doi-asserted-by":"crossref","unstructured":"Jalil KA, Kamarudin MH, Masrek MN (2010) Comparison of machine learning algorithms performance in detecting network intrusion. In: 2010 International Conference on Networking and Information Technology, pp. 221\u2013226","DOI":"10.1109\/ICNIT.2010.5508526"},{"key":"2475_CR20","doi-asserted-by":"crossref","unstructured":"Braga R, Mota E, Passito A (2010) Lightweight ddos flooding attack detection using nox\/openflow","DOI":"10.1109\/LCN.2010.5735752"},{"key":"2475_CR21","doi-asserted-by":"crossref","unstructured":"Doshi R, Apthorpe N, Feamster N (2018) Machine learning ddos detection for consumer internet of things devices. arXiv (Cornell University), 29\u201335","DOI":"10.1109\/SPW.2018.00013"},{"key":"2475_CR22","doi-asserted-by":"crossref","unstructured":"Ghanbari M, Kinsner W (2018) Extracting features from both the input and the output of a convolutional neural network to detect distributed denial of service attacks. 2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC), 138\u2013144","DOI":"10.1109\/ICCI-CC.2018.8482019"},{"key":"2475_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106738","volume":"86","author":"MVO Assis","year":"2020","unstructured":"Assis MVO, Carvalho LF, Rodrigues JJPC, Lloret J, Proen\u00e7a ML Jr (2020) Near real-time security system applied to sdn environments in iot networks using convolutional neural network. Computers & Electrical Engineering 86:106738","journal-title":"Computers & Electrical Engineering"},{"key":"2475_CR24","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/MIE.2020.3004975","volume":"14","author":"A Aijaz","year":"2020","unstructured":"Aijaz A (2020) Private 5g: The future of industrial wireless. IEEE Ind Electron Mag 14:136\u2013145","journal-title":"IEEE Ind Electron Mag"},{"key":"2475_CR25","doi-asserted-by":"publisher","first-page":"70204","DOI":"10.1109\/ACCESS.2022.3187727","volume":"10","author":"H Frank","year":"2022","unstructured":"Frank H, Colman-Meixner C, Assis KDR, Yan S, Simeonidou D (2022) Techno-economic analysis of 5g non-public network architectures. IEEE Access 10:70204\u201370218","journal-title":"IEEE Access"},{"key":"2475_CR26","doi-asserted-by":"crossref","unstructured":"Ordonez-Lucena J, Chavarria JF, Contreras LM, Pastor, A (2019) The use of 5g non-public networks to support industry 4.0 scenarios. arXiv (Cornell University), 1\u20137","DOI":"10.1109\/CSCN.2019.8931325"},{"key":"2475_CR27","doi-asserted-by":"publisher","first-page":"153893","DOI":"10.1109\/ACCESS.2021.3127482","volume":"9","author":"J Prados-Garzon","year":"2021","unstructured":"Prados-Garzon J, Ameigeiras P, Ordonez-Lucena J, Munoz P, Adamuz-Hinojosa O, Camps-Mur D (2021) 5g non-public networks: Standardization, architectures and challenges. IEEE Access 9:153893\u2013153908","journal-title":"IEEE Access"},{"key":"2475_CR28","first-page":"10","volume":"10","author":"J Cheng","year":"2018","unstructured":"Cheng J, Chen W, Tao F, Lin C-L (2018) Industrial iot in 5g environment towards smart manufacturing. J Ind Inf Integr 10:10\u201319","journal-title":"J Ind Inf Integr"},{"key":"2475_CR29","unstructured":"Ericsson\u2019s USA 5G Smart Factory (2025). https:\/\/www.ericsson.com\/en\/about-us\/company-facts\/ericsson-worldwide\/united-states\/5g-smart-factory"},{"key":"2475_CR30","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MCOM.2017.1600935","volume":"55","author":"J Ordonez-Lucena","year":"2017","unstructured":"Ordonez-Lucena J, Ameigeiras P, Lopez D, Ramos-Munoz JJ, Lorca J, Folgueira J (2017) Network slicing for 5g with sdn\/nfv: Concepts, architectures, and challenges. IEEE Commun Mag 55:80\u201387","journal-title":"IEEE Commun Mag"},{"key":"2475_CR31","doi-asserted-by":"publisher","first-page":"1657","DOI":"10.1109\/COMST.2017.2705720","volume":"19","author":"T Taleb","year":"2017","unstructured":"Taleb T, Samdanis K, Mada B, Flinck H, Dutta S, Sabella D (2017) On multi-access edge computing: A survey of the emerging 5g network edge cloud architecture and orchestration. IEEE Communications Surveys & Tutorials 19:1657\u20131681","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"2475_CR32","first-page":"185","volume":"07","author":"S Qadir","year":"2016","unstructured":"Qadir S, Quadri SMK (2016) Information availability: An insight into the most important attribute of information security. J Inf Secur 07:185\u2013194","journal-title":"J Inf Secur"},{"key":"2475_CR33","doi-asserted-by":"publisher","first-page":"3682","DOI":"10.1109\/COMST.2019.2916180","volume":"21","author":"I Ahmad","year":"2019","unstructured":"Ahmad I, Shahabuddin S, Kumar T, Okwuibe J, Gurtov A, Ylianttila M (2019) Security for 5g and beyond. IEEE Communications Surveys & Tutorials 21:3682\u20133722","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"2475_CR34","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCOMSTD.2019.1800034","volume":"3","author":"HC Rudolph","year":"2019","unstructured":"Rudolph HC, Kunz A, Iacono LL, Nguyen HV (2019) Security challenges of the 3g pp 5g service based architecture. IEEE Communications Standards Magazine 3:60\u201365","journal-title":"IEEE Communications Standards Magazine"},{"key":"2475_CR35","doi-asserted-by":"publisher","first-page":"4543","DOI":"10.1109\/ACCESS.2016.2601009","volume":"4","author":"S Mavoungou","year":"2016","unstructured":"Mavoungou S, Kaddoum G, Taha M, Matar G (2016) Survey on threats and attacks on mobile networks. IEEE Access 4:4543\u20134572","journal-title":"IEEE Access"},{"key":"2475_CR36","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MVT.2019.2935793","volume":"14","author":"J Zhao","year":"2019","unstructured":"Zhao J, Ni S, Yang L, Zhang Z, Gong Y, You X (2019) Multiband cooperation for 5g hetnets: A promising network paradigm. IEEE Veh Technol Mag 14:85\u201393","journal-title":"IEEE Veh Technol Mag"},{"key":"2475_CR37","doi-asserted-by":"publisher","first-page":"1955","DOI":"10.1109\/COMST.2014.2320094","volume":"16","author":"Y Jarraya","year":"2014","unstructured":"Jarraya Y, Madi T, Debbabi M (2014) A survey and a layered taxonomy of software-defined networking. IEEE Communications Surveys & Tutorials 16:1955\u20131980","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"2475_CR38","doi-asserted-by":"publisher","first-page":"2468","DOI":"10.1109\/JSAC.2017.2760418","volume":"35","author":"FZ Yousaf","year":"2017","unstructured":"Yousaf FZ, Bredel M, Schaller S, Schneider F (2017) Nfv and sdn-key technology enablers for 5g networks. IEEE J Sel Areas Commun 35:2468\u20132478","journal-title":"IEEE J Sel Areas Commun"},{"key":"2475_CR39","unstructured":"free5GC (2024). https:\/\/free5gc.org\/"},{"key":"2475_CR40","unstructured":"aligungr (2025) GitHub - aligungr\/UERANSIM: Open source 5G UE and RAN (gNodeB) implementation. https:\/\/github.com\/aligungr\/UERANSIM"},{"key":"2475_CR41","unstructured":"Docker (2025) lightweight linux containers for consistent development and deployment: Linux journal: Vol 2014, no 239. Linux Journal"},{"key":"2475_CR42","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA (2019) Developing realistic distributed denial of service (ddos) attack dataset and taxonomy, 1\u20138","DOI":"10.1109\/CCST.2019.8888419"},{"key":"2475_CR43","doi-asserted-by":"crossref","unstructured":"Usha G, Narang M, Kumar A (2021) Detection and classification of distributed dos attacks using machine learning. Lecture notes on data engineering and communications technologies, 985\u20131000","DOI":"10.1007\/978-981-15-9647-6_78"},{"key":"2475_CR44","doi-asserted-by":"publisher","first-page":"19723","DOI":"10.1109\/ACCESS.2021.3054688","volume":"9","author":"S Rajagopal","year":"2021","unstructured":"Rajagopal S, Kundapur PP (2021) Towards effective network intrusion detection: From concept to creation on azure cloud. IEEE Access 9:19723\u201319742","journal-title":"IEEE Access"},{"key":"2475_CR45","doi-asserted-by":"publisher","first-page":"2420","DOI":"10.1016\/j.procs.2023.01.217","volume":"218","author":"D Kumar","year":"2023","unstructured":"Kumar D, Pateriya RK, Gupta RK, Dehalwar V, Sharma A (2023) Ddos detection using deep learning. Procedia Computer Science 218:2420\u20132429","journal-title":"Procedia Computer Science"},{"key":"2475_CR46","doi-asserted-by":"publisher","first-page":"5213","DOI":"10.3390\/app11115213","volume":"11","author":"C-S Shieh","year":"2021","unstructured":"Shieh C-S, Lin W-W, Nguyen T-T, Chen C-H, Horng M-F, Miu D (2021) Detection of unknown ddos attacks with deep learning and gaussian mixture model. Appl Sci 11:5213\u20135213","journal-title":"Appl Sci"},{"key":"2475_CR47","doi-asserted-by":"publisher","first-page":"146810","DOI":"10.1109\/ACCESS.2021.3123791","volume":"9","author":"Y Wei","year":"2021","unstructured":"Wei Y, Jang-Jaccard J, Sabrina F, Singh A, Xu W, Camtepe S (2021) Ae-mlp: A hybrid deep learning approach for ddos detection and classification. IEEE Access 9:146810\u2013146821","journal-title":"IEEE Access"},{"key":"2475_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121912","volume":"238","author":"G Sai Chaitanya Kumar","year":"2024","unstructured":"Sai Chaitanya Kumar G, Kiran Kumar R, Parish Venkata Kumar K, Raghavendra Sai N, Brahmaiah M (2024) Deep residual convolutional neural network: An efficient technique for intrusion detection system. Expert Syst Appl 238:121912","journal-title":"Expert Syst Appl"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-025-02475-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-025-02475-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-025-02475-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T09:52:54Z","timestamp":1773309174000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-025-02475-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":48,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["2475"],"URL":"https:\/\/doi.org\/10.1007\/s11036-025-02475-4","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8]]},"assertion":[{"value":"14 October 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}