{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:54:35Z","timestamp":1776077675402,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T00:00:00Z","timestamp":1733875200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T00:00:00Z","timestamp":1733875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Innovations Syst Softw Eng"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s11334-024-00594-x","type":"journal-article","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T15:53:01Z","timestamp":1733932381000},"page":"1253-1272","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Anomaly detection in software-defined networking utilizing multi-verse deer hunting optimization enabled deep q-network for traffic flow rate prediction"],"prefix":"10.1007","volume":"21","author":[{"given":"Nirav M","family":"Raja","sequence":"first","affiliation":[]},{"given":"Sudhir","family":"Vegad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,11]]},"reference":[{"issue":"3","key":"594_CR1","doi-asserted-by":"publisher","first-page":"1349","DOI":"10.1109\/TNSM.2020.3004415","volume":"17","author":"VP Trung","year":"2020","unstructured":"Trung VP, Tri GN, Nhu-Ngoc D, Truong TH, Nguyen HT, Thomas B (2020) DeepGuard: efficient anomaly detection in SDN with fine-grained traffic flow monitoring. IEEE Trans Netw Serv Manag 17(3):1349\u20131362","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"594_CR2","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s10586-022-03789-8","volume":"26","author":"A Javadpour","year":"2023","unstructured":"Javadpour A, Jafari F, Pinto P, Zhang W (2023) Mapping and embedding infrastructure resource management in Software Defined Networks. Clust Comput 26:461\u2013475","journal-title":"Clust Comput"},{"key":"594_CR3","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1016\/j.cose.2024.103792","volume":"140","author":"A Javadpour","year":"2024","unstructured":"Javadpour A, J\u2019afari F, Taleb T, Shojafar M, Benzaid C (2024) A comprehensive survey on cyber deception techniques to improve honeypot performance. Comput Secur 140:634","journal-title":"Comput Secur"},{"key":"594_CR4","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1109\/TCE.2023.3318509","volume":"70","author":"A Yazdinejad","year":"2024","unstructured":"Yazdinejad A, Dehghantanha A, Srivastava G (2024) AP2FL: auditable privacy-preserving federated learning framework for electronics in healthcare. IEEE Trans Consum Electron 70:630","journal-title":"IEEE Trans Consum Electron"},{"key":"594_CR5","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1109\/TII.2022.3168011","volume":"18","author":"A Yazdinejad","year":"2022","unstructured":"Yazdinejad A, Dehghantanha A, Parizi RM, Hammoud M, Karimipour H, Srivastava G (2022) Block hunter: federated learning for cyber threat hunting in blockchain-based IIoT networks. IEEE Trans Ind Inf 18:520","journal-title":"IEEE Trans Ind Inf"},{"key":"594_CR6","doi-asserted-by":"publisher","first-page":"73713","DOI":"10.1109\/ACCESS.2018.2884293","volume":"6","author":"Q Shafi","year":"2018","unstructured":"Shafi Q, Basit A, Qaisar S, Koay A, Welch I (2018) Fog-assisted SDN controlled framework for enduring anomaly detection in an IoT network. IEEE Access 6:73713\u201373723","journal-title":"IEEE Access"},{"key":"594_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2016.03.016","volume":"67","author":"R Masoudi","year":"2016","unstructured":"Masoudi R, Ghaffari A (2016) Software-defined networks: a survey. J Netw Comput Appl 67:1\u201325","journal-title":"J Netw Comput Appl"},{"key":"594_CR8","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.comnet.2015.02.014","volume":"81","author":"H Farhady","year":"2015","unstructured":"Farhady H, Lee HY, Nakao A (2015) Software-defined networking: a survey. Comput Netw 81:79\u201395","journal-title":"Comput Netw"},{"issue":"14","key":"594_CR9","doi-asserted-by":"publisher","first-page":"e4524","DOI":"10.1002\/dac.4524","volume":"33","author":"T Jafarian","year":"2020","unstructured":"Jafarian T, Masdari M, Ghaffari A, Majidzadeh K (2020) Security anomaly detection in software-defined networking based on a prediction technique. Int J Commun Syst 33(14):e4524","journal-title":"Int J Commun Syst"},{"key":"594_CR10","doi-asserted-by":"crossref","unstructured":"Diego K, Fernando MVR, Paulo V (2013) Towards secure and dependable software-defined networks. In: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software-defined networking, pp 55\u201360","DOI":"10.1145\/2491185.2491199"},{"key":"594_CR11","doi-asserted-by":"crossref","unstructured":"Donghwoon K, Kathiravan N, Jinoh K (2018) An empirical study on network anomaly detection using convolutional neural networks. In I:EEE 38th International Conference on Distributed Computing Systems (ICDCS), pp 1595\u20131598","DOI":"10.1109\/ICDCS.2018.00178"},{"issue":"2","key":"594_CR12","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s12083-017-0630-0","volume":"12","author":"S Nasrin","year":"2019","unstructured":"Nasrin S, Naveen C, Wei P, Rabei A (2019) Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Netw Appl 12(2):493\u2013501","journal-title":"Peer-to-Peer Netw Appl"},{"key":"594_CR13","unstructured":"Sanaz N, Behrouz Z, Abbas Y, Ali D (2021) SteelEye: an application-layer attack detection and attribution model in industrial control systems using semi-deep learning. In: the Proceedings of 2021 18th international conference on privacy, security and trust (PST)"},{"key":"594_CR14","first-page":"63","volume":"144","author":"Y Abbas","year":"2023","unstructured":"Abbas Y, Ali D, Reza MP, Gautam S, Hadis K (2023) Secure intelligent fuzzy blockchain framework: effective threat detection in IoT networks. Comput Ind 144:63","journal-title":"Comput Ind"},{"issue":"2","key":"594_CR15","first-page":"108","volume":"2","author":"IZC Joy","year":"2020","unstructured":"Joy IZC, Smys S (2020) Social multimedia security and suspicious activity detection in SDN using hybrid deep learning technique. J Inf Technol 2(2):108\u2013115","journal-title":"J Inf Technol"},{"issue":"1","key":"594_CR16","first-page":"7","volume":"12","author":"KD Samrat","year":"2020","unstructured":"Samrat KD, Md. Mahbubur R, (2020) Effects of machine learning approach in flow-based anomaly detection on software-defined networking. Symmetry 12(1):7","journal-title":"Symmetry"},{"key":"594_CR17","doi-asserted-by":"crossref","unstructured":"Yang Q, Junjie W, Weihong Y (2019) Deep learning based anomaly detection scheme in software-defined networking. In: 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp 1\u20134","DOI":"10.23919\/APNOMS.2019.8892873"},{"key":"594_CR18","doi-asserted-by":"crossref","unstructured":"Allen S, Janise MN, Rodrigo T, Arturo B, Joshua P, Alina Z (2018) Toward resilient smart grid communications using distributed SDN with ml-based anomaly detection. In: International Conference on Wired\/Wireless Internet Communication pp 83\u201394, Springer, Cham","DOI":"10.1007\/978-3-030-02931-9_7"},{"key":"594_CR19","doi-asserted-by":"crossref","unstructured":"Yuan-Cheng L, Kai-Zhong Z, Si-Ru L, Nai-Wei L (2019) F1ow-based anomaly detection using multilayer perceptron in software-defined Networks. In: IEEE 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp 1154\u20131158","DOI":"10.23919\/MIPRO.2019.8757199"},{"issue":"2","key":"594_CR20","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/s00521-015-1870-7","volume":"27","author":"M Seyedali","year":"2016","unstructured":"Seyedali M, Seyed MM, Abdolreza H (2016) Multi-verse optimizer: a nature-inspired algorithm for global optimization. Neural Comput Appl 27(2):495\u2013513","journal-title":"Neural Comput Appl"},{"issue":"6","key":"594_CR21","doi-asserted-by":"publisher","first-page":"1890","DOI":"10.1109\/JIOT.2017.2694702","volume":"4","author":"H Daojing","year":"2017","unstructured":"Daojing H, Sammy C, Xiejun N, Mohsen G (2017) Software-defined-networking-enabled traffic anomaly detection and mitigation. IEEE Internet Things J 4(6):1890\u20131898","journal-title":"IEEE Internet Things J"},{"key":"594_CR22","first-page":"93","volume":"5","author":"L Hang","year":"2017","unstructured":"Hang L (2017) Deep learning for natural language processing: advantages and challenges. Natl Sci Rev 5:93","journal-title":"Natl Sci Rev"},{"issue":"3","key":"594_CR23","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1109\/TMM.2019.2893549","volume":"21","author":"G Sahil","year":"2019","unstructured":"Sahil G, Kuljeet K, Neeraj K, Joel JPCR (2019) Hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in SDN: a social multimedia perspective. IEEE Trans Multimedia 21(3):566\u2013578","journal-title":"IEEE Trans Multimedia"},{"key":"594_CR24","doi-asserted-by":"crossref","unstructured":"Wentao Z, Cuiling L, Junliang X, Wenjun Z, Yanghao L, Li S, Xiaohui X (2016) Co-occurrence feature learning for skeleton based action recognition using regularized deep LSTM networks. In: Proceedings of the AAAI conference on artificial intelligence, vol 30, no 1","DOI":"10.1609\/aaai.v30i1.10451"},{"key":"594_CR25","doi-asserted-by":"publisher","first-page":"27809","DOI":"10.1109\/ACCESS.2018.2839684","volume":"6","author":"P Huijun","year":"2018","unstructured":"Huijun P, Zhe S, Xuejian Z, Shuhua T, Zhixin S (2018) A detection method for anomaly flow in software-defined network. IEEE Access 6:27809\u201327817","journal-title":"IEEE Access"},{"key":"594_CR26","doi-asserted-by":"crossref","unstructured":"Qaisar S, Saad Q, Abdul B (2019) Software defined machine learning based anomaly detection in fog based IoT network. In: International Conference on Computational Science and Its Applications, Springer, Cham, pp 611\u2013621","DOI":"10.1007\/978-3-030-24305-0_45"},{"key":"594_CR27","first-page":"69","volume":"5","author":"N Danyal","year":"2024","unstructured":"Danyal N, Abbas Y, Ali D, Gautam S (2024) Federated quantum-based privacy-preserving threat detection model for consumer Internet of Things. IEEE Trans Consum Electron 5:69","journal-title":"IEEE Trans Consum Electron"},{"key":"594_CR28","first-page":"960","volume":"148","author":"Y Abbas","year":"2024","unstructured":"Abbas Y, Ali D, Gautam S, Hadis K, Reza MP (2024) Hybrid privacy preserving federated learning against irregular users in next-generation Internet of Things. J Syst Arch 148:960","journal-title":"J Syst Arch"},{"key":"594_CR29","doi-asserted-by":"crossref","unstructured":"Cabaj K, Wytr\u0119bowicz J, Kukli\u0144ski S, Radziszewski P, Truong DK (2014) SDN architecture impact on network security. In: FedCSIS (Position Papers), pp 143\u2013148","DOI":"10.15439\/2014F473"},{"issue":"3","key":"594_CR30","doi-asserted-by":"publisher","first-page":"e12124","DOI":"10.1002\/eng2.12124","volume":"2","author":"B Ilyas","year":"2020","unstructured":"Ilyas B, Kun X, Mouna C (2020) A new competitive multiverse optimization technique for solving single-objective and multiobjective problems. Eng Rep 2(3):e12124","journal-title":"Eng Rep"},{"key":"594_CR31","first-page":"96","volume":"5","author":"G Brammya","year":"2019","unstructured":"Brammya G, Praveena S, Preetha NSN, Ramya R, Rajakumar BR, Binu D (2019) Deer hunting optimization algorithm: a new nature-inspired meta-heuristic paradigm. Comput J 5:96","journal-title":"Comput J"},{"key":"594_CR32","doi-asserted-by":"crossref","unstructured":"Hikaru S, Tadashi H, Tadashi H (2017) A study on vision-based mobile robot learning by deep Q-network. In: 56th annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), pp 799\u2013804, IEEE","DOI":"10.23919\/SICE.2017.8105597"},{"key":"594_CR33","unstructured":"NSL-KDD dataset, https:\/\/www.unb.ca\/cic\/datasets\/nsl.html accessed on January 2021"},{"key":"594_CR34","doi-asserted-by":"crossref","unstructured":"Mishra B, Kumar R (2023) Assessment of variable threshold for anomaly detection in ECG time signals with deep learning. In: the Proceedings of International Conference on Paradigms of Communication, Computing and Data Analytics","DOI":"10.1007\/978-981-99-4626-6_7"},{"key":"594_CR35","first-page":"36","volume":"5","author":"M Gu","year":"2014","unstructured":"Gu M (2014) Anomaly detection based on chi-square statistic technology in computer information system. Appl Mech Mater 5:36","journal-title":"Appl Mech Mater"}],"container-title":["Innovations in Systems and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-024-00594-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11334-024-00594-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-024-00594-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T03:05:26Z","timestamp":1760497526000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11334-024-00594-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,11]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["594"],"URL":"https:\/\/doi.org\/10.1007\/s11334-024-00594-x","relation":{},"ISSN":["1614-5046","1614-5054"],"issn-type":[{"value":"1614-5046","type":"print"},{"value":"1614-5054","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,11]]},"assertion":[{"value":"13 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}