{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T10:32:50Z","timestamp":1776940370482,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T00:00:00Z","timestamp":1735948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,1,4]]},"DOI":"10.1145\/3700838.3703671","type":"proceedings-article","created":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T12:58:12Z","timestamp":1735822692000},"page":"331-339","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Towards Zero Trust Security in SDN: A Multi-Layered Defense Strategy"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-0416-9712","authenticated-orcid":false,"given":"Jay","family":"Barach","sequence":"first","affiliation":[{"name":"IT Operations and Recruitment, Systems Staffing Group. Inc, King of Prussia, PA, United States"}]}],"member":"320","published-online":{"date-parts":[[2025,1,4]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91738-8_42"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Ijaz Ahmad Suneth Namal Mika Ylianttila and Andrei Gurtov. 2015. Security in software defined networks: A survey. IEEE Communications Surveys & Tutorials 17 4 (2015) 2317\u20132346.","DOI":"10.1109\/COMST.2015.2474118"},{"key":"e_1_3_3_1_4_2","first-page":"139","volume-title":"International Conference on Software Engineering and Data Engineering","author":"Ahmad Waquar","year":"2024","unstructured":"Waquar Ahmad, Aditya Vashist, Neel Sinha, Manisha Prasad, Vishesh Shrivastava, and Junaid\u00a0Hussain Muzamal. 2024. Enhancing Transparency and Privacy in Financial Fraud Detection: The Integration of Explainable AI and Federated Learning. In International Conference on Software Engineering and Data Engineering. Springer, 139\u2013156."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Afsaneh Banitalebi\u00a0Dehkordi MohammadReza Soltanaghaei and Farsad\u00a0Zamani Boroujeni. 2021. The DDoS attacks detection through machine learning and statistical methods in SDN. The Journal of Supercomputing 77 3 (2021) 2383\u20132415.","DOI":"10.1007\/s11227-020-03323-w"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Yongyi Cao Hao Jiang Yuchuan Deng Jing Wu Pan Zhou and Wei Luo. 2021. Detecting and mitigating DDoS attacks in SDN using spatial-temporal graph convolutional network. IEEE Transactions on Dependable and Secure Computing 19 6 (2021) 3855\u20133872.","DOI":"10.1109\/TDSC.2021.3108782"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Luiz\u00a0Fernando Carvalho Taufik Abrao Leonardo de Souza\u00a0Mendes and Mario\u00a0Lemes Proen\u00e7a\u00a0Jr. 2018. An ecosystem for anomaly detection and mitigation in software-defined networking. Expert Systems with Applications 104 (2018) 121\u2013133.","DOI":"10.1016\/j.eswa.2018.03.027"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"Nuruzzaman Faruqui Sandesh Achar Sandeepkumar Racherla Vineet Dhanawat Prathyusha Sripathi Md.\u00a0Monirul Islam Jia Uddin Manal\u00a0A. Othman Md\u00a0Abdus Samad and Kwonhue Choi. 2024. Cloud IaaS Optimization Using Machine Vision at the IoT Edge and the Grid Sensing Algorithm. Sensors 24 21 (2024). 10.3390\/s24216895","DOI":"10.3390\/s24216895"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Mohd Haleem Md\u00a0Faizan Farooqui and Md Faisal. 2021. Cognitive impact validation of requirement uncertainty in software project development. International Journal of Cognitive Computing in Engineering 2 (2021) 1\u201311.","DOI":"10.1016\/j.ijcce.2020.12.002"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Biao Han Xiangrui Yang Zhigang Sun Jinfeng Huang and Jinshu Su. 2018. OverWatch: a cross-plane DDoS attack defense framework with collaborative intelligence in SDN. Security and Communication Networks 2018 1 (2018) 9649643.","DOI":"10.1155\/2018\/9649643"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/IICAIET62352.2024.10729950"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Danish Javeed Tianhan Gao and Muhammad\u00a0Taimoor Khan. 2021. SDN-enabled hybrid DL-driven framework for the detection of emerging cyber threats in IoT. Electronics 10 8 (2021) 918.","DOI":"10.3390\/electronics10080918"},{"key":"e_1_3_3_1_13_2","first-page":"47","volume-title":"Proceedings of","volume":"20","author":"Jnr Osei Wusu\u00a0Brempong","year":"2024","unstructured":"Osei Wusu\u00a0Brempong Jnr, Junaid\u00a0Hussain Muzamal, and Okechukwu Clement. 2024. Adaptive Multi-Layered Non-Terrestrial Network for Deep Learning-Enhanced Global Connectivity. In Proceedings of , Vol.\u00a020. 47\u201358."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Soneila Khan and Adnan Akhunzada. 2021. A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT). Computer Communications 170 (2021) 209\u2013216.","DOI":"10.1016\/j.comcom.2021.01.013"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Zhenpeng Liu Yupeng He Wensheng Wang and Bin Zhang. 2019. DDoS attack detection scheme based on entropy and PSO-BP neural network in SDN. China Communications 16 7 (2019) 144\u2013155.","DOI":"10.23919\/JCC.2019.07.012"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Soumaine\u00a0Bouba Mahamat and Celal \u00c7eken. 2019. Anomaly detection in software-defined networking using machine learning. D\u00fczce \u00dcniversitesi Bilim ve Teknoloji Dergisi 7 1 (2019) 748\u2013756.","DOI":"10.29130\/dubited.433825"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Nick McKeown Tom Anderson Hari Balakrishnan Guru Parulkar Larry Peterson Jennifer Rexford Scott Shenker and Jonathan Turner. 2008. OpenFlow: enabling innovation in campus networks. ACM SIGCOMM computer communication review 38 2 (2008) 69\u201374.","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Abdallah Moubayed Ahmed Refaey and Abdallah Shami. 2019. Software-defined perimeter (sdp): State of the art secure solution for modern networks. IEEE network 33 5 (2019) 226\u2013233.","DOI":"10.1109\/MNET.2019.1800324"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Kashif Nisar Emilia\u00a0Rosa Jimson Mohd Hanafi\u00a0Ahmad Hijazi Ian Welch Rosilah Hassan Azana Hafizah\u00a0Mohd Aman Ali\u00a0Hassan Sodhro Sandeep Pirbhulal and Sohrab Khan. 2020. A survey on the architecture application and security of software defined networking: Challenges and open issues. Internet of Things 12 (2020) 100289.","DOI":"10.1016\/j.iot.2020.100289"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Matheus\u00a0P Novaes Luiz\u00a0F Carvalho Jaime Lloret and Mario\u00a0Lemes Proen\u00e7a\u00a0Jr. 2021. Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments. Future Generation Computer Systems 125 (2021) 156\u2013167.","DOI":"10.1016\/j.future.2021.06.047"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Senthil Prabakaran and Ramalakshmi Ramar. 2021. Software defined network: load balancing algorithm design and analysis. Int. Arab J. Inf. Technol. 18 3 (2021) 312\u2013318.","DOI":"10.34028\/iajit\/18\/3\/7"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Keyvan Ramezanpour and Jithin Jagannath. 2022. Intelligent zero trust architecture for 5G\/6G networks: Principles challenges and the role of machine learning in the context of O-RAN. Computer Networks 217 (2022) 109358.","DOI":"10.1016\/j.comnet.2022.109358"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Ahmed Sallam Ahmed Refaey and Abdallah Shami. 2019. On the security of SDN: A completed secure and scalable framework using the software-defined perimeter. IEEE access 7 (2019) 146577\u2013146587.","DOI":"10.1109\/ACCESS.2019.2939780"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"K\u00a0Tamil Selvi and R Thamilselvan. 2022. An intelligent traffic prediction framework for 5G network using SDN and fusion learning. Peer-to-Peer Networking and Applications 15 1 (2022) 751\u2013767.","DOI":"10.1007\/s12083-021-01280-6"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"crossref","unstructured":"Tuan\u00a0Anh Tang Lotfi Mhamdi Des McLernon Syed Ali\u00a0Raza Zaidi Mounir Ghogho and Fadi El\u00a0Moussa. 2020. DeepIDS: Deep learning approach for intrusion detection in software defined networking. Electronics 9 9 (2020) 1533.","DOI":"10.3390\/electronics9091533"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"crossref","unstructured":"Raja Majid\u00a0Ali Ujjan Zeeshan Pervez Keshav Dahal Ali\u00a0Kashif Bashir Rao Mumtaz and Jonathan Gonz\u00e1lez. 2020. Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN. Future Generation Computer Systems 111 (2020) 763\u2013779.","DOI":"10.1016\/j.future.2019.10.015"},{"key":"e_1_3_3_1_27_2","unstructured":"Ivan Ursul and Junaid\u00a0Hussain Muzamal. 2024. A Dynamic Blurring Approach with EfficientNet and LSTM to Enhance Privacy in Video-Based Elderly Fall Detection. (2024)."},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA52016.2021.9478244"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"crossref","unstructured":"Haipeng Yao Tianle Mai Xiaobin Xu Peiying Zhang Maozhen Li and Yunjie Liu. 2018. NetworkAI: An intelligent network architecture for self-learning control strategies in software defined networks. IEEE Internet of Things Journal 5 6 (2018) 4319\u20134327.","DOI":"10.1109\/JIOT.2018.2859480"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Noe\u00a0M Yungaicela-Naula Cesar Vargas-Rosales Jes\u00fas\u00a0Arturo P\u00e9rez-D\u00edaz and Diego\u00a0Fernando Carrera. 2022. A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning. Journal of network and computer applications 205 (2022) 103444.","DOI":"10.1016\/j.jnca.2022.103444"}],"event":{"name":"ICDCN 2025: 26th International Conference on Distributed Computing and Networking","location":"Hyderabad India","acronym":"ICDCN 2025"},"container-title":["Proceedings of the 26th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3703671","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3700838.3703671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:22Z","timestamp":1750295422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3703671"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,4]]},"references-count":29,"alternative-id":["10.1145\/3700838.3703671","10.1145\/3700838"],"URL":"https:\/\/doi.org\/10.1145\/3700838.3703671","relation":{},"subject":[],"published":{"date-parts":[[2025,1,4]]},"assertion":[{"value":"2025-01-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}